Formal credit is critical in agricultural production,allowing more expenditure and productive input,thereby improving farmers'welfare.In pastoral China,formal financial institutions are gradually increasing.Howeve...Formal credit is critical in agricultural production,allowing more expenditure and productive input,thereby improving farmers'welfare.In pastoral China,formal financial institutions are gradually increasing.However,a limited understanding remains of how formal credit affects herders'household expenses.Based on a survey of 544 herders from the Qinghai-Xizang Plateau of China,this study adopted the propensity score matching approach to identify the effect of formal credit on herders'total household expenses,daily expenses,and productive expenses.The results found that average age,grassland mortgage,and other variables significantly affected herders'participation in formal credit.Formal credit could significantly improve household expenses,especially productive expenses.A heterogeneity analysis showed that formal credit had a greater impact on the household total expense for those at higher levels of wealth;however,it significantly affected the productive expense of herders at lower wealth levels.Moreover,the mediating effect indicated that formal credit could affect herders'household income,thus influencing their household expenses.Finally,this study suggests that policies should improve herders'accessibility to formal credit.展开更多
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec...Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.展开更多
In this paper, a kind of multi-level formal concept is introduced. Based on the proposed multi-level formal concept,we present a pair of rough fuzzy set approximations within fuzzy formal contexts.By the proposed roug...In this paper, a kind of multi-level formal concept is introduced. Based on the proposed multi-level formal concept,we present a pair of rough fuzzy set approximations within fuzzy formal contexts.By the proposed rough fuzzy set approximations,we can approximate a fuzzy set according to different precision level.We discuss the properties of the proposed approximation operators in detail.展开更多
A self-adaptive resource provisioning on demand is a critical factor in cloud computing.The selection of accurate amount of resources at run time is not easy due to dynamic nature of requests.Therefore,a self-adaptive...A self-adaptive resource provisioning on demand is a critical factor in cloud computing.The selection of accurate amount of resources at run time is not easy due to dynamic nature of requests.Therefore,a self-adaptive strategy of resources is required to deal with dynamic nature of requests based on run time change in workload.In this paper we proposed a Cloud-based Adaptive Resource Scheduling Strategy(CARSS)Framework that formally addresses these issues and is more expressive than traditional approaches.The decision making in CARSS is based on more than one factors.TheMAPE-K based framework determines the state of the resources based on their current utilization.Timed-Arc Petri Net(TAPN)is used to model system formally and behaviour is expressed in TCTL,while TAPAAL model checker verifies the underline properties of the system.展开更多
In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work build...In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work builds a Hyperledger Fabric blockchain runtime model.It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages.This methodology utilizes an external application programming interface(API)table to replace the source codes in compilation,thereby pruning the part of housekeeping codes to ease code inflation.Code inflation is a significant metric in formal language translation.Namely,minor code inflation enhances verification scale and performance efficiency.It determines the efficiency of formal verification,involving launching,running,and memory usage.For instance,path explosion increases exponentially,resulting in out-of-memory.The experimental results conclude that program languages like golang severely impact code inflation.FVPS reduces the wasm code size by over 90%,achieving two orders of optimization magnitude,from 2000 kilobyte(KB)to 90 KB.That means we can cope with golang applications up to 20 times larger than the original in scale.This work eliminates the gap between Hyperledger Fabric smart contracts and WebAssembly.Our approach is pragmatic,adaptable,extendable,and flexible.Nowadays,FVPS is successfully applied in a Railway-Port-Aviation blockchain transportation system.展开更多
Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutation...Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations.However,the existing naive MTD studies were conducted focusing only on wired network mutations.And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations,such as hostility,mobility,and dependency.Therefore,to solve these conceptual limitations,this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that optimizes the period-based mutation principle to adaptively secure the sustainability of drone operations.In addition,this study also specifies MF2-DMTD(model-checkingbased formal framework for drone-type MTD),a formal framework that adopts model-checking and zero-sum game,for attack-defense simulation and performance evaluation of drone-type MTD.Subsequently,by applying the proposed models,the optimization of deceptive defense performance of drone-type MTD for each mutation period also additionally achieves through mixed-integer quadratic constrained programming(MIQCP)and multiobjective optimization-based Pareto frontier.As a result,the optimal mutation cycles in drone-type MTD were derived as(65,120,85)for each control-mobility,telecommunication,and payload component configured inside the drone.And the optimal MTD cycles for each swarming cluster,ground control station(GCS),and zone service provider(ZSP)deployed outside the drone were also additionally calculated as(70,60,85),respectively.To the best of these authors’knowledge,this study is the first to calculate the deceptive efficiency and functional continuity of the MTD against drones and to normalize the trade-off according to a sensitivity analysis with the optimum.展开更多
