期刊文献+
共找到105,520篇文章
< 1 2 250 >
每页显示 20 50 100
分组密码算法uBlock积分攻击的改进
1
作者 王晨 崔佳敏 +1 位作者 李木舟 王美琴 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第5期2149-2158,共10页
积分攻击是由Daemen等人(doi:10.1007/BFb0052343)于1997年提出的一种密码分析方法,是继差分分析和线性分析之后最有效的密码分析方法之一。作为2018年全国密码算法设计竞赛分组算法的获胜算法,uB-lock抵抗积分攻击的能力受到较多的关... 积分攻击是由Daemen等人(doi:10.1007/BFb0052343)于1997年提出的一种密码分析方法,是继差分分析和线性分析之后最有效的密码分析方法之一。作为2018年全国密码算法设计竞赛分组算法的获胜算法,uB-lock抵抗积分攻击的能力受到较多的关注。为了重新评估uBlock家族密码算法抵抗积分攻击的安全性,该文利用单项式传播技术,结合混合整数线性规划(MILP)工具搜索积分区分器,并利用部分和技术进行密钥恢复攻击。对于uBlock-128/128和uBlock-128/256,基于搜索到的9轮积分区分器分别进行了首个11轮和12轮攻击,数据复杂度为2~(127)选择明文,时间复杂度分别为2~(127.06)和2~(224)次加密,存储复杂度分别为2~(44.58)和2~(138)字节;对于uBlock-256/256,基于搜索到的10轮积分区分器进行了首个12轮攻击,数据复杂度为2~(253)选择明文,时间复杂度为2~(253.06)次加密,存储复杂度为2~(44.46)字节。与之前uBlock的最优积分攻击结果相比,uBlock-128/128和uBlock-256/256的攻击轮数分别提高2轮,uBlock-128/256的攻击轮数提高3轮。本文的攻击说明,uBlock针对积分攻击依然有足够的安全冗余。 展开更多
关键词 密码分析 分组密码 ublock 积分攻击
下载PDF
Twin-block在骨性Ⅱ类错[牙合]下颌后缩患儿中的应用
2
作者 陈菁菁 王密 +2 位作者 刘芳 乔柱 赵虎 《中国美容医学》 CAS 2024年第9期53-57,共5页
目的:探讨Twin-block在骨性Ⅱ类错[牙合]下颌后缩患儿中的应用效果。方法:选取2019年1月-2021年1月笔者医院接收的84例骨性Ⅱ类错[牙合]下颌后缩患儿设置为研究对象,按随机抽签法分为对照组、研究组,各42例,对照组采用直丝弓矫治器,研... 目的:探讨Twin-block在骨性Ⅱ类错[牙合]下颌后缩患儿中的应用效果。方法:选取2019年1月-2021年1月笔者医院接收的84例骨性Ⅱ类错[牙合]下颌后缩患儿设置为研究对象,按随机抽签法分为对照组、研究组,各42例,对照组采用直丝弓矫治器,研究组采用Twin-block矫治器。比较两组治疗前后咀嚼功能、牙齿咬合力、下颌骨变化、软组织面型变化、上气道矢状径,并统计家属治疗满意度。结果:治疗后,研究组咀嚼功能、牙齿咬合力、下颌骨变化指标、软组织面型变化指标均优于对照组(P<0.05);治疗后,研究组上气道矢状径高于对照组(P<0.05);研究组家属治疗满意度(95.24%)明显高于对照组(73.81%)(P<0.05)。结论:Twin-block应用于骨性Ⅱ类错[牙合]下颌后缩患儿治疗中,能改善咀嚼功能,增强牙齿咬合力,促进下颌骨生长,提高面型美观度,扩大上气道矢状径,利于改善呼吸功能,获得家属对治疗效果的高度评价。 展开更多
关键词 TWIN-block 直丝弓矫治器 骨性Ⅱ类错[牙合] 下颌后缩 软组织面型变化 上气道矢状径
下载PDF
Twin-Block双期矫治与单纯直丝弓矫正技术在早期下颌后缩矫正患儿中的疗效对比
3
作者 田华 邓刚 郝天喜 《中国医疗美容》 2024年第1期66-70,共5页
目的探讨Twin-Block双期矫治与单纯直丝弓矫正技术在替牙及恒牙早期错(牙合)畸形矫正患儿中的疗效对比。方法选取我院2020年9月到2023年9月收治的60例恒牙早期错(牙合)畸形患儿作为研究对象,按照治疗方法不同分为观察组与对照组,各组均... 目的探讨Twin-Block双期矫治与单纯直丝弓矫正技术在替牙及恒牙早期错(牙合)畸形矫正患儿中的疗效对比。方法选取我院2020年9月到2023年9月收治的60例恒牙早期错(牙合)畸形患儿作为研究对象,按照治疗方法不同分为观察组与对照组,各组均为30例。所有患儿均采取矫正治疗,对照组患儿采取直丝弓矫正技术进行治疗,观察组患儿采取Twin-Block矫治器及直丝弓矫治技术进行双期治疗。对比两组患儿临床疗效,及矫治时间,治疗前头影测量及关节改建情况,采用口腔锥形束扫描成像进行检测两组患儿关节窝宽径、关节前间隙、关节后间隙、关节上间隙、髁突前后径、髁突高度相关参数表达水平,最后对比两组患儿治疗前后上下齿槽座(ANB)角、下齿槽座(SNB)角、上齿槽座(SNA)角、下颌平面角(Mp-SN)、下颌综合长度(Ar-Po)、下颌升支高度(Ar-Go)、下颌体长(Go-Gn)、上中切牙-SN平面角(U1-SN)、下中切牙-下颌平面角(L1-Mp)、上唇审美平面距(Ls-E)、下唇审美平面距(Li-E)、鼻唇角。结果观察组治疗总有效率96.67%明显高于对照组76.67%(P<0.05);治疗后,观察组矫治时间长于对照组(P<0.05);治疗前,两组患儿关节窝宽径、关节前间隙、关节后间隙、关节上间隙、髁突前后径、髁突高度对比无明显差异(P>0.05),治疗后,两组患儿关节窝宽径对比无明显差异,关节前间隙减小,观察组(1.21±0.28)mm高于对照组,关节后间隙、关节上间隙、髁突前后径、髁突高度均增加,且观察组高于对照组(P<0.05);治疗前,两组患儿ANB角、SNB角、SNA角、Mp-SN、Ar-Po、Ar-Go、Go-Gn、U1-SN、L1-Mp、Ls-E、Li-E、鼻唇角对比无明显差异(P>0.05),治疗后,两组患儿SNB、Mp-SN、Ar-Po、Ar-Go、Go-Gn、鼻唇角均增大,ANB、U1-SN、L1-Mp、Li-E、Ls-E减小,且观察组变化大于对照组(P<0.05)。结论Twin-Block矫治器配合直丝弓矫治技术双期矫治器与单纯直丝弓矫正技术相比治疗替牙及恒牙早期错(牙合)畸形疗效显著,可作为儿童恒牙早期错(牙合)畸形的首选治疗方案。 展开更多
关键词 TWIN-block矫治器 直丝弓矫正 恒牙早期 错(牙合)畸形 咀嚼功能
下载PDF
基于Group-Res2Block的智能合成语音说话人确认方法
4
作者 李菲 苏兆品 +2 位作者 王年松 杨波 张国富 《应用科学学报》 CAS CSCD 北大核心 2024年第4期709-722,共14页
针对现有说话人确认任务基于自然语音条件下并不适用于智能合成语音的问题,提出一种基于Group-Res2Block的智能合成语音说话人确认方法。首先,设计了Group-Res2Block结构,在Res2Block的基础上将当前分组与相邻前后分组进行合并形成新的... 针对现有说话人确认任务基于自然语音条件下并不适用于智能合成语音的问题,提出一种基于Group-Res2Block的智能合成语音说话人确认方法。首先,设计了Group-Res2Block结构,在Res2Block的基础上将当前分组与相邻前后分组进行合并形成新的分组,以增强说话人局部特征的上下文联系;其次,设计了并行结构的多尺度通道注意力特征融合机制,利用不同大小卷积核实现同一层级的特征在通道维度的特征选择,以获取更具表现力的说话人特征,避免信息冗余;最后,设计了串行结构的多尺度层注意力特征融合机制,构建层结构,将深浅层特征整体进行融合并赋予不同权重,以获取最优的特征表达。为验证所提出特征提取网络的有效性,构建了中英文两种智能合成语音数据集进行消融实验和对比实验。结果表明本文方法在该任务的评价指标精确度(accuracy,ACC)、等错误率(equal error rate,EER)和最小检测代价函数(minimum detection cost function,minDCF)上是最优的。此外,通过对模型泛化性能进行测试,验证了本文方法对未知智能语音算法的适用性。 展开更多
关键词 说话人确认 智能合成语音 Group-Res2block深度神经网络 多尺度特征 注意力机制
下载PDF
Investigation of the block toppling evolution of a layered model slope by centrifuge test and discrete element modeling 被引量:1
5
作者 Leilei Jin Hongkai Dong +3 位作者 Fei Ye Yufeng Wei Jianfeng Liu Changkui Wang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第1期112-122,共11页
