Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assesse...Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assessed likely range of equilibrium climate sensitivity(ECS)and the climatological precipitation performance,the authors constrain the CMIP6(phase 6 of the Coupled Model Intercomparison Project)model projection of summer precipitation and water availability over the TP.The best estimates of precipitation changes are 0.24,0.25,and 0.45 mm d^(−1)(5.9%,6.1%,and 11.2%)under the Shared Socioeconomic Pathway(SSP)scenarios of SSP1–2.6,SSP2–4.5,and SSP5–8.5 from 2050–2099 relative to 1965–2014,respectively.The corresponding constrained projections of water availability measured by precipitation minus evaporation(P–E)are 0.10,0.09,and 0.22 mm d^(−1)(5.7%,4.9%,and 13.2%),respectively.The increase of precipitation and P–E projected by the high-ECS models,whose ECS values are higher than the upper limit of the likely range,are about 1.7 times larger than those estimated by constrained projections.Spatially,there is a larger increase in precipitation and P–E over the eastern TP,while the western part shows a relatively weak difference in precipitation and a drier trend in P–E.The wetter TP projected by the high-ECS models resulted from both an approximately 1.2–1.4 times stronger hydrological sensitivity and additional warming of 0.6℃–1.2℃ under all three scenarios during 2050–2099.This study emphasizes that selecting climate models with climate sensitivity within the likely range is crucial to reducing the uncertainty in the projection of TP precipitation and water availability changes.展开更多
Spring consecutive rainfall events(CREs) are key triggers of geological hazards in the Three Gorges Reservoir area(TGR), China. However, previous projections of CREs based on the direct outputs of global climate model...Spring consecutive rainfall events(CREs) are key triggers of geological hazards in the Three Gorges Reservoir area(TGR), China. However, previous projections of CREs based on the direct outputs of global climate models(GCMs) are subject to considerable uncertainties, largely caused by their coarse resolution. This study applies a triple-nested WRF(Weather Research and Forecasting) model dynamical downscaling, driven by a GCM, MIROC6(Model for Interdisciplinary Research on Climate, version 6), to improve the historical simulation and reduce the uncertainties in the future projection of CREs in the TGR. Results indicate that WRF has better performances in reproducing the observed rainfall in terms of the daily probability distribution, monthly evolution and duration of rainfall events, demonstrating the ability of WRF in simulating CREs. Thus, the triple-nested WRF is applied to project the future changes of CREs under the middle-of-the-road and fossil-fueled development scenarios. It is indicated that light and moderate rainfall and the duration of continuous rainfall spells will decrease in the TGR, leading to a decrease in the frequency of CREs. Meanwhile, the duration, rainfall amount, and intensity of CREs is projected to regional increase in the central-west TGR. These results are inconsistent with the raw projection of MIROC6. Observational diagnosis implies that CREs are mainly contributed by the vertical moisture advection. Such a synoptic contribution is captured well by WRF, which is not the case in MIROC6,indicating larger uncertainties in the CREs projected by MIROC6.展开更多
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett...Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
Glutamatergic projection neurons generate sophisticated excitatory circuits to integrate and transmit information among different cortical areas,and between the neocortex and other regions of the brain and spinal cord...Glutamatergic projection neurons generate sophisticated excitatory circuits to integrate and transmit information among different cortical areas,and between the neocortex and other regions of the brain and spinal cord.Appropriate development of cortical projection neurons is regulated by certain essential events such as neural fate determination,proliferation,specification,differentiation,migration,survival,axonogenesis,and synaptogenesis.These processes are precisely regulated in a tempo-spatial manner by intrinsic factors,extrinsic signals,and neural activities.The generation of correct subtypes and precise connections of projection neurons is imperative not only to support the basic cortical functions(such as sensory information integration,motor coordination,and cognition)but also to prevent the onset and progression of neurodevelopmental disorders(such as intellectual disability,autism spectrum disorders,anxiety,and depression).This review mainly focuses on the recent progress of transcriptional regulations on the development and diversity of neocortical projection neurons and the clinical relevance of the failure of transcriptional modulations.展开更多
In this study,the vertical components of broadband teleseismic P wave data recorded by China Earthquake Network are used to image the rupture processes of the February 6th,2023 Turkish earthquake doublet via back proj...In this study,the vertical components of broadband teleseismic P wave data recorded by China Earthquake Network are used to image the rupture processes of the February 6th,2023 Turkish earthquake doublet via back projection analysis.Data in two frequency bands(0.5-2 Hz and 1-3 Hz)are used in the imaging processes.The results show that the rupture of the first event extends about 200 km to the northeast and about 150 km to the southwest,lasting~90 s in total.The southwestern rupture is triggered by the northeastern rupture,demonstrating a sequential bidirectional unilateral rupture pattern.The rupture of the second event extends approximately 80 km in both northeast and west directions,lasting~35 s in total and demonstrates a typical bilateral rupture feature.The cascading ruptures on both sides also reflect the occurrence of selective rupture behaviors on bifurcated faults.In addition,we observe super-shear ruptures on certain fault sections with relatively straight fault structures and sparse aftershocks.展开更多
