To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ...To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable.展开更多
ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完...ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完成项目所有仿真并以简明的界面给出仿真结果和spec达成与否等信息。(3)其流程具有高的统筹性,高效性,操作简单等优点。同时该流程能够提高项目设计规范性,仿真完备性,从而提高芯片设计成功率。本文针对海思公司一个实际ADC项目验证了Verifier flow,在整个流程中可以直观清晰查看整个项目各指标状态和达成情况;结合Matlab在New ADE的集成功能,调用Mat l ab计算的结果也可以直接在ADE和Verifier中显示,基本达到了一键完成所有仿真,大大降低了项目换代,项目管理和项目验证而投入的人力成本。展开更多
We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization fact...We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
Based on Chameleon Hash and D.Boneh’s one round multi-party key agreement protocol,this paper proposes a multi-designated verifiers signature scheme.In this scheme only the verifiers designated by the signer can inde...Based on Chameleon Hash and D.Boneh’s one round multi-party key agreement protocol,this paper proposes a multi-designated verifiers signature scheme.In this scheme only the verifiers designated by the signer can independently verify the signature.And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value.The analysis of the proposed scheme shows that it satisfies non-transferability,unforgeability and privacy of the signer’s identity and has to low computational cost.展开更多
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra...Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.展开更多
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle...Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.展开更多
The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but t...The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but the cascaded transcriptional machinery of upstream transcriptional regulators implicated in the ethylene biosynthesis pathway is still poorly understood.Here we report that ethylene biosynthesis genes,including MaACS1,MaACO1,MaACO4,MaACO5,and MaACO8,were upregulated in ripening bananas.NAC(NAM,ATAF,CUC)transcription factor,MaNAC083,a ripening and ethylene-inhibited gene,was discovered as a potential binding protein to the MaACS1 promoter by yeast one-hybrid screening.Further in vitro and in vivo experiments indicated that MaNAC083 bound directly to promoters of the five ethylene biosynthesis genes,thereby transcriptionally repressing their expression,which was further verified by transient overexpression experiments,where ethylene production was inhibited through MaNAC083-modulated transcriptional repression of ethylene biosynthesis genes in banana fruits.Strikingly,MaMADS1,a ripening-induced MADS(MCM1,AGAMOUS,DEFICIENS,SRF4)transcription factor,was found to directly repress the expression of MaNAC083,inhibiting trans-repression of MaNAC083 to ethylene biosynthesis genes,thereby attenuating MaNAC083-repressed ethylene production in bananas.These findings collectively illustrated the mechanistic basis of a MaMADS1-MaNAC083-MaACS1/MaACOs regulatory cascade controlling ethylene biosynthesis during banana fruit ripening.These findings increase our knowledge of the transcriptional regulatory mechanisms of ethylene biosynthesis at the transcriptional level and are expected to help develop molecular approaches to control ripening and improve fruit storability.展开更多
In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable univer...In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.展开更多
Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applicat...Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applications. Replacing liquid electrolytes with solidstate electrolytes(SSEs) is expected to fundamentally overcome the safety issues. In this work, we focus on the development and challenge of solid-state Li-air batteries(SSLABs). The rise of different types of SSEs, interfacial compatibility and verifiability in SSLABs are presented. The corresponding strategies and prospects of SSLABs are also proposed. In particular, combining machine learning method with experiment and in situ(or operando)techniques is imperative to accelerate the development of SSLABs.展开更多
The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a ...The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. .展开更多