Primary toppling usually occurs in layered rock slopes with large anti-dip angles.In this paper,the block toppling evolution was explored using a large-scale centrifuge system.Each block column in the layered model sl... Primary toppling usually occurs in layered rock slopes with large anti-dip angles.In this paper,the block toppling evolution was explored using a large-scale centrifuge system.Each block column in the layered model slope was made of cement mortar.Some artificial cracks perpendicular to the block column were prefabricated.Strain gages,displacement gages,and high-speed camera measurements were employed to monitor the deformation and failure processes of the model slope.The centrifuge test results show that the block toppling evolution can be divided into seven stages,i.e.layer compression,formation of major tensile crack,reverse bending of the block column,closure of major tensile crack,strong bending of the block column,formation of failure zone,and complete failure.Block toppling is characterized by sudden large deformation and occurs in stages.The wedge-shaped cracks in the model incline towards the slope.Experimental observations show that block toppling is mainly caused by bending failure rather than by shear failure.The tensile strength also plays a key factor in the evolution of block toppling.The simulation results from discrete element method(DEM)is in line with the testing results.Tensile stress exists at the backside of rock column during toppling deformation.Stress concentration results in the fragmented rock column and its degree is the most significant at the slope toe. 展开更多
关键词 block toppling CENTRIFUGE Anti-dip slope Failure mechanism Discrete element method
下载PDF
Greatly enhanced corrosion/wear resistances of epoxy coating for Mg alloy through a synergistic effect between functionalized graphene and insulated blocking layer 被引量:1
6
作者 Z.Y.Xue X.J.Li +3 位作者 J.H.Chu M.M.Li D.N.Zou L.B.Tong 《Journal of Magnesium and Alloys》 SCIE EI CAS CSCD 2024年第1期332-344,共13页
The poor corrosion and wear resistances of Mg alloys seriously limit their potential applications in various industries.The conventional epoxy coating easily forms many intrinsic defects during the solidification proc... The poor corrosion and wear resistances of Mg alloys seriously limit their potential applications in various industries.The conventional epoxy coating easily forms many intrinsic defects during the solidification process,which cannot provide sufficient protection.In the current study,we design a double-layer epoxy composite coating on Mg alloy with enhanced anti-corrosion/wear properties,via the spin-assisted assembly technique.The outer layer is functionalized graphene(FG)in waterborne epoxy resin(WEP)and the inner layer is Ce-based conversion(Ce)film.The FG sheets can be homogeneously dispersed within the epoxy matrix to fill the intrinsic defects and improve the barrier capability.The Ce film connects the outer layer with the substrate,showing the transition effect.The corrosion rate of Ce/WEP/FG composite coating is 2131 times lower than that of bare Mg alloy,and the wear rate is decreased by~90%.The improved corrosion resistance is attributed to the labyrinth effect(hindering the penetration of corrosive medium)and the obstruction of galvanic coupling behavior.The synergistic effect derived from the FG sheet and blocking layer exhibits great potential in realizing the improvement of multi-functional integration,which will open up a new avenue for the development of novel composite protection coatings of Mg alloys. 展开更多
关键词 Mg alloy Functionalized graphene Epoxy coating Corrosion/wear resistance blocking layer
下载PDF
Novel approach of ultrasound-guided lateral recess block for a patient with lateral recess stenosis: A case report 被引量:1
7
作者 Jiao Yang Xin-Ling Li Qing-Bing Li 《World Journal of Clinical Cases》 SCIE 2024年第5期1010-1017,共8页
