Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat...Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.展开更多
The purpose of this study was to design and test a statistical-dynamical scheme for the extraseasonal(one season in advance) prediction of summer rainfall at 160 observation stations across China.The scheme combined...The purpose of this study was to design and test a statistical-dynamical scheme for the extraseasonal(one season in advance) prediction of summer rainfall at 160 observation stations across China.The scheme combined both valuable information from the preceding observations and dynamical information from synchronous numerical predictions of atmospheric circulation factors produced by an atmospheric general circulation model.First,the key preceding climatic signals and synchronous atmospheric circulation factors that were not only closely related to summer rainfall but also numerically predictable were identified as the potential predictors.Second,the extraseasonal prediction models of summer rainfall were constructed using a multivariate linear regression analysis for 15 subregions and then 160 stations across China.Cross-validation analyses performed for the period 1983-2008 revealed that the performance of the prediction models was not only high in terms of interannual variation,trend,and sign but also was stable during the whole period.Furthermore,the performance of the scheme was confirmed by the accuracy of the real-time prediction of summer rainfall during 2009 and 2010.展开更多
The application of deep learning is fast developing in climate prediction,in which El Ni?o–Southern Oscillation(ENSO),as the most dominant disaster-causing climate event,is a key target.Previous studies have shown th...The application of deep learning is fast developing in climate prediction,in which El Ni?o–Southern Oscillation(ENSO),as the most dominant disaster-causing climate event,is a key target.Previous studies have shown that deep learning methods possess a certain level of superiority in predicting ENSO indices.The present study develops a deep learning model for predicting the spatial pattern of sea surface temperature anomalies(SSTAs)in the equatorial Pacific by training a convolutional neural network(CNN)model with historical simulations from CMIP6 models.Compared with dynamical models,the CNN model has higher skill in predicting the SSTAs in the equatorial western-central Pacific,but not in the eastern Pacific.The CNN model can successfully capture the small-scale precursors in the initial SSTAs for the development of central Pacific ENSO to distinguish the spatial mode up to a lead time of seven months.A fusion model combining the predictions of the CNN model and the dynamical models achieves higher skill than each of them for both central and eastern Pacific ENSO.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
Earthquakes triggered by dynamic disturbances have been confirmed by numerous observations and experiments.In the past several decades,earthquake triggering has attracted increasing attention of scholars in relation t...Earthquakes triggered by dynamic disturbances have been confirmed by numerous observations and experiments.In the past several decades,earthquake triggering has attracted increasing attention of scholars in relation to exploring the mechanism of earthquake triggering,earthquake prediction,and the desire to use the mechanism of earthquake triggering to reduce,prevent,or trigger earthquakes.Natural earthquakes and large‐scale explosions are the most common sources of dynamic disturbances that trigger earthquakes.In the past several decades,some models have been developed,including static,dynamic,quasi‐static,and other models.Some reviews have been published,but explosiontriggered seismicity was not included.In recent years,some new results on earthquake triggering have emerged.Therefore,this paper presents a new review to reflect the new results and include the content of explosion‐triggered earthquakes for the reference of scholars in this area.Instead of a complete review of the relevant literature,this paper primarily focuses on the main aspects of dynamic earthquake triggering on a tectonic scale and makes some suggestions on issues that need to be resolved in this area in the future.展开更多
Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector ...Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector that transmits signals.Smooth deployment is essential for duty services;therefore,accurate and efficient dynamic modeling and analysis of the deployment process are essential.One major challenge is depicting time-varying resistance of the cable network and capturing the cable-truss coupling behavior during the deployment process.This paper proposes a general dynamic analysis methodology for cable-truss coupling.Considering the topological diversity and geometric nonlinearity,the cable network's equilibrium equation is derived,and an explicit expression of the time-varying tension of the boundary cables,which provides the main resistance in truss deployment,is obtained.The deployment dynamic model is established,which considers the coupling effect between the soft cables and deployable truss.The effects of the antenna's driving modes and parameters on the dynamic deployment performance were investigated.A scaled prototype was manufactured,and the deployment experiment was conducted to verify the accuracy of the proposed modeling method.The proposed methodology is suitable for general cable antennas with arbitrary topologies and parameters,providing theoretical guidance for the dynamic performance evaluation of antenna driving schemes.展开更多
We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the...We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.展开更多
Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do ...Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.展开更多
The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable re...The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2) reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2) into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].展开更多
