期刊文献+
共找到209,398篇文章
< 1 2 250 >
每页显示 20 50 100
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
1
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing Internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Damage evolution of rock-encased-backfill structure under stepwise cyclic triaxial loading 被引量:1
2
作者 Xin Yu Yuye Tan +4 位作者 Weidong Song John Kemeny Shengwen Qi Bowen Zheng Songfeng Guo 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第2期597-615,共19页
Rock-encased-backfill(RB)structures are common in underground mining,for example in the cut-andfill and stoping methods.To understand the effects of cyclic excavation and blasting activities on the damage of these RB ... Rock-encased-backfill(RB)structures are common in underground mining,for example in the cut-andfill and stoping methods.To understand the effects of cyclic excavation and blasting activities on the damage of these RB structures,a series of triaxial stepwise-increasing-amplitude cyclic loading experiments was conducted with cylindrical RB specimens(rock on outside,backfill on inside)with different volume fractions of rock(VF=0.48,0.61,0.73,and 0.84),confining pressures(0,6,9,and 12 MPa),and cyclic loading rates(200,300,400,and 500 N/s).The damage evolution and meso-crack formation during the cyclic tests were analyzed with results from stress-strain hysteresis loops,acoustic emission events,and post-failure X-ray 3D fracture morphology.The results showed significant differences between cyclic and monotonic loadings of RB specimens,particularly with regard to the generation of shear microcracks,the development of stress memory and strain hardening,and the contact forces and associated friction that develops along the rock-backfill interface.One important finding is that as a function of the number of cycles,the elastic strain increases linearly and the dissipated energy increases exponentially.Also,compared with monotonic loading,the cyclic strain hardening characteristics are more sensitive to rising confining pressures during the initial compaction stage.Another finding is that compared with monotonic loading,more shear microcracks are generated during every reloading stage,but these microcracks tend to be dispersed and lessen the likelihood of large shear fracture formation.The transition from elastic to plastic behavior varies depending on the parameters of each test(confinement,volume fraction,and cyclic rate),and an interesting finding was that the transformation to plastic behavior is significantly lower under the conditions of 0.73 rock volume fraction,400 N/s cyclic loading rate,and 9 MPa confinement.All the findings have important practical implications on the ability of backfill to support underground excavations. 展开更多
关键词 Rock and backfill Triaxial cyclic loading Volume fraction Damage evolution 3D visualization
下载PDF
Liquefaction susceptibility and deformation characteristics of saturated coral sandy soils subjected to cyclic loadings-a critical review 被引量:1
3
作者 Chen Guoxing Qin You +3 位作者 Ma Weijia Liang Ke Wu Qi C.Hsein Juang 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期261-296,共36页
Coral sandy soils widely exist in coral island reefs and seashores in tropical and subtropical regions.Due to the unique marine depositional environment of coral sandy soils,the engineering characteristics and respons... Coral sandy soils widely exist in coral island reefs and seashores in tropical and subtropical regions.Due to the unique marine depositional environment of coral sandy soils,the engineering characteristics and responses of these soils subjected to monotonic and cyclic loadings have been a subject of intense interest among the geotechnical and earthquake engineering communities.This paper critically reviews the progress of experimental investigations on the undrained behavior of coral sandy soils under monotonic and cyclic loadings over the last three decades.The focus of coverage includes the contractive-dilative behavior,the pattern of excess pore-water pressure(EPWP)generation and the liquefaction mechanism and liquefaction resistance,the small-strain shear modulus and strain-dependent shear modulus and damping,the cyclic softening feature,and the anisotropic characteristics of undrained responses of saturated coral sandy soils.In particular,the advances made in the past decades are reviewed from the following aspects:(1)the characterization of factors that impact the mechanism and patterns of EPWP build-up;(2)the identification of liquefaction triggering in terms of the apparent viscosity and the average flow coefficient;(3)the establishment of the invariable form of strain-based,stress-based,or energy-based EPWP ratio formulas and the unique relationship between the new proxy of liquefaction resistance and the number of cycles required to reach liquefaction;(4)the establishment of the invariable form of the predictive formulas of small strain modulus and strain-dependent shear modulus;and(5)the investigation on the effects of stress-induced anisotropy on liquefaction susceptibility and dynamic deformation characteristics.Insights gained through the critical review of these advances in the past decades offer a perspective for future research to further resolve the fundamental issues concerning the liquefaction mechanism and responses of coral sandy sites subjected to cyclic loadings associated with seismic events in marine environments. 展开更多