Software development in automotive industry has bestowed greater comforts and conveniences to mankind. A remarkable progress in this field often faces a setback due to minor defects in the software. So there is recurr...Software development in automotive industry has bestowed greater comforts and conveniences to mankind. A remarkable progress in this field often faces a setback due to minor defects in the software. So there is recurring need for standardization and implementation of testing strategies. But the process of creation of test scripts to check if the software created complies with its specifications and requirements is both time- and resource-consuming. Generating a short but effective test suite usually requires a lot of manual work and expert knowledge. Patronizing research work in this field is the need of the hour. This paper solves the problem by using Model-Based Testing where test harness and evaluation are performed economically through automation. Simulink Design Verifier and Reactis are the tools used to carry out this purpose in Adaptive Front Light System. The resulting outputs obtained from Simulink Design Verifier and Reactis using Model-Based Testing prove that short test suites can be generated for the model where full model coverage can be achieved easily through automation. The outputs of these test cases when compared with the expected outputs confirm that the model developed is working as per the requirements.展开更多
The lower frequency part of the theoretical wind wave spectrum proposed by the authors (Wen et al. , 1988a, b,c) has been improved and the form of spectrum is appreciably simplified. In addition to the field data coll...The lower frequency part of the theoretical wind wave spectrum proposed by the authors (Wen et al. , 1988a, b,c) has been improved and the form of spectrum is appreciably simplified. In addition to the field data collected in the Bohai Sea region and used in the previous papers, those obtained in the Huanghai Sea, the East China Sea and the South China Sea have been employed so that the improved spectra can be verified on a more extensive observational basis. Computed results agree with the observations well. Further comparisons have been made between the proposed spectra and the JONSWAP spectrum. Though the two types of spectrum are close to each other in form, the former shows, as a whole, better agreement with the observation than the latter. By introducing an improved relation between the peak-ness factor and significant wave steepness, the spectrum contains only significant wave height and period as parameters. For spectra given in this form, the computed peak frequencies coincide approximately展开更多
This paper presents the number of combinatorially distinct rooted Eulerian planar maps with the number of non-root-vertices and the number of non-root-faces as two parameters. The parametric expressions for determinin...This paper presents the number of combinatorially distinct rooted Eulerian planar maps with the number of non-root-vertices and the number of non-root-faces as two parameters. The parametric expressions for determining the number in the loopless Eulerian case are also obtained.展开更多
-Theoretical form of equilibrium range is given on the basis of the wind wave frequency spectra proposed by Wenel al. (1988a,b,c, 1989a,b). The effects of peakness factor and water depth are discussed. In the case of ...-Theoretical form of equilibrium range is given on the basis of the wind wave frequency spectra proposed by Wenel al. (1988a,b,c, 1989a,b). The effects of peakness factor and water depth are discussed. In the case of deep water the e-quilibrium range is reduced to the form first proposed by Toba (1973) and the coefficient of the formula is shown to be the function of nondimensional fetch or peak frequency. Results of the present paper have been verified through field data.展开更多
Glycidyl methaerylate (GMA) is a recently recognized chemical mutagen. In order to explore the mutagenicity and mutagenic process of GMA, plasmid pBR322 was used for in vitro binding, mutant screening, and restriction...Glycidyl methaerylate (GMA) is a recently recognized chemical mutagen. In order to explore the mutagenicity and mutagenic process of GMA, plasmid pBR322 was used for in vitro binding, mutant screening, and restriction enzyme mapping. The binding between GMA and DNA in vitro has been verified by means of a spectrophotometric method. When pBR322 and GMAbound pBR322 were used to transform Eschenchia coli HB101, the following results were obtained: (1) The transformation efficiency of GMA-bound pBR322 was much lower than that of pBR322 alone. (2) GMA-bound pBR322 induced phenotype changes in competent cells (i.e., tetracycline-resistance inactivation or ampicillin-resistance inactivation). There were two mutants of pBR322, Ap^RTc^S and Ap^STc^R, in the transformants and a deductive mutant Ap^STc^S in the nontranstormants. (3) All of the selected mutants were stable and heritable. (4) When restriction enzyme maps were used to analyze the mutant Ap^RTc^S, four of seven maps were changed. some sites were shifted to other resistant gene regions, for example, sites of Bgll, EcoRl, Ilindlll. Hinclll, etc., and there was a new recognition site for Hindi (252). We did not observe any DNA fragment insertion or deletion on any maps. Our results suggest that when GMA is covalently linked to the plasmid DNA, it gives rise to a premutagenic lesion of DNA that is converted in vivo into a point mutation. (C)1990 Academic Press, Inc.展开更多
文摘To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable.