This paper celebrates Professor Yongqi GAO's significant achievement in the field of interdisciplinary studies within the context of his final research project Arctic Climate Predictions: Pathways to Resilient Sus...This paper celebrates Professor Yongqi GAO's significant achievement in the field of interdisciplinary studies within the context of his final research project Arctic Climate Predictions: Pathways to Resilient Sustainable Societies-ARCPATH(https://www.svs.is/en/projects/finished-projects/arcpath). The disciplines represented in the project are related to climatology, anthropology, marine biology, economics, and the broad spectrum of social-ecological studies. Team members were drawn from the Nordic countries, Russia, China, the United States, and Canada. The project was transdisciplinary as well as interdisciplinary as it included collaboration with local knowledge holders. ARCPATH made significant contributions to Arctic research through an improved understanding of the mechanisms that drive climate variability in the Arctic. In tandem with this research, a combination of historical investigations and social, economic, and marine biological fieldwork was carried out for the project study areas of Iceland, Greenland, Norway, and the surrounding seas, with a focus on the joint use of ocean and sea-ice data as well as social-ecological drivers. ARCPATH was able to provide an improved framework for predicting the near-term variation of Arctic climate on spatial scales relevant to society, as well as evaluating possible related changes in socioeconomic realms. In summary, through the integration of information from several different disciplines and research approaches, ARCPATH served to create new and valuable knowledge on crucial issues, thus providing new pathways to action for Arctic communities.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
We present an application of short-pulse laser-generated hard x rays for the diagnosis of indirectly driven double shell targets. Coneinserted double shell targets were imploded through an indirect drive approach on t...We present an application of short-pulse laser-generated hard x rays for the diagnosis of indirectly driven double shell targets. Coneinserted double shell targets were imploded through an indirect drive approach on the upgraded SG-II laser facility. Then, based on thepoint-projection hard x-ray radiography technique, time-resolved radiography of the double shell targets, including that of their near-peakcompression, were obtained. The backlighter source was created by the interactions of a high-intensity short pulsed laser with a metalmicrowire target. Images of the target near peak compression were obtained with an Au microwire. In addition, radiation hydrodynamicsimulations were performed, and the target evolution obtained agrees well with the experimental results. Using the radiographic images, arealdensities of the targets were evaluated.展开更多
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m...Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.展开更多
The Nesterov accelerated dynamical approach serves as an essential tool for addressing convex optimization problems with accelerated convergence rates.Most previous studies in this field have primarily concentrated on...The Nesterov accelerated dynamical approach serves as an essential tool for addressing convex optimization problems with accelerated convergence rates.Most previous studies in this field have primarily concentrated on unconstrained smooth con-vex optimization problems.In this paper,on the basis of primal-dual dynamical approach,Nesterov accelerated dynamical approach,projection operator and directional gradient,we present two accelerated primal-dual projection neurodynamic approaches with time scaling to address convex optimization problems with smooth and nonsmooth objective functions subject to linear and set constraints,which consist of a second-order ODE(ordinary differential equation)or differential conclusion system for the primal variables and a first-order ODE for the dual vari-ables.By satisfying specific conditions for time scaling,we demonstrate that the proposed approaches have a faster conver-gence rate.This only requires assuming convexity of the objective function.We validate the effectiveness of our proposed two accel-erated primal-dual projection neurodynamic approaches through numerical experiments.展开更多
In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright ...In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.展开更多
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am...Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.展开更多
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ...With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.展开更多
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金supported by the Second Tibetan Plateau Scientific Expedition and Research(STEP)program[grant number 2019QZKK0102]the Chinese Academy of Sciences[grant number 060GJHZ2023079GC].
