Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of ...Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
High-order accurate weighted essentially non-oscillatory(WENO)schemes are a class of broadly applied numerical methods for solving hyperbolic partial differential equations(PDEs).Due to highly nonlinear property of th...High-order accurate weighted essentially non-oscillatory(WENO)schemes are a class of broadly applied numerical methods for solving hyperbolic partial differential equations(PDEs).Due to highly nonlinear property of the WENO algorithm,large amount of computational costs are required for solving multidimensional problems.In our previous work(Lu et al.in Pure Appl Math Q 14:57–86,2018;Zhu and Zhang in J Sci Comput 87:44,2021),sparse-grid techniques were applied to the classical finite difference WENO schemes in solving multidimensional hyperbolic equations,and it was shown that significant CPU times were saved,while both accuracy and stability of the classical WENO schemes were maintained for computations on sparse grids.In this technical note,we apply the approach to recently developed finite difference multi-resolution WENO scheme specifically the fifth-order scheme,which has very interesting properties such as its simplicity in linear weights’construction over a classical WENO scheme.Numerical experiments on solving high dimensional hyperbolic equations including Vlasov based kinetic problems are performed to demonstrate that the sparse-grid computations achieve large savings of CPU times,and at the same time preserve comparable accuracy and resolution with those on corresponding regular single grids.展开更多
Acupuncture enjoys a robust evidence base for dozens of clinical conditions and decades of research exploring its mechanisms of action. It has over 9,000 positive recommendations from official government and clinical ...Acupuncture enjoys a robust evidence base for dozens of clinical conditions and decades of research exploring its mechanisms of action. It has over 9,000 positive recommendations from official government and clinical guidelines. However, it still remains relatively inaccessible in the United States, Europe and elsewhere, especially compared to the strength of evidence-based recommendations for its use. Acupuncture would benefit from robust implementation strategies, utilizing insights and approaches from implementation science. The clinical use of Botox for migraine suffered from weaker evidence of effectiveness and greater evidence of harm, but using a streamlined and robust implementation strategy, Allergan was able to achieve widespread implementation from when it began its efforts around 2010. Such a systematic approach that identifies and overcomes barriers to implementation for acupuncture would benefit millions of people who currently are offered less effective and more invasive treatments, contrary to the recommendations of clinical guidelines.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the...For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.展开更多
Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat...Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
In recent years,with the support and promotion of relevant policies such as the Opinions on Promoting Study Tour for Primary and Secondary School Students jointly issued by the Ministry of Education and 11 other depar...In recent years,with the support and promotion of relevant policies such as the Opinions on Promoting Study Tour for Primary and Secondary School Students jointly issued by the Ministry of Education and 11 other departments,a wave of study tour has been sparked nationwide from individual pilot projects to gradual promotion.In this paper,students and teachers from grades 4 to 6 of L Primary School in Nanchang City,Jiangxi Province were selected as the survey objects.Combining the survey questionnaire,the current situation of conducting study tour in the primary school was sorted out and analyzed in depth from several aspects such as study tour cognition,study tour participation,study tour implementation,etc.Based on the survey results and relevant research,the current problems in conducting study tours in primary schools were summarized,and targeted improvement measures were proposed,in order to promote the healthy development of study tours in primary schools.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary ...This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.展开更多
In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the g...In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been c...As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.展开更多
The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference oper...The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference operators and combining the compact technique, in the time direction is discretized by the Crank-Nicolson method. Through the energy method, the stability and convergence of the numerical scheme in the sense of L<sub>2</sub>-norm are proved, and the convergence order is . Some examples are given to show that our numerical scheme is effective.展开更多
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization...The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs.展开更多