文摘ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完成项目所有仿真并以简明的界面给出仿真结果和spec达成与否等信息。(3)其流程具有高的统筹性,高效性,操作简单等优点。同时该流程能够提高项目设计规范性,仿真完备性,从而提高芯片设计成功率。本文针对海思公司一个实际ADC项目验证了Verifier flow,在整个流程中可以直观清晰查看整个项目各指标状态和达成情况;结合Matlab在New ADE的集成功能,调用Mat l ab计算的结果也可以直接在ADE和Verifier中显示,基本达到了一键完成所有仿真,大大降低了项目换代,项目管理和项目验证而投入的人力成本。
基金supported by the National Natural Science Foundation of China(Grant Nos.12375234,12005012,and U1930402)the Laboratory Youth Fund of Institute of Applied Physics and Computational Mathematics(Grant No.6142A05QN21005)。
文摘We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金supported by the National Basic Research Program of China (No.2007CB311203)the National Natural Science Foundation of China (Grant No.90604022).
文摘Based on Chameleon Hash and D.Boneh’s one round multi-party key agreement protocol,this paper proposes a multi-designated verifiers signature scheme.In this scheme only the verifiers designated by the signer can independently verify the signature.And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value.The analysis of the proposed scheme shows that it satisfies non-transferability,unforgeability and privacy of the signer’s identity and has to low computational cost.
基金supported by the National Natural Science Foundation of China(No.62206238)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220562)the Natural Science Research Project of Universities in Jiangsu Province(No.22KJB520010).
文摘Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.
基金supported by the Tang Scholar Project of Soochow Universitythe National Natural Science Foundation of China(Grant No.61873162)+1 种基金the Fund from Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication NetworkSuzhou Key Laboratory of Advanced Optical Communication Network Technology。
文摘Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.
基金This study was supported by the National Key Research and Development Program of China(grant no.2022YFD2100103)the National Natural Science Foundation of China(grant no.32072279)the China Agriculture Research System of MOF and MARA(grant no.CARS-31).
文摘The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but the cascaded transcriptional machinery of upstream transcriptional regulators implicated in the ethylene biosynthesis pathway is still poorly understood.Here we report that ethylene biosynthesis genes,including MaACS1,MaACO1,MaACO4,MaACO5,and MaACO8,were upregulated in ripening bananas.NAC(NAM,ATAF,CUC)transcription factor,MaNAC083,a ripening and ethylene-inhibited gene,was discovered as a potential binding protein to the MaACS1 promoter by yeast one-hybrid screening.Further in vitro and in vivo experiments indicated that MaNAC083 bound directly to promoters of the five ethylene biosynthesis genes,thereby transcriptionally repressing their expression,which was further verified by transient overexpression experiments,where ethylene production was inhibited through MaNAC083-modulated transcriptional repression of ethylene biosynthesis genes in banana fruits.Strikingly,MaMADS1,a ripening-induced MADS(MCM1,AGAMOUS,DEFICIENS,SRF4)transcription factor,was found to directly repress the expression of MaNAC083,inhibiting trans-repression of MaNAC083 to ethylene biosynthesis genes,thereby attenuating MaNAC083-repressed ethylene production in bananas.These findings collectively illustrated the mechanistic basis of a MaMADS1-MaNAC083-MaACS1/MaACOs regulatory cascade controlling ethylene biosynthesis during banana fruit ripening.These findings increase our knowledge of the transcriptional regulatory mechanisms of ethylene biosynthesis at the transcriptional level and are expected to help develop molecular approaches to control ripening and improve fruit storability.
基金Project supported by the National Science Foundation of Sichuan Province (Grant No. 2022NSFSC0534)the Central Guidance on Local Science and Technology Development Fund of Sichuan Province (Grant No. 22ZYZYTS0064)+1 种基金the Chengdu Key Research and Development Support Program (Grant No. 2021-YF09-0016-GX)the Key Project of Sichuan Normal University (Grant No. XKZX-02)。
文摘In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.