关键词 liquefaction susceptibility dynamic deformation characteristics coral sandy soil cyclic loading review and prospect
下载PDF
Lateral earth pressure of granular backfills on retaining walls with expanded polystyrene geofoam inclusions under limited surcharge loading 被引量:1
4
作者 Kewei Fan Guangqing Yang +2 位作者 Weilie Zou Zhong Han Yang Shen 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第4期1388-1397,共10页
Existing studies have focused on the behavior of the retaining wall equipped with expanded polystyrene(EPS)geofoam inclusions under semi-infinite surcharge loading rather than limited surcharge loading.In this paper,t... Existing studies have focused on the behavior of the retaining wall equipped with expanded polystyrene(EPS)geofoam inclusions under semi-infinite surcharge loading rather than limited surcharge loading.In this paper,the failure mode and the earth pressure acting on the rigid retaining wall with EPS geofoam inclusions and granular backfills(henceforth referred to as EPS-wall),under limited surcharge loading are investigated through two-and three-dimensional model tests.The testing results show that different from the sliding of almost all the backfill in the EPS-wall under semi-infinite surcharge loading,only an approximately triangular backfill slides in the wall under limited surcharge loading.The distribution of the lateral earth pressure on the EPS-wall under limited surcharge loading is non-linear,and the distribution changes from the increase of the wall depth to the decrease with the increase of the limited surcharge loading.An approach based on the force equilibrium of a differential element is developed to predict the lateral earth pressure behind the EPS-wall subjected to limited surcharge loading,and its performance was fully validated by the three-dimensional model tests. 展开更多
关键词 Retaining wall Expanded polystyrene(EPS)geofoam Limited surcharge loading Lateral earth pressure Model test Prediction
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
5
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
Optimal dispatching strategy for residential demand response considering load participation
6
作者 Xiaoyu Zhou Xiaofeng Liu +2 位作者 Huai Liu Zhenya Ji Feng Li 《Global Energy Interconnection》 EI CSCD 2024年第1期38-47,共10页
To facilitate the coordinated and large-scale participation of residential flexible loads in demand response(DR),a load aggregator(LA)can integrate these loads for scheduling.In this study,a residential DR optimizatio... To facilitate the coordinated and large-scale participation of residential flexible loads in demand response(DR),a load aggregator(LA)can integrate these loads for scheduling.In this study,a residential DR optimization scheduling strategy was formulated considering the participation of flexible loads in DR.First,based on the operational characteristics of flexible loads such as electric vehicles,air conditioners,and dishwashers,their DR participation,the base to calculate the compensation price to users,was determined by considering these loads as virtual energy storage.It was quantified based on the state of virtual energy storage during each time slot.Second,flexible loads were clustered using the K-means algorithm,considering the typical operational and behavioral characteristics as the cluster centroid.Finally,the LA scheduling strategy was implemented by introducing a DR mechanism based on the directrix load.The simulation results demonstrate that the proposed DR approach can effectively reduce peak loads and fill valleys,thereby improving the load management performance. 展开更多
关键词 Residential demand response Flexible loads load participation load aggregator
下载PDF
Generalized load graphical forecasting method based on modal decomposition
7
作者 Lizhen Wu Peixin Chang +1 位作者 Wei Chen Tingting Pei 《Global Energy Interconnection》 EI CSCD 2024年第2期166-178,共13页
