Field experimental seismic sounding permitted us to obtain optimal shallow seismic reflection sounding parameters.In process of data processing,we obtained a high-qualitative shallow seismic reflection sounding profil...Field experimental seismic sounding permitted us to obtain optimal shallow seismic reflection sounding parameters.In process of data processing,we obtained a high-qualitative shallow seismic reflection sounding profile by using the techniques such as filtering,edition surgical blanking,prediction deconvolution,fitting static correlation of first arrival time,and velocity analysis.Comprehensive analysis on the information of reflection wave groups along the seismic sounding profile and the stratigraphic and neogeochronological data obtained from many drills near the sounding line reveals that the upper termination of the detected fault zone is located at depth of 75~80 m,in the Middle Pleistocene deposits dated to be about 220 ka BP.The continuity,discontinuity,increasing and decreasing amount of reflection wave groups and change of their configurations,in combination with geological columns of drills,permitted us to know that the width of upper termination of the fault zone is 100 m.It can be inferred from the variation of number of reflection wave groups along the profile that the scarp of hidden fault is 200 m wide and the fault is a synsedimentary active fault in the Early Pleistocene and the early stage of Middle Pleistocene.No tectonic movement,which offset the covering deposits,had occurred since the late stage of Middle Pleistocene.展开更多
Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as i...Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as innocent-looking information called cover data. Our steganograpy protocol has three features. First, we can use any plain text that is inde-pendent of any secret message sent between parties. When we make stego data, we do not need to change the content of plain text at all. Second, embedded messages are not included in opened information (innocent-looking messages), but are included as phases of the entangled states. Finally, in quantum states shared between parties in advance, i.e., as quantum keys used when the parties recover secret messages from stego data, neither innocent-looking information nor the information of any secret message is included.展开更多
In this paper, we will illustrate the use and power of Hidden Markov models in analyzing multivariate data over time. The data used in this study was obtained from the Organization for Economic Co-operation and Develo...In this paper, we will illustrate the use and power of Hidden Markov models in analyzing multivariate data over time. The data used in this study was obtained from the Organization for Economic Co-operation and Development (OECD. Stat database url: https://stats.oecd.org/) and encompassed monthly data on the employment rate of males and females in Canada and the United States (aged 15 years and over;seasonally adjusted from January 1995 to July 2018). Two different underlying patterns of trends in employment over the 23 years observation period were uncovered.展开更多
The research hotspot in post-genomic era is from sequence to function. Building genetic regulatory network (GRN) can help to understand the regulatory mechanism between genes and the function of organisms. Probabilist...The research hotspot in post-genomic era is from sequence to function. Building genetic regulatory network (GRN) can help to understand the regulatory mechanism between genes and the function of organisms. Probabilistic GRN has been paid more attention recently. This paper discusses the Hidden Markov Model (HMM) approach served as a tool to build GRN. Different genes with similar expression levels are considered as different states during training HMM. The probable regulatory genes of target genes can be found out through the resulting states transition matrix and the determinate regulatory functions can be predicted using nonlinear regression algorithm. The experiments on artificial and real-life datasets show the effectiveness of HMM in building GRN.展开更多
针对大数据应用中用户共享数据的访问控制由半可信云服务商实施所带来的隐私泄露、策略和访问日志易被篡改等问题,提出一种基于区块链的策略隐藏大数据访问控制方法(A policy-hidden big data access control method based on blockchai...针对大数据应用中用户共享数据的访问控制由半可信云服务商实施所带来的隐私泄露、策略和访问日志易被篡改等问题,提出一种基于区块链的策略隐藏大数据访问控制方法(A policy-hidden big data access control method based on blockchain,PHAC).该方法采用区块链技术实施访问控制以减少对服务商的信任依赖,引入属性基加密(Attribute-based encryption,ABE)以及双线性映射技术,实现在不泄露访问控制策略的前提下,通过智能合约正确执行访问控制策略.同时,解耦访问控制策略,简化用户策略的发布、更新和执行.并应用链上和链下存储相结合方式,解决智能合约和访问控制策略占用区块链节点资源不断增大的问题.最后,对该方法进行了理论分析和HyperLedger Fabric环境下的实验评估,结果表明该方法能在策略隐藏情况下有效实现访问控制,但不会给数据拥有者、区块链节点增加过多额外计算和存储开销.展开更多
基金A High-new Technique Project by State Development and Planning Commission of China (2001977).