基金supported by National Key Research and Development Program of China (No.2021YFF0500600)NSFC (22279120)Key R&D projects in Henan Province (221111240100)。
文摘Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applications. Replacing liquid electrolytes with solidstate electrolytes(SSEs) is expected to fundamentally overcome the safety issues. In this work, we focus on the development and challenge of solid-state Li-air batteries(SSLABs). The rise of different types of SSEs, interfacial compatibility and verifiability in SSLABs are presented. The corresponding strategies and prospects of SSLABs are also proposed. In particular, combining machine learning method with experiment and in situ(or operando)techniques is imperative to accelerate the development of SSLABs.
文摘The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. .
文摘Software development in automotive industry has bestowed greater comforts and conveniences to mankind. A remarkable progress in this field often faces a setback due to minor defects in the software. So there is recurring need for standardization and implementation of testing strategies. But the process of creation of test scripts to check if the software created complies with its specifications and requirements is both time- and resource-consuming. Generating a short but effective test suite usually requires a lot of manual work and expert knowledge. Patronizing research work in this field is the need of the hour. This paper solves the problem by using Model-Based Testing where test harness and evaluation are performed economically through automation. Simulink Design Verifier and Reactis are the tools used to carry out this purpose in Adaptive Front Light System. The resulting outputs obtained from Simulink Design Verifier and Reactis using Model-Based Testing prove that short test suites can be generated for the model where full model coverage can be achieved easily through automation. The outputs of these test cases when compared with the expected outputs confirm that the model developed is working as per the requirements.
文摘The lower frequency part of the theoretical wind wave spectrum proposed by the authors (Wen et al. , 1988a, b,c) has been improved and the form of spectrum is appreciably simplified. In addition to the field data collected in the Bohai Sea region and used in the previous papers, those obtained in the Huanghai Sea, the East China Sea and the South China Sea have been employed so that the improved spectra can be verified on a more extensive observational basis. Computed results agree with the observations well. Further comparisons have been made between the proposed spectra and the JONSWAP spectrum. Though the two types of spectrum are close to each other in form, the former shows, as a whole, better agreement with the observation than the latter. By introducing an improved relation between the peak-ness factor and significant wave steepness, the spectrum contains only significant wave height and period as parameters. For spectra given in this form, the computed peak frequencies coincide approximately
基金Supported by the Italian National Research Councilthe National Natural Science Foundation of China.
文摘This paper presents the number of combinatorially distinct rooted Eulerian planar maps with the number of non-root-vertices and the number of non-root-faces as two parameters. The parametric expressions for determining the number in the loopless Eulerian case are also obtained.
文摘-Theoretical form of equilibrium range is given on the basis of the wind wave frequency spectra proposed by Wenel al. (1988a,b,c, 1989a,b). The effects of peakness factor and water depth are discussed. In the case of deep water the e-quilibrium range is reduced to the form first proposed by Toba (1973) and the coefficient of the formula is shown to be the function of nondimensional fetch or peak frequency. Results of the present paper have been verified through field data.
文摘Glycidyl methaerylate (GMA) is a recently recognized chemical mutagen. In order to explore the mutagenicity and mutagenic process of GMA, plasmid pBR322 was used for in vitro binding, mutant screening, and restriction enzyme mapping. The binding between GMA and DNA in vitro has been verified by means of a spectrophotometric method. When pBR322 and GMAbound pBR322 were used to transform Eschenchia coli HB101, the following results were obtained: (1) The transformation efficiency of GMA-bound pBR322 was much lower than that of pBR322 alone. (2) GMA-bound pBR322 induced phenotype changes in competent cells (i.e., tetracycline-resistance inactivation or ampicillin-resistance inactivation). There were two mutants of pBR322, Ap^RTc^S and Ap^STc^R, in the transformants and a deductive mutant Ap^STc^S in the nontranstormants. (3) All of the selected mutants were stable and heritable. (4) When restriction enzyme maps were used to analyze the mutant Ap^RTc^S, four of seven maps were changed. some sites were shifted to other resistant gene regions, for example, sites of Bgll, EcoRl, Ilindlll. Hinclll, etc., and there was a new recognition site for Hindi (252). We did not observe any DNA fragment insertion or deletion on any maps. Our results suggest that when GMA is covalently linked to the plasmid DNA, it gives rise to a premutagenic lesion of DNA that is converted in vivo into a point mutation. (C)1990 Academic Press, Inc.