Through literature review,we found that evaluations of urban planning implementation often focus narrowly on either the subject(stakeholders)or the object(projects),while micro-level aspects such as site selection and...Through literature review,we found that evaluations of urban planning implementation often focus narrowly on either the subject(stakeholders)or the object(projects),while micro-level aspects such as site selection and construction are primarily considered within the context of planning implementation.There is insufficient research on the evaluation of implementation.Community daycare centers play a crucial role in the community home care model,yet there is relatively little research on their usage efficiency,satisfaction levels,and spatial evaluation of planning implementation.Based on the theoretical understanding of the human environment,including the subject,object,and their interactions,an evaluation system for the planning and implementation of community day care centers was constructed,incorporating subjective evaluation,objective evaluation,and comparative analysis.展开更多
“Introduction to Language,”as the core course of the English major,mainly reveals the basic laws of language,enabling the students to have the ability to apply linguistic theories to explain language phenomena and s...“Introduction to Language,”as the core course of the English major,mainly reveals the basic laws of language,enabling the students to have the ability to apply linguistic theories to explain language phenomena and solve specific language problems.This course is highly theoretical and has a certain degree of difficulty.The evaluation of student grades has always been based on examination reform,but several problems have been encountered during the implementation process.This article analyzes the current situation of the reform and implementation of the“Introduction to Language”course examination in applied universities and puts forth suggestions and specific measures to improve the assessment of the course,aiming to enhance the teaching effectiveness of the course and scientifically and comprehensively evaluate students’abilities.展开更多
Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation h...Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation have become the fifth major function of universities.Based on the background of the globalization era,undergraduate colleges and universities should pay more attention to the cultivation of students’intercultural communication and understanding ability while cultivating their professional skills,and take expanding students’international vision and enhancing the international competitiveness of China’s education as important tasks.Labor education is an important content of the national education system,which has the comprehensive nurturing value of cultivating morality,increasing intelligence,strengthening physical fitness,and cultivating beauty.Higher education institutions should further optimize the system of labor education,expand students’space and field of thinking in the process of labor education,and broaden students’international perspectives.展开更多
文摘Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
文摘High-order accurate weighted essentially non-oscillatory(WENO)schemes are a class of broadly applied numerical methods for solving hyperbolic partial differential equations(PDEs).Due to highly nonlinear property of the WENO algorithm,large amount of computational costs are required for solving multidimensional problems.In our previous work(Lu et al.in Pure Appl Math Q 14:57–86,2018;Zhu and Zhang in J Sci Comput 87:44,2021),sparse-grid techniques were applied to the classical finite difference WENO schemes in solving multidimensional hyperbolic equations,and it was shown that significant CPU times were saved,while both accuracy and stability of the classical WENO schemes were maintained for computations on sparse grids.In this technical note,we apply the approach to recently developed finite difference multi-resolution WENO scheme specifically the fifth-order scheme,which has very interesting properties such as its simplicity in linear weights’construction over a classical WENO scheme.Numerical experiments on solving high dimensional hyperbolic equations including Vlasov based kinetic problems are performed to demonstrate that the sparse-grid computations achieve large savings of CPU times,and at the same time preserve comparable accuracy and resolution with those on corresponding regular single grids.
文摘Acupuncture enjoys a robust evidence base for dozens of clinical conditions and decades of research exploring its mechanisms of action. It has over 9,000 positive recommendations from official government and clinical guidelines. However, it still remains relatively inaccessible in the United States, Europe and elsewhere, especially compared to the strength of evidence-based recommendations for its use. Acupuncture would benefit from robust implementation strategies, utilizing insights and approaches from implementation science. The clinical use of Botox for migraine suffered from weaker evidence of effectiveness and greater evidence of harm, but using a streamlined and robust implementation strategy, Allergan was able to achieve widespread implementation from when it began its efforts around 2010. Such a systematic approach that identifies and overcomes barriers to implementation for acupuncture would benefit millions of people who currently are offered less effective and more invasive treatments, contrary to the recommendations of clinical guidelines.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(62033010)Qing Lan Project of Jiangsu Province(R2023Q07)。
文摘For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.
基金supported by the National Science Foundation of China(Grant No.42230606)。
文摘Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金Supported by Research Project on Basic Education in Jiangxi Province(SZUNDZH2021-1136,SZUNDZH2020-1138).