BACKGROUND Ultrasound guide technology,which can provide real-time visualization of the needle tip and tissues and avoid many adverse events,is widely used in mini-mally invasive therapy.However,the studies on ultraso... BACKGROUND Ultrasound guide technology,which can provide real-time visualization of the needle tip and tissues and avoid many adverse events,is widely used in mini-mally invasive therapy.However,the studies on ultrasound-guided Lateral recess block(LRB)are limited,this is probably because there is no recognized standard method for ultrasound scanning.This study aimed to evaluate the effect of ultrasound-guided LRB in patients with lateral recess stenosis(LRS).CASE SUMMARY A 65-year-old patient complained of low back pain accompanied occasionally by pain and numbness in the left lower limb.Physical examination showed ten-derness on the spinous process and paraspinal muscles from L1 to S1,extensor hallucis longus and tibialis anterior weakness(muscle strength:4-),and a positive straight leg raising test in the left lower limb(60°).Magnetic resonance imaging showed L4–L5 disc degeneration with left LRS and nerve root entrapment.Subsequently,the patient was diagnosed with LRS.This patient was treated with a novel ultrasound-guided LRB approach.The patient’s symptoms significantly improved without any complications at 1 wk postoperatively and at the 3-month follow-up.CONCLUSION This is the first report on the LRS treatment with ultrasound-guided LRB from the contralateral spinous process along the inner side of the articular process by out-plane technique.Further studies are expected to investigate the efficacy and safety of ultrasound-guided LRB for patients with LRS. 展开更多
关键词 Lateral recess stenosis ULTRASOUND Lateral recess block Real-time visualization Low back pain Case report
下载PDF
Species’ geographical range, environmental range and traits lead to specimen collection preference of dominant plant species of grasslands in Northern China
8
作者 Jingya Zhang Cui Xiao +5 位作者 Xiaoyu Duan Xin Gao Hao Zeng Rong'an Dong Gang Feng Keping Ma 《Plant Diversity》 SCIE CAS CSCD 2024年第3期353-361,共9页
Many different factors,such as species traits,socio-economic factors,geographical and environmental factors,can lead to specimen collection preference.This study aims to determine whether grassland specimen collection... Many different factors,such as species traits,socio-economic factors,geographical and environmental factors,can lead to specimen collection preference.This study aims to determine whether grassland specimen collection in China is preferred by species traits(i.e.,plant height,flowering and fruiting period),environmental range(i.e.,the temperature and precipitation range)and geographical range(i.e.,distribution range and altitudinal range).Ordinary least squares models and phylogenetic generalized linear mixed models were used to analyze the relationships between specimen number and the explanatory variables.Random Forest models were then used to find the most parsimonious multivariate model.The results showed that interannual variation in specimen number between 1900 and 2020 was considerable.Specimen number of these species in southeast China was notably lower than that in northwest China.Environmental range and geographical range of species had significant positive correlations with specimen number.In addition,there were relatively weak but significant associations between specimen number and species trait(i.e.,plant height and flowering and fruiting period).Random Forest models indicated that distribution range was the most important variable,followed by flowering and fruiting period,and altitudinal range.These findings suggest that future floristic surveys should pay more attention to species with small geographical range,narrow environmental range,short plant height,and short flowering and fruiting period.The correction of specimen collection preference will also make the results of species distribution model,species evolution and other works based on specimen data more accurate. 展开更多
关键词 Biological specimen Collection preference Dominant plant species Environmental range Geographical range Species traits
下载PDF
THE STABLE RECONSTRUCTION OF STRONGLY-DECAYING BLOCK SPARSE SIGNALS