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,...Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the...For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.展开更多
Dear Editor,This letter addresses the synchronization problem of a class of delayed stochastic complex dynamical networks consisting of multiple drive and response nodes.The aim is to achieve mean square exponential s...Dear Editor,This letter addresses the synchronization problem of a class of delayed stochastic complex dynamical networks consisting of multiple drive and response nodes.The aim is to achieve mean square exponential synchronization for the drive-response nodes despite the simultaneous presence of time delays and stochastic noises in node dynamics.展开更多
In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation ...In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation of target state variables in multi-layer complex dynamical networks with nonlinear node dynamics is studied.A suitable functional state observer is constructed with the limited measurement.The parameters of the designed functional observer are obtained from the algebraic method and the stability of the functional observer is proven by the Lyapunov theorem.Some necessary conditions that need to be satisfied for the design of the functional state observer are obtained.Different from previous studies, in the multi-layer complex dynamical network with nonlinear node dynamics, the proposed method can estimate the state of target variables on some layers directly instead of estimating all the individual states.Thus, it can greatly reduce the placement of observers and computational cost.Numerical simulations with the three-layer complex dynamical network composed of three-dimensional nonlinear dynamical nodes are developed to verify the effectiveness of the method.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
This paper delves into the dynamical analysis,chaos control,Mittag–Leffler boundedness(MLB),and forecasting a fractional-order financial risk(FOFR)system through an absolute function term.To this end,the FOFR system ...This paper delves into the dynamical analysis,chaos control,Mittag–Leffler boundedness(MLB),and forecasting a fractional-order financial risk(FOFR)system through an absolute function term.To this end,the FOFR system is first proposed,and the adomian decomposition method(ADM)is employed to resolve this fractional-order system.The stability of equilibrium points and the corresponding control schemes are assessed,and several classical tools such as Lyapunov exponents(LE),bifurcation diagrams,complexity analysis(CA),and 0–1 test are further extended to analyze the dynamical behaviors of FOFR.Then the global Mittag–Leffler attractive set(MLAS)and Mittag–Leffler positive invariant set(MLPIS)for the proposed financial risk(FR)system are discussed.Finally,a proficient reservoir-computing(RC)method is applied to forecast the temporal evolution of the complex dynamics for the proposed system,and some simulations are carried out to show the effectiveness and feasibility of the present scheme.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
We investigate the non-Hermitian effects on quantum diffusion in a kicked rotor model where the complex kicking potential is quasi-periodically modulated in the time domain.The synthetic space with arbitrary dimension...We investigate the non-Hermitian effects on quantum diffusion in a kicked rotor model where the complex kicking potential is quasi-periodically modulated in the time domain.The synthetic space with arbitrary dimension can be created by incorporating incommensurate frequencies in the quasi-periodical modulation.In the Hermitian case,strong kicking induces the chaotic diffusion in the four-dimension momentum space characterized by linear growth of mean energy.We find that the quantum coherence in deep non-Hermitian regime can effectively suppress the chaotic diffusion and hence result in the emergence of dynamical localization.Moreover,the extent of dynamical localization is dramatically enhanced by increasing the non-Hermitian parameter.Interestingly,the quasi-energies become complex when the non-Hermitian parameter exceeds a certain threshold value.The quantum state will finally evolve to a quasi-eigenstate for which the imaginary part of its quasi-energy is large most.The exponential localization length decreases with the increase of the non-Hermitian parameter,unveiling the underlying mechanism of the enhancement of the dynamical localization by nonHermiticity.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
基金supported by the National Science Foundation of China(Grant No.42230606)。
文摘Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.
基金provided by the Special Scientific Research Fund of Meteorological Public Welfare Profession of China(Grant No. GYHY200906018)the National Basic Research Program of China (Grant Nos. 2009CB421406 and 2010CB950304)the Knowledge Innovation Project of the Chinese Academy of Sciences (Grant No. KZCX2-YW-Q03-3)
文摘The purpose of this study was to design and test a statistical-dynamical scheme for the extraseasonal(one season in advance) prediction of summer rainfall at 160 observation stations across China.The scheme combined both valuable information from the preceding observations and dynamical information from synchronous numerical predictions of atmospheric circulation factors produced by an atmospheric general circulation model.First,the key preceding climatic signals and synchronous atmospheric circulation factors that were not only closely related to summer rainfall but also numerically predictable were identified as the potential predictors.Second,the extraseasonal prediction models of summer rainfall were constructed using a multivariate linear regression analysis for 15 subregions and then 160 stations across China.Cross-validation analyses performed for the period 1983-2008 revealed that the performance of the prediction models was not only high in terms of interannual variation,trend,and sign but also was stable during the whole period.Furthermore,the performance of the scheme was confirmed by the accuracy of the real-time prediction of summer rainfall during 2009 and 2010.