The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be mode...The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be modeled using the Maximum Ordinality Principle and its associated formal language, known as the “Incipient” Differential Calculus (IDC).展开更多
We investigate the rotating wave approximation applied in the high-spin quantum system driven by a linearly polarized alternating magnetic field in the presence of quadrupole interactions.The conventional way to apply...We investigate the rotating wave approximation applied in the high-spin quantum system driven by a linearly polarized alternating magnetic field in the presence of quadrupole interactions.The conventional way to apply the rotating wave approximation in a driven high-spin system is to assume the dynamics being restricted in the reduced Hilbert space.However,when the driving strength is relatively strong or the driving is off resonant,the leakage from the target resonance subspace cannot be neglected for a multi-level quantum system.We propose the correct formalism to apply the rotating wave approximation in the full Hilbert space by taking this leakage into account.By estimating the operator fidelity of the time propagator,our formalism applied in the full Hilbert space unambiguously manifests great advantages over the conventional method applied in the reduced Hilbert space.展开更多
China’s financial system is characterized by the coexistence of both formal and informal finance,and informal finance appears to be more prevalent in the south of the country compared to the north.In this paper,we us...China’s financial system is characterized by the coexistence of both formal and informal finance,and informal finance appears to be more prevalent in the south of the country compared to the north.In this paper,we use the historical demarcation of rice-farming regions and the percentage area of rice sown to ascertain the regional distribution of rice farming in the south and wheat farming in the north in order to analyze the role of rice farming in the evolution of different types of financial institutions in China.We find that rice cultivation has a positive effect on informal financial development,though its impact on formal finance is insignificant.Unlike wheat farming,rice cultivation requires farmers to collaborate during busy farming seasons and necessitates the construction of irrigation systems.Such collaboration helped enhance an acquaintance society,in which both parties to transactions enforced the rules and contract terms of their own initiative,paving the way for informal finance.This paper not only demonstrates the cultural roots of the regional financial disparities in China but also expands the research on the ways in which farming practices from the past have shaped the development of China’s present financial markets.展开更多
Let U be a (B, A)-bimodule, A and B be rings, and be a formal triangular matrix ring. In this paper, we characterize the structure of relative Ding projective modules over T under some conditions. Furthermore, using t...Let U be a (B, A)-bimodule, A and B be rings, and be a formal triangular matrix ring. In this paper, we characterize the structure of relative Ding projective modules over T under some conditions. Furthermore, using the left global relative Ding projective dimensions of A and B, we estimate the relative Ding projective dimension of a left T-module.展开更多
An image can be degraded due to many environmental factors like foggy or hazy weather,low light conditions,extra light conditions etc.Image captured under the poor light conditions is generally known as non-uniform il...An image can be degraded due to many environmental factors like foggy or hazy weather,low light conditions,extra light conditions etc.Image captured under the poor light conditions is generally known as non-uniform illumination image.Non-uniform illumination hides some important information present in an image during the image capture Also,it degrades the visual quality of image which generates the need for enhancement of such images.Various techniques have been present in literature for the enhancement of such type of images.In this paper,a novel architecture has been proposed for enhancement of poor illumination images which uses radial basis approximations based BEMD(Bi-dimensional Empirical Mode Decomposition).The enhancement algorithm is applied on intensity and saturation components of image.Firstly,intensity component has been decomposed into various bi-dimensional intrinsic mode function and residue by using sifting algorithm.Secondly,some linear transformations techniques have been applied on various bidimensional intrinsic modes obtained and residue and further on joining the transformed modes with residue,enhanced intensity component is obtained.Saturation part of an image is then enhanced in accordance to the enhanced intensity component.Final enhanced image can be obtained by joining the hue,enhanced intensity and enhanced saturation parts of the given image.The proposed algorithm will not only give the visual pleasant image but maintains the naturalness of image also.展开更多