9
作者 Yifang YANG Jinping WANG 《Acta Mathematica Scientia》 SCIE CSCD 2024年第5期1787-1800,共14页
In this paper,we reconstruct strongly-decaying block sparse signals by the block generalized orthogonal matching pursuit(BgOMP)algorithm in the l2-bounded noise case.Under some restraints on the minimum magnitude of t... In this paper,we reconstruct strongly-decaying block sparse signals by the block generalized orthogonal matching pursuit(BgOMP)algorithm in the l2-bounded noise case.Under some restraints on the minimum magnitude of the nonzero elements of the strongly-decaying block sparse signal,if the sensing matrix satisfies the the block restricted isometry property(block-RIP),then arbitrary strongly-decaying block sparse signals can be accurately and steadily reconstructed by the BgOMP algorithm in iterations.Furthermore,we conjecture that this condition is sharp. 展开更多
关键词 compressed sensing strongly-decaying block sparse signal block generalized OMP block-RIP
下载PDF
Misinterpretation of sleep-induced second-degree atrioventricular block
10
作者 S Serge Barold 《World Journal of Cardiology》 2024年第7期385-388,共4页
A number of publications have claimed that Mobitz type Ⅱ atrioventricular block(AVB)may occur during sleep.None of the reports defined type Ⅱ AVB and representative electrocardiograms were either misinterpreted or m... A number of publications have claimed that Mobitz type Ⅱ atrioventricular block(AVB)may occur during sleep.None of the reports defined type Ⅱ AVB and representative electrocardiograms were either misinterpreted or missing.Relatively benign Wenckebach type Ⅰ AVB is often misdiagnosed as Mobitz type Ⅱ which is an indication for a pacemaker.Review of the published reports indicates that Mobitz type II AVB does not occur during sleep when it is absent in the awake state.Conclusion:There is no proof that sleep is associated with Mobitz type Ⅱ AVB. 展开更多
关键词 Wenckebach type I atrioventricular block Mobitz typeⅡatrioventricular block Vagal tone Heart block Cardiac pacemaker
下载PDF
A nanobody-based blocking enzyme-linked immunosorbent assay for detecting antibodies against pseudorabies virus glycoprotein E
11
作者 Huanhuan Lü Pinpin Ji +6 位作者 Siyu Liu Ziwei Zhang Lei Wang Yani Sun Baoyuan Liu Lizhen Wang Qin Zhao 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第4期1354-1368,共15页
Pseudorabies(PR)is an acute infectious disease of pigs caused by the PR virus(PRV)and results in great economic losses to the pig industry worldwide.PRV glycoprotein E(gE)-based enzyme-linked immunosorbent assay(ELISA... Pseudorabies(PR)is an acute infectious disease of pigs caused by the PR virus(PRV)and results in great economic losses to the pig industry worldwide.PRV glycoprotein E(gE)-based enzyme-linked immunosorbent assay(ELISA)has been used to distinguish gE-deleted vaccine-immunized pigs from wild-type virus-infected pigs to eradicate PR in some countries.Nanobody has the advantages of small size and easy genetic engineering and has been a promising diagnostic reagent.However,there were few reports about developing nanobody-based ELISA for detecting anti-PRV-gE antibodies.In the present study,the recombinant PRV-gE was expressed with a bacterial system and used to immunize the Bactrian camel.Then,two nanobodies against PRV-gE were screened from the immunized camel by phage display technique.Subsequently,two nanobody-HRP fusion proteins were expressed with HEK293T cells.The PRV-gE-Nb36-HRP fusion protein was selected as the probe for developing the blocking ELISA(bELISA)to detect anti-PRV-gE antibodies.Through optimizing the conditions of bELISA,the amount of coated antigen was 200 ng per well,and dilutions of the fusion protein and tested pig sera were separately 1:320 and 1:5.The cut-off value of bELISA was 24.20%,and the sensitivity and specificity were 96.43 and 92.63%,respectively.By detecting 233 clinical pig sera with the developed bELISA and a commercial kit,the results showed that the coincidence rate of two assays was 93.99%.Additionallly,epitope mapping showed that PRV-gE-Nb36 recognized a conserved conformational epitope in different reference PRV strains.Simple,great stability and low-cost nanobody-based bELISA for detecting anti-PRV-gE antibodies were developed.The bELISA could be used for monitoring and eradicating PR. 展开更多