文摘In recent years,with the support and promotion of relevant policies such as the Opinions on Promoting Study Tour for Primary and Secondary School Students jointly issued by the Ministry of Education and 11 other departments,a wave of study tour has been sparked nationwide from individual pilot projects to gradual promotion.In this paper,students and teachers from grades 4 to 6 of L Primary School in Nanchang City,Jiangxi Province were selected as the survey objects.Combining the survey questionnaire,the current situation of conducting study tour in the primary school was sorted out and analyzed in depth from several aspects such as study tour cognition,study tour participation,study tour implementation,etc.Based on the survey results and relevant research,the current problems in conducting study tours in primary schools were summarized,and targeted improvement measures were proposed,in order to promote the healthy development of study tours in primary schools.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
基金supported by the NSFC grant 11801143J.Lu’s research is partially supported by the NSFC grant 11901213+3 种基金the National Key Research and Development Program of China grant 2021YFA1002900supported by the NSFC grant 11801140,12171177the Young Elite Scientists Sponsorship Program by Henan Association for Science and Technology of China grant 2022HYTP0009the Program for Young Key Teacher of Henan Province of China grant 2021GGJS067.
文摘This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.
基金supported by the Simons Foundation:Collaboration Grantssupported by the AFOSR grant FA9550-18-1-0383.
文摘In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported by the National Natural Science Foundation of China(Nos.41876077,41376085).
文摘As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.
文摘The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference operators and combining the compact technique, in the time direction is discretized by the Crank-Nicolson method. Through the energy method, the stability and convergence of the numerical scheme in the sense of L<sub>2</sub>-norm are proved, and the convergence order is . Some examples are given to show that our numerical scheme is effective.
文摘The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs.
基金Scientific and Technological Research Project of Chongqing Municipal Education Commission:Evaluation and Optimization of Planning and Implementation of Community Day Care Centers from the Perspective of Subject-Object Relationship(Project number:KJQN202301901).
文摘Through literature review,we found that evaluations of urban planning implementation often focus narrowly on either the subject(stakeholders)or the object(projects),while micro-level aspects such as site selection and construction are primarily considered within the context of planning implementation.There is insufficient research on the evaluation of implementation.Community daycare centers play a crucial role in the community home care model,yet there is relatively little research on their usage efficiency,satisfaction levels,and spatial evaluation of planning implementation.Based on the theoretical understanding of the human environment,including the subject,object,and their interactions,an evaluation system for the planning and implementation of community day care centers was constructed,incorporating subjective evaluation,objective evaluation,and comparative analysis.
基金Second batch of“opening bidding”Wuhan University of Bioengineering“Research on the Evaluation of the Implementation Effect of Curriculum Examination Reform:Taking the Course of Introduction to Language as an Example”(No.2023JGYB37)。
文摘“Introduction to Language,”as the core course of the English major,mainly reveals the basic laws of language,enabling the students to have the ability to apply linguistic theories to explain language phenomena and solve specific language problems.This course is highly theoretical and has a certain degree of difficulty.The evaluation of student grades has always been based on examination reform,but several problems have been encountered during the implementation process.This article analyzes the current situation of the reform and implementation of the“Introduction to Language”course examination in applied universities and puts forth suggestions and specific measures to improve the assessment of the course,aiming to enhance the teaching effectiveness of the course and scientifically and comprehensively evaluate students’abilities.
基金Key Research Base of Humanities and Social Sciences of Sichuan Province-Sichuan International Education Development Research Center“Research on the Implementation Path of Labor Education in Private Undergraduate Colleges and Universities Under International Perspective”(SCGJ2023-12)。
文摘Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation have become the fifth major function of universities.Based on the background of the globalization era,undergraduate colleges and universities should pay more attention to the cultivation of students’intercultural communication and understanding ability while cultivating their professional skills,and take expanding students’international vision and enhancing the international competitiveness of China’s education as important tasks.Labor education is an important content of the national education system,which has the comprehensive nurturing value of cultivating morality,increasing intelligence,strengthening physical fitness,and cultivating beauty.Higher education institutions should further optimize the system of labor education,expand students’space and field of thinking in the process of labor education,and broaden students’international perspectives.