In a“low-carbon”context,the power load is affected by the coupling of multiple factors,which gradually evolves from the traditional“pure load”to the generalized load with the dual characteristics of“load+power su... In a“low-carbon”context,the power load is affected by the coupling of multiple factors,which gradually evolves from the traditional“pure load”to the generalized load with the dual characteristics of“load+power supply.”Traditional time-series forecasting methods are no longer suitable owing to the complexity and uncertainty associated with generalized loads.From the perspective of image processing,this study proposes a graphical short-term prediction method for generalized loads based on modal decomposition.First,the datasets are normalized and feature-filtered by comparing the results of Xtreme gradient boosting,gradient boosted decision tree,and random forest algorithms.Subsequently,the generalized load data are decomposed into three sets of modalities by modal decomposition,and red,green,and blue(RGB)images are generated using them as the pixel values of the R,G,and B channels.The generated images are diversified,and an optimized DenseNet neural network was used for training and prediction.Finally,the base load,wind power,and photovoltaic power generation data are selected,and the characteristic curves of the generalized load scenarios under different permeabilities of wind power and photovoltaic power generation are obtained using the density-based spatial clustering of applications with noise algorithm.Based on the proposed graphical forecasting method,the feasibility of the generalized load graphical forecasting method is verified by comparing it with the traditional time-series forecasting method. 展开更多
关键词 load forecasting Generalized load Image processing DenseNet Modal decomposition
下载PDF
Mechanical responses of anchoring structure under triaxial cyclic loading
8
作者 Peng Wang Nong Zhang +5 位作者 Qun Wei Xingliang Xu Guangzhen Cui Aoran Li Sen Yang Jiaguang Kan 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第2期545-560,共16页
Dynamic load on anchoring structures(AS)within deep roadways can result in cumulative damage and failure.This study develops an experimental device designed to test AS under triaxial loads.The device enables the inves... Dynamic load on anchoring structures(AS)within deep roadways can result in cumulative damage and failure.This study develops an experimental device designed to test AS under triaxial loads.The device enables the investigation of the mechanical response,failure mode,instability assessment criteria,and anchorage effect of AS subjected to combined cyclic dynamic-static triaxial stress paths.The results show that the peak bearing strength is positively correlated with the anchoring matrix strength,anchorage length,and edgewise compressive strength.The bearing capacity decreases significantly when the anchorage direction is severely inclined.The free face failure modes are typically transverse cracking,concave fracturing,V-shaped slipping and detachment,and spallation detachment.Besides,when the anchoring matrix strength and the anchorage length decrease while the edgewise compressive strength,loading rate,and anchorage inclination angle increase,the failure intensity rises.Instability is determined by a negative tangent modulus of the displacement-strength curve or the continued deformation increase against the general downward trend.Under cyclic loads,the driving force that breaks the rock mass along the normal vector and the rigidity of the AS are the two factors that determine roadway stability.Finally,a control measure for surrounding rock stability is proposed to reduce the internal driving force via a pressure relief method and improve the rigidity of the AS by full-length anchorage and grouting modification. 展开更多
关键词 Triaxial stress Dynamic-static combination load Cyclic loading Anchoring structure(AS) Cumulative damage
下载PDF
Commentary on"Speed and surface steepness affect internal tibial loading during running"
9
作者 Michael Baggaley Arash Khassetarash 《Journal of Sport and Health Science》 SCIE CSCD 2024年第1期125-126,共2页
It is a pleasure to write a commentary on the work of Dr.Hannah Rice and colleagues,l who have advanced our understanding of how the mechanical loading environment of the tibia changes as a function of running grade a... It is a pleasure to write a commentary on the work of Dr.Hannah Rice and colleagues,l who have advanced our understanding of how the mechanical loading environment of the tibia changes as a function of running grade and speed.It is important that we understand how the tibia is loaded during conditions that an individual is likely to encounter when running as it is these internal loads which we believe are responsible for the development of bone-stress injuries. 展开更多
关键词 loadING INJURIES LIKELY
下载PDF
A novel approach to the dynamic response analysis of Euler-Bernoulli beams resting on a Winkler soil model and subjected to impact loads
10
作者 Adolfo Foriero Filippo Santucci de Magistris Giovanni Fabbrocino 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第2期389-401,共13页