The theory of rough set represents a non-statistical methodology for analyzing ambiguity and imprecise information.It can be characterized by two crisp sets,named the upper and lower approximations that are used to de...The theory of rough set represents a non-statistical methodology for analyzing ambiguity and imprecise information.It can be characterized by two crisp sets,named the upper and lower approximations that are used to determine the boundary region and accurate measure of any subset.This article endeavors to achieve the best approximation and the highest accuracy degree by using the minimal structure approximation space MSAS via ideal J.The novel approach(indicated by JMSAS)modifies the approximation space to diminish the bound-ary region and enhance the measure of accuracy.The suggested method is more accurate than Pawlak’s and EL-Sharkasy techniques.Via illustrated examples,several remarkable results using these notions are obtained and some of their properties are established.Several sorts of near open(resp.closed)sets based on JMSAS are studied.Furthermore,the connections between these assorted kinds of near-open sets in JMSAS are deduced.The advantages and disadvan-tages of the proposed approach compared to previous ones are examined.An algorithm using MATLAB and a framework for decision-making problems are verified.Finally,the chemical application for the classification of amino acids(AAs)is treated to highlight the significance of applying the suggested approximation.展开更多
The Large High Altitude Air Shower Observatory(LHAASO),a major project as part of China’s national scientific and technological infrastructure,passed the national acceptance assessment and formally went into operatio...The Large High Altitude Air Shower Observatory(LHAASO),a major project as part of China’s national scientific and technological infrastructure,passed the national acceptance assessment and formally went into operation on May 10.Dedicated to cosmic ray observation and research,the design of LHAASO was approved by the national authorities on December 31,2015.Jointly sponsored by the Chinese Academy of Sciences(CAS)and the People’s Government of Sichuan Province,the construction of the principal part of the facility began in 2017 and was completed in 2021.展开更多
基金funding from the National Natural Science Foundation of China (72303086)the Leading Scientist Project of Qinghai Province, China (2023-NK-147)+1 种基金the Consulting Project of Chinese Academy of Engineering (2023-XY-28,2022-XY-139)the Fundamental Research Funds for the Central Universities, China (lzujbky-2022-sp13)
文摘Formal credit is critical in agricultural production,allowing more expenditure and productive input,thereby improving farmers'welfare.In pastoral China,formal financial institutions are gradually increasing.However,a limited understanding remains of how formal credit affects herders'household expenses.Based on a survey of 544 herders from the Qinghai-Xizang Plateau of China,this study adopted the propensity score matching approach to identify the effect of formal credit on herders'total household expenses,daily expenses,and productive expenses.The results found that average age,grassland mortgage,and other variables significantly affected herders'participation in formal credit.Formal credit could significantly improve household expenses,especially productive expenses.A heterogeneity analysis showed that formal credit had a greater impact on the household total expense for those at higher levels of wealth;however,it significantly affected the productive expense of herders at lower wealth levels.Moreover,the mediating effect indicated that formal credit could affect herders'household income,thus influencing their household expenses.Finally,this study suggests that policies should improve herders'accessibility to formal credit.
基金the National Natural Science Foundation of China(Nos.61562026,61962020)Academic and Technical Leaders of Major Disciplines in Jiangxi Province(No.20172BCB22015)+1 种基金Special Fund Project for Postgraduate Innovation in Jiangxi Province(No.YC2020-B1141)Jiangxi Provincial Natural Science Foundation(No.20224ACB202006).
文摘Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.
文摘In this paper, a kind of multi-level formal concept is introduced. Based on the proposed multi-level formal concept,we present a pair of rough fuzzy set approximations within fuzzy formal contexts.By the proposed rough fuzzy set approximations,we can approximate a fuzzy set according to different precision level.We discuss the properties of the proposed approximation operators in detail.
文摘A self-adaptive resource provisioning on demand is a critical factor in cloud computing.The selection of accurate amount of resources at run time is not easy due to dynamic nature of requests.Therefore,a self-adaptive strategy of resources is required to deal with dynamic nature of requests based on run time change in workload.In this paper we proposed a Cloud-based Adaptive Resource Scheduling Strategy(CARSS)Framework that formally addresses these issues and is more expressive than traditional approaches.The decision making in CARSS is based on more than one factors.TheMAPE-K based framework determines the state of the resources based on their current utilization.Timed-Arc Petri Net(TAPN)is used to model system formally and behaviour is expressed in TCTL,while TAPAAL model checker verifies the underline properties of the system.