文摘Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assessed likely range of equilibrium climate sensitivity(ECS)and the climatological precipitation performance,the authors constrain the CMIP6(phase 6 of the Coupled Model Intercomparison Project)model projection of summer precipitation and water availability over the TP.The best estimates of precipitation changes are 0.24,0.25,and 0.45 mm d^(−1)(5.9%,6.1%,and 11.2%)under the Shared Socioeconomic Pathway(SSP)scenarios of SSP1–2.6,SSP2–4.5,and SSP5–8.5 from 2050–2099 relative to 1965–2014,respectively.The corresponding constrained projections of water availability measured by precipitation minus evaporation(P–E)are 0.10,0.09,and 0.22 mm d^(−1)(5.7%,4.9%,and 13.2%),respectively.The increase of precipitation and P–E projected by the high-ECS models,whose ECS values are higher than the upper limit of the likely range,are about 1.7 times larger than those estimated by constrained projections.Spatially,there is a larger increase in precipitation and P–E over the eastern TP,while the western part shows a relatively weak difference in precipitation and a drier trend in P–E.The wetter TP projected by the high-ECS models resulted from both an approximately 1.2–1.4 times stronger hydrological sensitivity and additional warming of 0.6℃–1.2℃ under all three scenarios during 2050–2099.This study emphasizes that selecting climate models with climate sensitivity within the likely range is crucial to reducing the uncertainty in the projection of TP precipitation and water availability changes.
基金funding from the NFR COMBINED (Grant No.328935)The BCPU hosted YZ visit to University of Bergen (Trond Mohn Foundation Grant No.BFS2018TMT01)+2 种基金supported by the National Key Research and Development Program of China (Grant No.2023YFA0805101)the National Natural Science Foundation of China (Grant Nos.42376250 and 41731177)a China Scholarship Council fellowship and the UTFORSK Partnership Program (CONNECTED UTF-2016-long-term/10030)。
文摘Spring consecutive rainfall events(CREs) are key triggers of geological hazards in the Three Gorges Reservoir area(TGR), China. However, previous projections of CREs based on the direct outputs of global climate models(GCMs) are subject to considerable uncertainties, largely caused by their coarse resolution. This study applies a triple-nested WRF(Weather Research and Forecasting) model dynamical downscaling, driven by a GCM, MIROC6(Model for Interdisciplinary Research on Climate, version 6), to improve the historical simulation and reduce the uncertainties in the future projection of CREs in the TGR. Results indicate that WRF has better performances in reproducing the observed rainfall in terms of the daily probability distribution, monthly evolution and duration of rainfall events, demonstrating the ability of WRF in simulating CREs. Thus, the triple-nested WRF is applied to project the future changes of CREs under the middle-of-the-road and fossil-fueled development scenarios. It is indicated that light and moderate rainfall and the duration of continuous rainfall spells will decrease in the TGR, leading to a decrease in the frequency of CREs. Meanwhile, the duration, rainfall amount, and intensity of CREs is projected to regional increase in the central-west TGR. These results are inconsistent with the raw projection of MIROC6. Observational diagnosis implies that CREs are mainly contributed by the vertical moisture advection. Such a synoptic contribution is captured well by WRF, which is not the case in MIROC6,indicating larger uncertainties in the CREs projected by MIROC6.
基金supported by the Youth Doctoral Foundation of Gansu Education Committee under Grant No.2022QB-176.
文摘Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
基金supported by Guangdong Provincial Basic and Applied Basic Research Fund,No.2021A1515011299(to KT)。
文摘Glutamatergic projection neurons generate sophisticated excitatory circuits to integrate and transmit information among different cortical areas,and between the neocortex and other regions of the brain and spinal cord.Appropriate development of cortical projection neurons is regulated by certain essential events such as neural fate determination,proliferation,specification,differentiation,migration,survival,axonogenesis,and synaptogenesis.These processes are precisely regulated in a tempo-spatial manner by intrinsic factors,extrinsic signals,and neural activities.The generation of correct subtypes and precise connections of projection neurons is imperative not only to support the basic cortical functions(such as sensory information integration,motor coordination,and cognition)but also to prevent the onset and progression of neurodevelopmental disorders(such as intellectual disability,autism spectrum disorders,anxiety,and depression).This review mainly focuses on the recent progress of transcriptional regulations on the development and diversity of neocortical projection neurons and the clinical relevance of the failure of transcriptional modulations.