文摘Field experimental seismic sounding permitted us to obtain optimal shallow seismic reflection sounding parameters.In process of data processing,we obtained a high-qualitative shallow seismic reflection sounding profile by using the techniques such as filtering,edition surgical blanking,prediction deconvolution,fitting static correlation of first arrival time,and velocity analysis.Comprehensive analysis on the information of reflection wave groups along the seismic sounding profile and the stratigraphic and neogeochronological data obtained from many drills near the sounding line reveals that the upper termination of the detected fault zone is located at depth of 75~80 m,in the Middle Pleistocene deposits dated to be about 220 ka BP.The continuity,discontinuity,increasing and decreasing amount of reflection wave groups and change of their configurations,in combination with geological columns of drills,permitted us to know that the width of upper termination of the fault zone is 100 m.It can be inferred from the variation of number of reflection wave groups along the profile that the scarp of hidden fault is 200 m wide and the fault is a synsedimentary active fault in the Early Pleistocene and the early stage of Middle Pleistocene.No tectonic movement,which offset the covering deposits,had occurred since the late stage of Middle Pleistocene.
文摘Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as innocent-looking information called cover data. Our steganograpy protocol has three features. First, we can use any plain text that is inde-pendent of any secret message sent between parties. When we make stego data, we do not need to change the content of plain text at all. Second, embedded messages are not included in opened information (innocent-looking messages), but are included as phases of the entangled states. Finally, in quantum states shared between parties in advance, i.e., as quantum keys used when the parties recover secret messages from stego data, neither innocent-looking information nor the information of any secret message is included.
文摘In this paper, we will illustrate the use and power of Hidden Markov models in analyzing multivariate data over time. The data used in this study was obtained from the Organization for Economic Co-operation and Development (OECD. Stat database url: https://stats.oecd.org/) and encompassed monthly data on the employment rate of males and females in Canada and the United States (aged 15 years and over;seasonally adjusted from January 1995 to July 2018). Two different underlying patterns of trends in employment over the 23 years observation period were uncovered.
文摘The research hotspot in post-genomic era is from sequence to function. Building genetic regulatory network (GRN) can help to understand the regulatory mechanism between genes and the function of organisms. Probabilistic GRN has been paid more attention recently. This paper discusses the Hidden Markov Model (HMM) approach served as a tool to build GRN. Different genes with similar expression levels are considered as different states during training HMM. The probable regulatory genes of target genes can be found out through the resulting states transition matrix and the determinate regulatory functions can be predicted using nonlinear regression algorithm. The experiments on artificial and real-life datasets show the effectiveness of HMM in building GRN.
文摘针对大数据应用中用户共享数据的访问控制由半可信云服务商实施所带来的隐私泄露、策略和访问日志易被篡改等问题,提出一种基于区块链的策略隐藏大数据访问控制方法(A policy-hidden big data access control method based on blockchain,PHAC).该方法采用区块链技术实施访问控制以减少对服务商的信任依赖,引入属性基加密(Attribute-based encryption,ABE)以及双线性映射技术,实现在不泄露访问控制策略的前提下,通过智能合约正确执行访问控制策略.同时,解耦访问控制策略,简化用户策略的发布、更新和执行.并应用链上和链下存储相结合方式,解决智能合约和访问控制策略占用区块链节点资源不断增大的问题.最后,对该方法进行了理论分析和HyperLedger Fabric环境下的实验评估,结果表明该方法能在策略隐藏情况下有效实现访问控制,但不会给数据拥有者、区块链节点增加过多额外计算和存储开销.