基金This work was supported by the National Key R&D Program of China,Grant No.2018YFA0306703.
文摘In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work builds a Hyperledger Fabric blockchain runtime model.It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages.This methodology utilizes an external application programming interface(API)table to replace the source codes in compilation,thereby pruning the part of housekeeping codes to ease code inflation.Code inflation is a significant metric in formal language translation.Namely,minor code inflation enhances verification scale and performance efficiency.It determines the efficiency of formal verification,involving launching,running,and memory usage.For instance,path explosion increases exponentially,resulting in out-of-memory.The experimental results conclude that program languages like golang severely impact code inflation.FVPS reduces the wasm code size by over 90%,achieving two orders of optimization magnitude,from 2000 kilobyte(KB)to 90 KB.That means we can cope with golang applications up to 20 times larger than the original in scale.This work eliminates the gap between Hyperledger Fabric smart contracts and WebAssembly.Our approach is pragmatic,adaptable,extendable,and flexible.Nowadays,FVPS is successfully applied in a Railway-Port-Aviation blockchain transportation system.
基金funding by the Challengeable Future Defense Technology Research and Development Program through the Agency For Defense Development(ADD)funded by the Defense Acquisition Program Administration(DAPA)in 2023(No.915024201).
文摘Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations.However,the existing naive MTD studies were conducted focusing only on wired network mutations.And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations,such as hostility,mobility,and dependency.Therefore,to solve these conceptual limitations,this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that optimizes the period-based mutation principle to adaptively secure the sustainability of drone operations.In addition,this study also specifies MF2-DMTD(model-checkingbased formal framework for drone-type MTD),a formal framework that adopts model-checking and zero-sum game,for attack-defense simulation and performance evaluation of drone-type MTD.Subsequently,by applying the proposed models,the optimization of deceptive defense performance of drone-type MTD for each mutation period also additionally achieves through mixed-integer quadratic constrained programming(MIQCP)and multiobjective optimization-based Pareto frontier.As a result,the optimal mutation cycles in drone-type MTD were derived as(65,120,85)for each control-mobility,telecommunication,and payload component configured inside the drone.And the optimal MTD cycles for each swarming cluster,ground control station(GCS),and zone service provider(ZSP)deployed outside the drone were also additionally calculated as(70,60,85),respectively.To the best of these authors’knowledge,this study is the first to calculate the deceptive efficiency and functional continuity of the MTD against drones and to normalize the trade-off according to a sensitivity analysis with the optimum.
文摘The main objective of this paper is to demonstrate that the internal processes of Self-Organizing Systems represent a unique and singular process, characterized by their specific generativity. This process can be modeled using the Maximum Ordinality Principle and its associated formal language, known as the “Incipient” Differential Calculus (IDC).
基金the National Key Research and Development Program of China(Grant Nos.2017YFA0304202 and 2017YFA0205700)the National Natural Science Foundation of China(Grant Nos.11875231 and 11935012)the Fundamental Research Funds for the Central Universities(Grant No.2018FZA3005).
文摘We investigate the rotating wave approximation applied in the high-spin quantum system driven by a linearly polarized alternating magnetic field in the presence of quadrupole interactions.The conventional way to apply the rotating wave approximation in a driven high-spin system is to assume the dynamics being restricted in the reduced Hilbert space.However,when the driving strength is relatively strong or the driving is off resonant,the leakage from the target resonance subspace cannot be neglected for a multi-level quantum system.We propose the correct formalism to apply the rotating wave approximation in the full Hilbert space by taking this leakage into account.By estimating the operator fidelity of the time propagator,our formalism applied in the full Hilbert space unambiguously manifests great advantages over the conventional method applied in the reduced Hilbert space.