关键词 NANOBODY nanobody-HRP blocking ELISA PRV-gE ANTIBODY
下载PDF
Ultrasound-guided sphenopalatine ganglion block for effective analgesia during awake fiberoptic nasotracheal intubation: A case report
12
作者 Hangil Kang Seongjae Park Yehun Jin 《World Journal of Clinical Cases》 SCIE 2024年第14期2451-2456,共6页
BACKGROUND Awake fiberoptic nasotracheal intubation(AFNI)is the preferred airway ma-nagement strategy for patients with difficult airways.However,this procedure can cause significant physical and psychological distres... BACKGROUND Awake fiberoptic nasotracheal intubation(AFNI)is the preferred airway ma-nagement strategy for patients with difficult airways.However,this procedure can cause significant physical and psychological distress.This case report explores the application of a sphenopalatine ganglion(SPG)block as an alternative anal-gesic modality to mitigate the discomfort associated with AFNI.CASE SUMMARY A 63-year-old female with a history of right maxillary osteosarcoma underwent craniotomy for a suspected malignant brain lesion.The patient’s medical history included prior surgery,chemotherapy,and radiation therapy,resulting in signi-ficant jaw impairment and limited neck mobility.Considering the anticipated air-way challenges,AFNI was planned.A SPG block was performed under real-time ultrasound guidance,providing effective analgesia during nasotracheal intuba-tion.CONCLUSION The SPG block represents a promising analgesic approach in AFNI,offering po-tential benefits in alleviating pain involving the nasal and nasopharyngeal regions as well as improving patient cooperation. 展开更多
关键词 Sphenopalatine ganglion block Nerve block Regional anesthesia ANALGESIA Awake fiberoptic nasotracheal intubation Case report
下载PDF
Extraction of Acoustic Normal Mode Depth Functions Using Range-Difference Method with Vertical Linear Array Data
13
作者 GAO Siyu LI Weilu +2 位作者 ZHANG Yinquan LI Xiaolei WANG Ning 《Journal of Ocean University of China》 SCIE CAS CSCD 2024年第4期871-882,共12页
Data-derived normal mode extraction is an effective method for extracting normal mode depth functions in the absence of marine environmental data.However,when the corresponding singular vectors become nonunique when t... Data-derived normal mode extraction is an effective method for extracting normal mode depth functions in the absence of marine environmental data.However,when the corresponding singular vectors become nonunique when two or more singular values obtained from the cross-spectral density matrix diagonalization are nearly equal,this results in unsatisfactory extraction outcomes for the normal mode depth functions.To address this issue,we introduced in this paper a range-difference singular value decomposition method for the extraction of normal mode depth functions.We performed the mode extraction by conducting singular value decomposition on the individual frequency components of the signal's cross-spectral density matrix.This was achieved by using pressure and its range-difference matrices constructed from vertical line array data.The proposed method was validated using simulated data.In addition,modes were successfully extracted from ambient noise. 展开更多
关键词 range difference depth function extraction normal mode
下载PDF
General Method of Combining Grover and Simon for Attacking Block Ciphers
14
作者 Fu Xiangqun Bao Wansu +1 位作者 Shi Jianhong Li Tan 《China Communications》 SCIE CSCD 2024年第6期237-245,共9页