基金supported by the National Key R&D Program of China(No.2022YFF0800601)National Scientific Foundation of China(Nos.41930103 and 41774047).
文摘In this study,the vertical components of broadband teleseismic P wave data recorded by China Earthquake Network are used to image the rupture processes of the February 6th,2023 Turkish earthquake doublet via back projection analysis.Data in two frequency bands(0.5-2 Hz and 1-3 Hz)are used in the imaging processes.The results show that the rupture of the first event extends about 200 km to the northeast and about 150 km to the southwest,lasting~90 s in total.The southwestern rupture is triggered by the northeastern rupture,demonstrating a sequential bidirectional unilateral rupture pattern.The rupture of the second event extends approximately 80 km in both northeast and west directions,lasting~35 s in total and demonstrates a typical bilateral rupture feature.The cascading ruptures on both sides also reflect the occurrence of selective rupture behaviors on bifurcated faults.In addition,we observe super-shear ruptures on certain fault sections with relatively straight fault structures and sparse aftershocks.
基金the Nord Forsk-funded Nordic Centre of Excellence project (Award 766654) Arctic Climate Predictions: Pathways to Resilient,Sustainable Societies (ARCPATH)National Science Foundation Award 212786 Synthesizing Historical Sea-Ice Records to Constrain and Understand Great Sea-Ice Anomalies (ICEHIST) PI Martin MILES,Co-PI Astrid OGILVIE+12 种基金American-Scandinavian Foundation Award Whales and Ice: Marine-mammal subsistence use in times of famine in Iceland ca.A.D.1600–1900 (ICEWHALE),PI Astrid OGILVIESocial Sciences and Humanities Research Council of Canada Award 435-2018-0194 Northern Knowledge for Resilience,Sustainable Environments and Adaptation in Coastal Communities (NORSEACC),PI Leslie KING,Co-PI,Astrid OGILVIEToward Just,Ethical and Sustainable Arctic Economies,Environments and Societies (JUSTNORTH).EU H2020 (https://www.svs.is/en/ projects/ongoing-projects/justnorth-2020-2023)INTO THE OCEANIC by Elizabeth OGILVIE and Robert PAGE (https://www.intotheo ceanic.org/introduction)Proxy Assimilation for Reconstructing Climate and Improving Model (PARCIM) funded by the Bjerknes Centre for Climate Research,led by Fran?ois COUNILLON,PI Noel KEENLYSIDEAccelerated Arctic and Tibetan Plateau Warming: Processes and Combined Impact on Eurasian Climate (COMBINED),Research Council of Norway (Grant No.328935),Led by Noel KEENLYSIDEArven etter Nansen programme (the Nansen Legacy Project),Research Council of Norway (Grant No.276730),PI Noel KEENLYSIDEBjerknes Climate Prediction Unit,funded by Trond Mohn Foundation (Grant BFS2018TMT01) Centre for Research-based Innovation Climate Futures,Research Council of Norway (Grant No.309562),PIs Noel KEENLYSIDE,Francois COUNILLONDeveloping and Advancing Seasonal Predictability of Arctic Sea Ice (4ICE),Research Council of Norway (Grant No.254765),PI Francois COUNILLONTropical and South Atlantic Climate-Based Marine Ecosystem Prediction for Sustainable Management (TRIATLAS) European Union Horizon 2020 (Grant No.817578),led by Noel KEENLYSIDE,PI Fran?ois COUNILLONImpetus4Change,European Union Horizon Europe (Grant No.101081555),PIs Noel KEENLYSIDE,Fran?ois COUNILLONLaboratory for Climate Predictability,Russian Megagrant funded by Ministry of Science and Higher Education of the Russian Federation (Agreement No.075-15-2021-577),led by Noel KEENLYSIDE,PI Segey GULEVRapid Arctic Environmental Changes: Implications for Well-Being,Resilience and Evolution of Arctic Communities (RACE),Belmont Forum (RCN Grant No.312017),PIs Sergey GULEV and Noel KEENLYSIDE。
文摘This paper celebrates Professor Yongqi GAO's significant achievement in the field of interdisciplinary studies within the context of his final research project Arctic Climate Predictions: Pathways to Resilient Sustainable Societies-ARCPATH(https://www.svs.is/en/projects/finished-projects/arcpath). The disciplines represented in the project are related to climatology, anthropology, marine biology, economics, and the broad spectrum of social-ecological studies. Team members were drawn from the Nordic countries, Russia, China, the United States, and Canada. The project was transdisciplinary as well as interdisciplinary as it included collaboration with local knowledge holders. ARCPATH made significant