User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore ...User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL.展开更多
The formation of the identical slope surface and the method of construction are discussed. On the basement of building the parameter equation of variable-radius circle family envelope, the frequently used parameter eq...The formation of the identical slope surface and the method of construction are discussed. On the basement of building the parameter equation of variable-radius circle family envelope, the frequently used parameter equation of the identical slope surface of the top of taper moving along column helix, horizental arc and line is built. The equation can be used to construct the identical slope surface’s contours, gradient lines and three dimensional figures correctly.展开更多
in the design of civil and water conservancy projects, the identical slope suffice isfrequently used. Its mathematical model may be formulated as an envelope of a cone when itS vertexmoves along the cylindrical helix....in the design of civil and water conservancy projects, the identical slope suffice isfrequently used. Its mathematical model may be formulated as an envelope of a cone when itS vertexmoves along the cylindrical helix. According to the principle of conStrUcting the envelope curves of afamily of circles, the parametric equstion for the identical slope surface is established. The parametricform makes it most convenient to draw the contour lines and grade lines, and is well suited toproduce indexed projection of identical slope surface in civil and water conservancy projects.展开更多
Identical superdeformed bands in <sup>191</sup>Au and <sup>191</sup>Hg have been investigated byusing particle-rotor model within the framework of the BCS (Bardeen-Cooper-Schrieffer) pairing ...Identical superdeformed bands in <sup>191</sup>Au and <sup>191</sup>Hg have been investigated byusing particle-rotor model within the framework of the BCS (Bardeen-Cooper-Schrieffer) pairing correlation.The identity in the γ-transition energies in these bandsshows that the properties of specific individual orbitals may be important to understandidentical bands.展开更多
目的系统梳理角色榜样对护理专业学生职业认同的影响,为护理教育者和管理者通过教师队伍建设提高学生对护士职业认同度提供参考依据。方法计算机检索中国知网、万方和维普、PubMed、Embase、Web of Science、ProQuest、Scopus,检索时限...目的系统梳理角色榜样对护理专业学生职业认同的影响,为护理教育者和管理者通过教师队伍建设提高学生对护士职业认同度提供参考依据。方法计算机检索中国知网、万方和维普、PubMed、Embase、Web of Science、ProQuest、Scopus,检索时限为建库至2023年7月,收集关于角色榜样对护理学专业学生职业认同影响的质性研究,采用澳大利亚JBI循证卫生保健中心质性研究质量评价标准对文献质量进行评价,采用汇集性整合方法对结果进行整合。结果共纳入9篇文献,提炼41个研究结果,归纳形成14个类别,合成4个整合结果:角色榜样改变学生对护士职业的认知,角色榜样增进学生对护士职业的情感,角色榜样对学生具有角色示范作用,角色榜样为学生创设支持性学习环境。结论护理教育者应重视角色榜样的积极作用,提高临床护理教师角色榜样的意识和能力。展开更多
Human faces have two important characteristics: (1) They are similar objectsand the specific variations of each face are similar to each other; (2) They are nearly bilateralsymmetric. Exploiting the two important prop...Human faces have two important characteristics: (1) They are similar objectsand the specific variations of each face are similar to each other; (2) They are nearly bilateralsymmetric. Exploiting the two important properties, we build a unified model in identity subspace(UMIS) as a novel technique for face recognition from only one example image per person. An identitysubspace spanned by bilateral symmetric bases, which compactly encodes identity information, ispresented. The unified model, trained on an obtained training set with multiple samples per classfrom a known people group A, can be generalized well to facial images of unknown individuals, andcan be used to recognize facial images from an unknown people group B with only one sample persubject, Extensive experimental results on two public databases (the Yale database and the Berndatabase) and our own database (the ICT-JDL database) demonstrate that the UMIS approach issignificantly effective and robust for face recognition.展开更多
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public...Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.展开更多
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b...Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.展开更多
文摘User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL.
文摘The formation of the identical slope surface and the method of construction are discussed. On the basement of building the parameter equation of variable-radius circle family envelope, the frequently used parameter equation of the identical slope surface of the top of taper moving along column helix, horizental arc and line is built. The equation can be used to construct the identical slope surface’s contours, gradient lines and three dimensional figures correctly.
文摘in the design of civil and water conservancy projects, the identical slope suffice isfrequently used. Its mathematical model may be formulated as an envelope of a cone when itS vertexmoves along the cylindrical helix. According to the principle of conStrUcting the envelope curves of afamily of circles, the parametric equstion for the identical slope surface is established. The parametricform makes it most convenient to draw the contour lines and grade lines, and is well suited toproduce indexed projection of identical slope surface in civil and water conservancy projects.
基金The project supported by the National Natural Science Foundation of China.
文摘Identical superdeformed bands in <sup>191</sup>Au and <sup>191</sup>Hg have been investigated byusing particle-rotor model within the framework of the BCS (Bardeen-Cooper-Schrieffer) pairing correlation.The identity in the γ-transition energies in these bandsshows that the properties of specific individual orbitals may be important to understandidentical bands.
文摘目的系统梳理角色榜样对护理专业学生职业认同的影响,为护理教育者和管理者通过教师队伍建设提高学生对护士职业认同度提供参考依据。方法计算机检索中国知网、万方和维普、PubMed、Embase、Web of Science、ProQuest、Scopus,检索时限为建库至2023年7月,收集关于角色榜样对护理学专业学生职业认同影响的质性研究,采用澳大利亚JBI循证卫生保健中心质性研究质量评价标准对文献质量进行评价,采用汇集性整合方法对结果进行整合。结果共纳入9篇文献,提炼41个研究结果,归纳形成14个类别,合成4个整合结果:角色榜样改变学生对护士职业的认知,角色榜样增进学生对护士职业的情感,角色榜样对学生具有角色示范作用,角色榜样为学生创设支持性学习环境。结论护理教育者应重视角色榜样的积极作用,提高临床护理教师角色榜样的意识和能力。
文摘Human faces have two important characteristics: (1) They are similar objectsand the specific variations of each face are similar to each other; (2) They are nearly bilateralsymmetric. Exploiting the two important properties, we build a unified model in identity subspace(UMIS) as a novel technique for face recognition from only one example image per person. An identitysubspace spanned by bilateral symmetric bases, which compactly encodes identity information, ispresented. The unified model, trained on an obtained training set with multiple samples per classfrom a known people group A, can be generalized well to facial images of unknown individuals, andcan be used to recognize facial images from an unknown people group B with only one sample persubject, Extensive experimental results on two public databases (the Yale database and the Berndatabase) and our own database (the ICT-JDL database) demonstrate that the UMIS approach issignificantly effective and robust for face recognition.
基金Supported by the National Natural Science Foundation of China (6057303)the Program for New Century Excellent Talents in University by Ministry of Education (NCET-05-0398)
文摘Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.
基金Project supported by the National Natural Science Foundation of China(Nos.61303198,61471409,61472470,and 61402112) the Natural Science Foundation of Shandong Province,China(No.ZR2013FQ031)
文摘Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.