基金sponsorships from the National Natural Science Foundation of China(Grant No.72273075,71703080)the MOE(Ministry of Education in China)Liberal Arts and Social Sciences Foundation(Grant No.21YJC790156)+2 种基金the Major Project of the Guangxi Academy for the Chinese National Community Awareness(Grant No.2020GXMGY0103)the General Project of the Provincial Natural Science Foundation of Shandong Province(Grant No.ZR2020MG063)the Qilu Young Scholars Program and Young Scholars Future Plan of Shandong University.
文摘China’s financial system is characterized by the coexistence of both formal and informal finance,and informal finance appears to be more prevalent in the south of the country compared to the north.In this paper,we use the historical demarcation of rice-farming regions and the percentage area of rice sown to ascertain the regional distribution of rice farming in the south and wheat farming in the north in order to analyze the role of rice farming in the evolution of different types of financial institutions in China.We find that rice cultivation has a positive effect on informal financial development,though its impact on formal finance is insignificant.Unlike wheat farming,rice cultivation requires farmers to collaborate during busy farming seasons and necessitates the construction of irrigation systems.Such collaboration helped enhance an acquaintance society,in which both parties to transactions enforced the rules and contract terms of their own initiative,paving the way for informal finance.This paper not only demonstrates the cultural roots of the regional financial disparities in China but also expands the research on the ways in which farming practices from the past have shaped the development of China’s present financial markets.
文摘Let U be a (B, A)-bimodule, A and B be rings, and be a formal triangular matrix ring. In this paper, we characterize the structure of relative Ding projective modules over T under some conditions. Furthermore, using the left global relative Ding projective dimensions of A and B, we estimate the relative Ding projective dimension of a left T-module.
基金This research is financially supported by the Deanship of Scientific Research at King Khalid University under research grant number(R.G.P 2/157/43).
文摘An image can be degraded due to many environmental factors like foggy or hazy weather,low light conditions,extra light conditions etc.Image captured under the poor light conditions is generally known as non-uniform illumination image.Non-uniform illumination hides some important information present in an image during the image capture Also,it degrades the visual quality of image which generates the need for enhancement of such images.Various techniques have been present in literature for the enhancement of such type of images.In this paper,a novel architecture has been proposed for enhancement of poor illumination images which uses radial basis approximations based BEMD(Bi-dimensional Empirical Mode Decomposition).The enhancement algorithm is applied on intensity and saturation components of image.Firstly,intensity component has been decomposed into various bi-dimensional intrinsic mode function and residue by using sifting algorithm.Secondly,some linear transformations techniques have been applied on various bidimensional intrinsic modes obtained and residue and further on joining the transformed modes with residue,enhanced intensity component is obtained.Saturation part of an image is then enhanced in accordance to the enhanced intensity component.Final enhanced image can be obtained by joining the hue,enhanced intensity and enhanced saturation parts of the given image.The proposed algorithm will not only give the visual pleasant image but maintains the naturalness of image also.
文摘The theory of rough set represents a non-statistical methodology for analyzing ambiguity and imprecise information.It can be characterized by two crisp sets,named the upper and lower approximations that are used to determine the boundary region and accurate measure of any subset.This article endeavors to achieve the best approximation and the highest accuracy degree by using the minimal structure approximation space MSAS via ideal J.The novel approach(indicated by JMSAS)modifies the approximation space to diminish the bound-ary region and enhance the measure of accuracy.The suggested method is more accurate than Pawlak’s and EL-Sharkasy techniques.Via illustrated examples,several remarkable results using these notions are obtained and some of their properties are established.Several sorts of near open(resp.closed)sets based on JMSAS are studied.Furthermore,the connections between these assorted kinds of near-open sets in JMSAS are deduced.The advantages and disadvan-tages of the proposed approach compared to previous ones are examined.An algorithm using MATLAB and a framework for decision-making problems are verified.Finally,the chemical application for the classification of amino acids(AAs)is treated to highlight the significance of applying the suggested approximation.
文摘The Large High Altitude Air Shower Observatory(LHAASO),a major project as part of China’s national scientific and technological infrastructure,passed the national acceptance assessment and formally went into operation on May 10.Dedicated to cosmic ray observation and research,the design of LHAASO was approved by the national authorities on December 31,2015.Jointly sponsored by the Chinese Academy of Sciences(CAS)and the People’s Government of Sichuan Province,the construction of the principal part of the facility began in 2017 and was completed in 2021.