The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions o... The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or assumptions.First,we give two preconditions of applying Grover’s algorithm,which ensure that the success probability of finding the marked element is close to 1.Then,based on these two preconditions,it is found out that the success probability of the quantum algorithm for FXconstruction is far less than 1.Furthermore,we give the design method of the Oracle function,and then present the general method of combining Grover and Simon algorithm for attacking block ciphers,with success probability close to 1. 展开更多
关键词 block ciphers post-quantum crypto quantum algorithms
下载PDF
Quantum block coherence with respect to projective measurements
15
作者 王璞 李忠艳 孟会贤 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期213-220,共8页
Quantum coherence serves as a defining characteristic of quantum mechanics,finding extensive applications in quantum computing and quantum communication processing.This study explores quantum block coherence in the co... Quantum coherence serves as a defining characteristic of quantum mechanics,finding extensive applications in quantum computing and quantum communication processing.This study explores quantum block coherence in the context of projective measurements,focusing on the quantification of such coherence.Firstly,we define the correlation function between the two general projective measurements P and Q,and analyze the connection between sets of block incoherent states related to two compatible projective measurements P and Q.Secondly,we discuss the measure of quantum block coherence with respect to projective measurements.Based on a given measure of quantum block coherence,we characterize the existence of maximal block coherent states through projective measurements.This research integrates the compatibility of projective measurements with the framework of quantum block coherence,contributing to the advancement of block coherence measurement theory. 展开更多
关键词 quantum coherence compatibility projective measurement quantum block coherence
下载PDF
An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain
16
作者 Qianqi Sun Fenhua Bai 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1733-1754,共22页
Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened com... Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%. 展开更多
关键词 blockchain network coding block compression transmission optimization
下载PDF
Influence of network structure on spreading dynamics via tie range
17
作者 李敏 宋玉蓉 +3 位作者 宋波 李汝琦 蒋国平 张晖 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期606-613,共8页
There are various phenomena of malicious information spreading in the real society, which cause many negative impacts on the society. In order to better control the spreading, it is crucial to reveal the influence of ... There are various phenomena of malicious information spreading in the real society, which cause many negative impacts on the society. In order to better control the spreading, it is crucial to reveal the influence of network structure on network spreading. Motifs, as fundamental structures within a network, play a significant role in spreading. Therefore, it is of interest to investigate the influence of the structural characteristics of basic network motifs on spreading dynamics.Considering the edges of the basic network motifs in an undirected network correspond to different tie ranges, two edge removal strategies are proposed, short ties priority removal strategy and long ties priority removal strategy. The tie range represents the second shortest path length between two connected nodes. The study focuses on analyzing how the proposed strategies impact network spreading and network structure, as well as examining the influence of network structure on network spreading. Our findings indicate that the long ties priority removal strategy is most effective in controlling network spreading, especially in terms of spread range and spread velocity. In terms of network structure, the clustering coefficient and the diameter of network also have an effect on the network spreading, and the triangular structure as an important motif structure effectively inhibits the spreading. 展开更多
