Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl...Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be.展开更多
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-...Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem.展开更多
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat...Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.展开更多
One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit...One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit, this paper ascertains the dynamic variation of the pressure in the storage reservoir, adjusts the actual injecting and producing gas to fit the accounted pressure with the tested pressure, obtains the gas leakage of the storage, and then determines the difference between accounted amount and leakage amount. The result is the actual reserves of the storage. The simulation result shows that the method presented can provide a theoretic foundation for estimating the leakage amount, thereby ensuring the actual reserves, searching the leakage route, and reducing leakage by adjusting the storage method.展开更多
Efficient numerical solver for the SchrSdinger equation is very important in physics and chemistry. The finite element discrete variable representation (FE-DVR) was first proposed by Rescigno and Mc-Curdy [Phys. Rev...Efficient numerical solver for the SchrSdinger equation is very important in physics and chemistry. The finite element discrete variable representation (FE-DVR) was first proposed by Rescigno and Mc-Curdy [Phys. Rev. A 62, 032706 (2000)] for solving quantum-mechanical scattering problems. In this work, an FE-DVR method in a mapped coordinate was proposed to improve the efficiency of the original FE-DVR method. For numerical demonstration, the proposed approach is applied for solving the electronic eigenfunctions and eigenvalues of the hydrogen atom and vibrational states of the electronic state 3E+ of the Cs2 molecule which has long-range interaction potential. The numerical results indicate that the numerical efficiency of the original FE-DVR has been improved much using our proposed mapped coordinate scheme.展开更多
In the digital age, when we witness the rapid proliferation of platforms and services, European societies continue debating the role and the future of public service media (PSM). In the new digital environment, publ...In the digital age, when we witness the rapid proliferation of platforms and services, European societies continue debating the role and the future of public service media (PSM). In the new digital environment, public service broadcasting/media, which for a number of social and cultural reasons have been at the core of the European media system, faces the capital question--What democracy do public operators strive for and how can they accomplish it? PSM has to be at the vanguard of the complex process of media transformation in the information society and particularly of the formation of novel journalistic culture which besides the values of ethical and innovative content should also serve the principles of good and efficient governance.展开更多
基金Projects(41572317,51374242)supported by the National Natural Science Foundation of ChinaProject(2015CX005)supported by the Innovation Driven Plan of Central South University,China
文摘Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be.
基金the National Natural Science Foundation of China (No.60673070)the Natural Science Foundation of Jiangsu Province (No.BK2006217)the Open Project of the Key Lab. on Computer Networks and Information Security (Xidian University) of Ministry of Education of China(No.20040105)
文摘Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem.
文摘Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.
文摘One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit, this paper ascertains the dynamic variation of the pressure in the storage reservoir, adjusts the actual injecting and producing gas to fit the accounted pressure with the tested pressure, obtains the gas leakage of the storage, and then determines the difference between accounted amount and leakage amount. The result is the actual reserves of the storage. The simulation result shows that the method presented can provide a theoretic foundation for estimating the leakage amount, thereby ensuring the actual reserves, searching the leakage route, and reducing leakage by adjusting the storage method.
文摘Efficient numerical solver for the SchrSdinger equation is very important in physics and chemistry. The finite element discrete variable representation (FE-DVR) was first proposed by Rescigno and Mc-Curdy [Phys. Rev. A 62, 032706 (2000)] for solving quantum-mechanical scattering problems. In this work, an FE-DVR method in a mapped coordinate was proposed to improve the efficiency of the original FE-DVR method. For numerical demonstration, the proposed approach is applied for solving the electronic eigenfunctions and eigenvalues of the hydrogen atom and vibrational states of the electronic state 3E+ of the Cs2 molecule which has long-range interaction potential. The numerical results indicate that the numerical efficiency of the original FE-DVR has been improved much using our proposed mapped coordinate scheme.
文摘In the digital age, when we witness the rapid proliferation of platforms and services, European societies continue debating the role and the future of public service media (PSM). In the new digital environment, public service broadcasting/media, which for a number of social and cultural reasons have been at the core of the European media system, faces the capital question--What democracy do public operators strive for and how can they accomplish it? PSM has to be at the vanguard of the complex process of media transformation in the information society and particularly of the formation of novel journalistic culture which besides the values of ethical and innovative content should also serve the principles of good and efficient governance.