This work presents a novel approach to the dynamic response analysis of a Euler-Bernoulli beam resting on a Winkler soil model and subjected to an impact loading.The approach considers that damping has much less impor... This work presents a novel approach to the dynamic response analysis of a Euler-Bernoulli beam resting on a Winkler soil model and subjected to an impact loading.The approach considers that damping has much less importance in controlling the maximum response to impulsive loadings because the maximum response is reached in a very short time,before the damping forces can dissipate a significant portion of the energy input into the system.The development of two sine series solutions,relating to different types of impulsive loadings,one involving a single concentrated force and the other a distributed line load,are presented.This study revealed that when a simply supported Euler-Bernoulli beam,resting on a Winkler soil model,is subject to an impact load,the resulting vertical displacements,bending moments and shear forces produced along the span of the beam are considerably affected.In particular,the quantification of this effect is best observed,relative to the corresponding static solution,via an amplification factor.The computed impact amplification factors,for the sub-grade moduli used in this study,were in magnitude greater than 2,thus confirming the multiple-degree-of-freedom nature of the problem. 展开更多
关键词 beam-Winkler-soil model sub-grade moduli impact load impact distributed line load dynamic solution impact amplification factor
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
11
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
Prevalence and Factors Associated with Sharing of Human Immunodeficiency Seropositivity Status among Serodiscordant Couples in the City of Parakou (Benin)
12
作者 Djossou Sègnon Eurydice Elvire Damien Georgia Barikissou +7 位作者 Meba Bio Mamatou Tokpanoude Ignace Ahanhanzo-Glele Rhonel Ataigba Iretinethania Elie Agossoukpe Benoit Kakpo-Zannou Rodrigue Kamoutchoni Corneille Aguemon Badirou 《Open Journal of Epidemiology》 2024年第1期1-18,共18页
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am... Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple. 展开更多
关键词 Serodiscordance sharing of Serostatus HIV PARTNER BENIN
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
13
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
14
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image sharing Verifiability
下载PDF
Verifiable quantum secret sharing scheme based on orthogonal product states
15
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
下载PDF
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
16
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
17
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
18
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Evolution of molecular structure of TATB under shock loading from transient Raman spectroscopic technique
19
作者 Hongliang Kang Xue Yang +5 位作者 Wenshuo Yuan Lei Yang Xinghan Li Fusheng Liu Zhengtang Liu Qijun Liu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期613-620,共8页
By combination of the transient Raman spectroscopic measurement and the density functional theoretical calculations,the structural evolution and stability of TATB under shock compression was investigated.Due to the im... By combination of the transient Raman spectroscopic measurement and the density functional theoretical calculations,the structural evolution and stability of TATB under shock compression was investigated.Due to the improvement in synchronization control between two-stage light gas gun and the transient Raman spectra acquisition,as well as the sample preparation,the Raman peak of the N-O mode of TATB was firstly observed under shock pressure up to 13.6 GPa,noticeably higher than the upper limit of 8.5 GPa reported in available literatures.By taking into account of the continuous shift of the main peak and other observed Raman peaks,we did not distinguish any structural transition or any new species.Moreover,both the present Raman spectra and the time-resolved radiation of TATB during shock loading showed that TATB exhibits higher chemical stability than previous declaration.To reveal the detailed structural response and evolution of TATB under compression,the density functional theoretical calculations were conducted,and it was found that the pressure make N-O bond lengths shorter,nitro bond angles larger,and intermolecular and intra-molecular hydrogen bond interactions enhanced.The observed red shift of Raman peak was ascribed to the abnormal enhancement of H-bound effect on the scissor vibration mode of the nitro group. 展开更多
关键词 TATB Raman spectra Structural evolution Shock loading
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
20
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部