关键词 network spreading network motifs tie range edge removal strategy
下载PDF
Geochemistry, zircon U–Pb geochronology, and Hf isotopes of S-type granite in the Baoshan block, constraints on the age and evolution of the Proto-Tethys
18
作者 Jianjun Zhang Chuanlong Mou +3 位作者 Chendong Liu Yong Zhang Ting Chen Hualiang Li 《Acta Geochimica》 EI CAS CSCD 2024年第1期40-58,共19页
Geochemistry, zircon U–Pb geochronology, and Hf isotope data for the Early Paleozoic granites in the Baoshan Block reveal the Early Paleozoic tectonic evolution of the Proto-Tethys. The samples are high-K, calcalkali... Geochemistry, zircon U–Pb geochronology, and Hf isotope data for the Early Paleozoic granites in the Baoshan Block reveal the Early Paleozoic tectonic evolution of the Proto-Tethys. The samples are high-K, calcalkaline, strongly peraluminous rocks with A/CNK values of 1.37–1.46, are enriched in SiO2, K2O, and Rb, and are depleted in Nb, P, Ti, Eu, and heavy rare earth elements,which indicates the crystallization fractionation of the granitic magma. Zircon U–Pb dating indicates that they formed in ca. 480 Ma. The Nansa granites have εHf(t) values ranging from-16.04 to 4.36 with corresponding TC DMages of 2.10–0.81 Ga, which suggests the magmas derived from the partial melting of ancient metasedimentary with minor involvement of mantle-derived components. A synthesis of data for the Early Paleozoic igneous rocks in the Baoshan block and adjacent(Tengchong,Qiangtang, Sibumasu, Himalaya, etc.) blocks indicates that these blocks were all aligned along the proto-Tethyan margin of East Gondwana in the Early Paleozoic. The Early Paleozoic S-type granites from Nansa were generated in a high-temperature and low-pressure(HTLP) extensional tectonic setting, which resulted from Andean-type orogeny instead of the final assembly of Gondwana or crustal extension in a non-arc environment. In certain places, an expanding environment may exist in opposition to the tectonic backdrop of the lithosphere’s thickening and shortening, leading the crust to melt and decompress,mantle-derived materials to mix, and a small quantity of peraluminous granite to emerge. 展开更多
关键词 Baoshan block Early Paleozoic GRANITE GEOCHEMISTRY ZIRCON GEOCHRONOLOGY Hf isotope
下载PDF
Manipulation of internal blockage in triangular triple quantum dot
19
作者 齐月 魏建华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期588-593,共6页
We utilize the calculation of hierarchical equations of motion to demonstrate that the spin-dependent properties between adjacent quantum dots(QDs)can be changed by breaking the internal symmetry configuration,corresp... We utilize the calculation of hierarchical equations of motion to demonstrate that the spin-dependent properties between adjacent quantum dots(QDs)can be changed by breaking the internal symmetry configuration,corresponding to the inversion of dominant chiral states.In the linear triple quantum dots(LTQDs)connected to two electron reservoirs,we can observe that the blockage appears at the triangle triple quantum dots(TTQDs)by gradually increasing the coupling strength between next-nearest double QDs.When the initial coupling between LTQDs has altered,the internal chiral circulation also undergoes the corresponding transform,thus achieving qualitative regulation and detection of the blocking region.We also investigate the response of the chiral circulation to the dot–lead coupling strength,indicating the overall robust chiral circulation of the TTQDs frustration. 展开更多
关键词 quantum dots chiral topology blocking
下载PDF
Image Steganography by Pixel-Value Differencing Using General Quantization Ranges
20
作者 Da-Chun Wu Zong-Nan Shih 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期353-383,共31页
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ... A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods. 展开更多
关键词 STEGANOGRAPHY pixel-value differencing multiple-based number conversion general quantization range
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部