基金supported by the National Key R&D Program of China(Grant No.2019YFA0606703)the National Natural Science Foundation of China(Grant No.41975116)the Youth Innovation Promotion Association of the Chinese Academy of Sciences(Grant No.Y202025)。
文摘The application of deep learning is fast developing in climate prediction,in which El Ni?o–Southern Oscillation(ENSO),as the most dominant disaster-causing climate event,is a key target.Previous studies have shown that deep learning methods possess a certain level of superiority in predicting ENSO indices.The present study develops a deep learning model for predicting the spatial pattern of sea surface temperature anomalies(SSTAs)in the equatorial Pacific by training a convolutional neural network(CNN)model with historical simulations from CMIP6 models.Compared with dynamical models,the CNN model has higher skill in predicting the SSTAs in the equatorial western-central Pacific,but not in the eastern Pacific.The CNN model can successfully capture the small-scale precursors in the initial SSTAs for the development of central Pacific ENSO to distinguish the spatial mode up to a lead time of seven months.A fusion model combining the predictions of the CNN model and the dynamical models achieves higher skill than each of them for both central and eastern Pacific ENSO.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金supported by the National Natural Science Foundation of China(NSFC grants No.12172036,51774018)the Program for Changjiang Scholars and Innovative Research Team in University(PCSIRT,IRT_17R06)+2 种基金the Russian Foundation for Basic Research,Grant Number 20‐55‐53032Russian State Task number 1021052706247‐7‐1.5.4the Government of Perm Krai,research project No.С‐26/628.
文摘Earthquakes triggered by dynamic disturbances have been confirmed by numerous observations and experiments.In the past several decades,earthquake triggering has attracted increasing attention of scholars in relation to exploring the mechanism of earthquake triggering,earthquake prediction,and the desire to use the mechanism of earthquake triggering to reduce,prevent,or trigger earthquakes.Natural earthquakes and large‐scale explosions are the most common sources of dynamic disturbances that trigger earthquakes.In the past several decades,some models have been developed,including static,dynamic,quasi‐static,and other models.Some reviews have been published,but explosiontriggered seismicity was not included.In recent years,some new results on earthquake triggering have emerged.Therefore,this paper presents a new review to reflect the new results and include the content of explosion‐triggered earthquakes for the reference of scholars in this area.Instead of a complete review of the relevant literature,this paper primarily focuses on the main aspects of dynamic earthquake triggering on a tectonic scale and makes some suggestions on issues that need to be resolved in this area in the future.
基金Supported by National Key R&D Program of China (Grant No.2023YFB3407103)National Natural Science Foundation of China (Grant Nos.52175242,52175027)Young Elite Scientists Sponsorship Program by CAST (Grant No.2022QNRC001)。
文摘Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector that transmits signals.Smooth deployment is essential for duty services;therefore,accurate and efficient dynamic modeling and analysis of the deployment process are essential.One major challenge is depicting time-varying resistance of the cable network and capturing the cable-truss coupling behavior during the deployment process.This paper proposes a general dynamic analysis methodology for cable-truss coupling.Considering the topological diversity and geometric nonlinearity,the cable network's equilibrium equation is derived,and an explicit expression of the time-varying tension of the boundary cables,which provides the main resistance in truss deployment,is obtained.The deployment dynamic model is established,which considers the coupling effect between the soft cables and deployable truss.The effects of the antenna's driving modes and parameters on the dynamic deployment performance were investigated.A scaled prototype was manufactured,and the deployment experiment was conducted to verify the accuracy of the proposed modeling method.The proposed methodology is suitable for general cable antennas with arbitrary topologies and parameters,providing theoretical guidance for the dynamic performance evaluation of antenna driving schemes.
基金funded by the SNF project 200020_204917 entitled"Structure preserving and fast methods for hyperbolic systems of conservation laws".
文摘We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.
基金supported by Grant PID2020-117211GB-I00funded by MCIN/AEI/10.13039/501100011033+4 种基金by Grant CIAICO/2021/227funded by the Generalitat Valencianasupported by the Ministerio de Ciencia e Innovacion of Spain(Grant Ref.PID2021-125709OB-C21)funded by MCIN/AEI/10.13039/501100011033/FEDER,UEby the Generalitat Valenciana(CIAICO/2021/224).