contributions to Arctic research through an improved understanding of the mechanisms that drive climate variability in the Arctic. In tandem with this research, a combination of historical investigations and social, economic, and marine biological fieldwork was carried out for the project study areas of Iceland, Greenland, Norway, and the surrounding seas, with a focus on the joint use of ocean and sea-ice data as well as social-ecological drivers. ARCPATH was able to provide an improved framework for predicting the near-term variation of Arctic climate on spatial scales relevant to society, as well as evaluating possible related changes in socioeconomic realms. In summary, through the integration of information from several different disciplines and research approaches, ARCPATH served to create new and valuable knowledge on crucial issues, thus providing new pathways to action for Arctic communities.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported by the National Key R&D Program of China(Grant Nos.2022YFA1603300 and 2022YFA1603200)the Science Challenge Project(Grant No.TZ2018005)in China+1 种基金the National Natural Science Foundation of China(Grant Nos.11805188 and 12175209)the Laser Fusion Research Center Funds for Young Talents(Grant No.RCFPD6-2022-1).
文摘We present an application of short-pulse laser-generated hard x rays for the diagnosis of indirectly driven double shell targets. Coneinserted double shell targets were imploded through an indirect drive approach on the upgraded SG-II laser facility. Then, based on thepoint-projection hard x-ray radiography technique, time-resolved radiography of the double shell targets, including that of their near-peakcompression, were obtained. The backlighter source was created by the interactions of a high-intensity short pulsed laser with a metalmicrowire target. Images of the target near peak compression were obtained with an Au microwire. In addition, radiation hydrodynamicsimulations were performed, and the target evolution obtained agrees well with the experimental results. Using the radiographic images, arealdensities of the targets were evaluated.
基金supported by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(No.JZNY202114)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX210734).
文摘Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.
基金supported by the National Natural Science Foundation of China(62176218,62176027)the Fundamental Research Funds for the Central Universities(XDJK2020TY003)the Funds for Chongqing Talent Plan(cstc2024ycjh-bgzxm0082)。
文摘The Nesterov accelerated dynamical approach serves as an essential tool for addressing convex optimization problems with accelerated convergence rates.Most previous studies in this field have primarily concentrated on unconstrained smooth con-vex optimization problems.In this paper,on the basis of primal-dual dynamical approach,Nesterov accelerated dynamical approach,projection operator and directional gradient,we present two accelerated primal-dual projection neurodynamic approaches with time scaling to address convex optimization problems with smooth and nonsmooth objective functions subject to linear and set constraints,which consist of a second-order ODE(ordinary differential equation)or differential conclusion system for the primal variables and a first-order ODE for the dual vari-ables.By satisfying specific conditions for time scaling,we demonstrate that the proposed approaches have a faster conver-gence rate.This only requires assuming convexity of the objective function.We validate the effectiveness of our proposed two accel-erated primal-dual projection neurodynamic approaches through numerical experiments.
基金This work is supported by the National Key Research and Development Program(2022YFB2702300)National Natural Science Foundation of China(Grant No.62172115)+2 种基金Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education under Grant Number No.1331005Guangdong Higher Education Innovation Group 2020KCXTD007Guangzhou Fundamental Research Plan of Municipal-School Jointly Funded Projects(No.202102010445).
文摘In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.
文摘Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.
基金This work was financially supported by the National Key Research and Development Program of China(2022YFB3103200).
文摘With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.