文摘Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.
文摘The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2) reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2) into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.72071153 and 72231008)Laboratory of Science and Technology on Integrated Logistics Support Foundation (Grant No.6142003190102)the Natural Science Foundation of Shannxi Province (Grant No.2020JM486)。
文摘Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(62033010)Qing Lan Project of Jiangsu Province(R2023Q07)。
文摘For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.
基金supported in part by the National Natural Science Foundation of China(11771001)the Key Natural Science Research Project of Universities of Anhui Province,China(2022AH050108)。
文摘Dear Editor,This letter addresses the synchronization problem of a class of delayed stochastic complex dynamical networks consisting of multiple drive and response nodes.The aim is to achieve mean square exponential synchronization for the drive-response nodes despite the simultaneous presence of time delays and stochastic noises in node dynamics.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62373197 and 61873326)。
文摘In many engineering networks, only a part of target state variables are required to be estimated.On the other hand,multi-layer complex network exists widely in practical situations.In this paper, the state estimation of target state variables in multi-layer complex dynamical networks with nonlinear node dynamics is studied.A suitable functional state observer is constructed with the limited measurement.The parameters of the designed functional observer are obtained from the algebraic method and the stability of the functional observer is proven by the Lyapunov theorem.Some necessary conditions that need to be satisfied for the design of the functional state observer are obtained.Different from previous studies, in the multi-layer complex dynamical network with nonlinear node dynamics, the proposed method can estimate the state of target variables on some layers directly instead of estimating all the individual states.Thus, it can greatly reduce the placement of observers and computational cost.Numerical simulations with the three-layer complex dynamical network composed of three-dimensional nonlinear dynamical nodes are developed to verify the effectiveness of the method.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金Project jointly supported by the National Natural Science Foundation of China(Grant No.12372013)Program for Science and Technology Innovation Talents in Universities of Henan Province,China(Grant No.24HASTIT034)+3 种基金the Natural Science Foundation of Henan Province,China(Grant No.232300420122)the Humanities and Society Science Foundation from the Ministry of Education of China(Grant No.19YJCZH265)China Postdoctoral Science Foundation(Grant No.2019M651633)First Class Discipline of Zhejiang-A(Zhejiang University of Finance and Economics Statistics),the Collaborative Innovation Center for Data Science and Big Data Analysis(Zhejiang University of Finance and Economics-Statistics).
文摘This paper delves into the dynamical analysis,chaos control,Mittag–Leffler boundedness(MLB),and forecasting a fractional-order financial risk(FOFR)system through an absolute function term.To this end,the FOFR system is first proposed,and the adomian decomposition method(ADM)is employed to resolve this fractional-order system.The stability of equilibrium points and the corresponding control schemes are assessed,and several classical tools such as Lyapunov exponents(LE),bifurcation diagrams,complexity analysis(CA),and 0–1 test are further extended to analyze the dynamical behaviors of FOFR.Then the global Mittag–Leffler attractive set(MLAS)and Mittag–Leffler positive invariant set(MLPIS)for the proposed financial risk(FR)system are discussed.Finally,a proficient reservoir-computing(RC)method is applied to forecast the temporal evolution of the complex dynamics for the proposed system,and some simulations are carried out to show the effectiveness and feasibility of the present scheme.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12065009 and 12365002)the Science and Technology Planning Project of Jiangxi Province of China(Grant Nos.20224ACB201006 and 20224BAB201023)。
文摘We investigate the non-Hermitian effects on quantum diffusion in a kicked rotor model where the complex kicking potential is quasi-periodically modulated in the time domain.The synthetic space with arbitrary dimension can be created by incorporating incommensurate frequencies in the quasi-periodical modulation.In the Hermitian case,strong kicking induces the chaotic diffusion in the four-dimension momentum space characterized by linear growth of mean energy.We find that the quantum coherence in deep non-Hermitian regime can effectively suppress the chaotic diffusion and hence result in the emergence of dynamical localization.Moreover,the extent of dynamical localization is dramatically enhanced by increasing the non-Hermitian parameter.Interestingly,the quasi-energies become complex when the non-Hermitian parameter exceeds a certain threshold value.The quantum state will finally evolve to a quasi-eigenstate for which the imaginary part of its quasi-energy is large most.The exponential localization length decreases with the increase of the non-Hermitian parameter,unveiling the underlying mechanism of the enhancement of the dynamical localization by nonHermiticity.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.