High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
Rock-encased-backfill(RB)structures are common in underground mining,for example in the cut-andfill and stoping methods.To understand the effects of cyclic excavation and blasting activities on the damage of these RB ...Rock-encased-backfill(RB)structures are common in underground mining,for example in the cut-andfill and stoping methods.To understand the effects of cyclic excavation and blasting activities on the damage of these RB structures,a series of triaxial stepwise-increasing-amplitude cyclic loading experiments was conducted with cylindrical RB specimens(rock on outside,backfill on inside)with different volume fractions of rock(VF=0.48,0.61,0.73,and 0.84),confining pressures(0,6,9,and 12 MPa),and cyclic loading rates(200,300,400,and 500 N/s).The damage evolution and meso-crack formation during the cyclic tests were analyzed with results from stress-strain hysteresis loops,acoustic emission events,and post-failure X-ray 3D fracture morphology.The results showed significant differences between cyclic and monotonic loadings of RB specimens,particularly with regard to the generation of shear microcracks,the development of stress memory and strain hardening,and the contact forces and associated friction that develops along the rock-backfill interface.One important finding is that as a function of the number of cycles,the elastic strain increases linearly and the dissipated energy increases exponentially.Also,compared with monotonic loading,the cyclic strain hardening characteristics are more sensitive to rising confining pressures during the initial compaction stage.Another finding is that compared with monotonic loading,more shear microcracks are generated during every reloading stage,but these microcracks tend to be dispersed and lessen the likelihood of large shear fracture formation.The transition from elastic to plastic behavior varies depending on the parameters of each test(confinement,volume fraction,and cyclic rate),and an interesting finding was that the transformation to plastic behavior is significantly lower under the conditions of 0.73 rock volume fraction,400 N/s cyclic loading rate,and 9 MPa confinement.All the findings have important practical implications on the ability of backfill to support underground excavations.展开更多
Coral sandy soils widely exist in coral island reefs and seashores in tropical and subtropical regions.Due to the unique marine depositional environment of coral sandy soils,the engineering characteristics and respons...Coral sandy soils widely exist in coral island reefs and seashores in tropical and subtropical regions.Due to the unique marine depositional environment of coral sandy soils,the engineering characteristics and responses of these soils subjected to monotonic and cyclic loadings have been a subject of intense interest among the geotechnical and earthquake engineering communities.This paper critically reviews the progress of experimental investigations on the undrained behavior of coral sandy soils under monotonic and cyclic loadings over the last three decades.The focus of coverage includes the contractive-dilative behavior,the pattern of excess pore-water pressure(EPWP)generation and the liquefaction mechanism and liquefaction resistance,the small-strain shear modulus and strain-dependent shear modulus and damping,the cyclic softening feature,and the anisotropic characteristics of undrained responses of saturated coral sandy soils.In particular,the advances made in the past decades are reviewed from the following aspects:(1)the characterization of factors that impact the mechanism and patterns of EPWP build-up;(2)the identification of liquefaction triggering in terms of the apparent viscosity and the average flow coefficient;(3)the establishment of the invariable form of strain-based,stress-based,or energy-based EPWP ratio formulas and the unique relationship between the new proxy of liquefaction resistance and the number of cycles required to reach liquefaction;(4)the establishment of the invariable form of the predictive formulas of small strain modulus and strain-dependent shear modulus;and(5)the investigation on the effects of stress-induced anisotropy on liquefaction susceptibility and dynamic deformation characteristics.Insights gained through the critical review of these advances in the past decades offer a perspective for future research to further resolve the fundamental issues concerning the liquefaction mechanism and responses of coral sandy sites subjected to cyclic loadings associated with seismic events in marine environments.展开更多
Existing studies have focused on the behavior of the retaining wall equipped with expanded polystyrene(EPS)geofoam inclusions under semi-infinite surcharge loading rather than limited surcharge loading.In this paper,t...Existing studies have focused on the behavior of the retaining wall equipped with expanded polystyrene(EPS)geofoam inclusions under semi-infinite surcharge loading rather than limited surcharge loading.In this paper,the failure mode and the earth pressure acting on the rigid retaining wall with EPS geofoam inclusions and granular backfills(henceforth referred to as EPS-wall),under limited surcharge loading are investigated through two-and three-dimensional model tests.The testing results show that different from the sliding of almost all the backfill in the EPS-wall under semi-infinite surcharge loading,only an approximately triangular backfill slides in the wall under limited surcharge loading.The distribution of the lateral earth pressure on the EPS-wall under limited surcharge loading is non-linear,and the distribution changes from the increase of the wall depth to the decrease with the increase of the limited surcharge loading.An approach based on the force equilibrium of a differential element is developed to predict the lateral earth pressure behind the EPS-wall subjected to limited surcharge loading,and its performance was fully validated by the three-dimensional model tests.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
To facilitate the coordinated and large-scale participation of residential flexible loads in demand response(DR),a load aggregator(LA)can integrate these loads for scheduling.In this study,a residential DR optimizatio...To facilitate the coordinated and large-scale participation of residential flexible loads in demand response(DR),a load aggregator(LA)can integrate these loads for scheduling.In this study,a residential DR optimization scheduling strategy was formulated considering the participation of flexible loads in DR.First,based on the operational characteristics of flexible loads such as electric vehicles,air conditioners,and dishwashers,their DR participation,the base to calculate the compensation price to users,was determined by considering these loads as virtual energy storage.It was quantified based on the state of virtual energy storage during each time slot.Second,flexible loads were clustered using the K-means algorithm,considering the typical operational and behavioral characteristics as the cluster centroid.Finally,the LA scheduling strategy was implemented by introducing a DR mechanism based on the directrix load.The simulation results demonstrate that the proposed DR approach can effectively reduce peak loads and fill valleys,thereby improving the load management performance.展开更多
In a“low-carbon”context,the power load is affected by the coupling of multiple factors,which gradually evolves from the traditional“pure load”to the generalized load with the dual characteristics of“load+power su...In a“low-carbon”context,the power load is affected by the coupling of multiple factors,which gradually evolves from the traditional“pure load”to the generalized load with the dual characteristics of“load+power supply.”Traditional time-series forecasting methods are no longer suitable owing to the complexity and uncertainty associated with generalized loads.From the perspective of image processing,this study proposes a graphical short-term prediction method for generalized loads based on modal decomposition.First,the datasets are normalized and feature-filtered by comparing the results of Xtreme gradient boosting,gradient boosted decision tree,and random forest algorithms.Subsequently,the generalized load data are decomposed into three sets of modalities by modal decomposition,and red,green,and blue(RGB)images are generated using them as the pixel values of the R,G,and B channels.The generated images are diversified,and an optimized DenseNet neural network was used for training and prediction.Finally,the base load,wind power,and photovoltaic power generation data are selected,and the characteristic curves of the generalized load scenarios under different permeabilities of wind power and photovoltaic power generation are obtained using the density-based spatial clustering of applications with noise algorithm.Based on the proposed graphical forecasting method,the feasibility of the generalized load graphical forecasting method is verified by comparing it with the traditional time-series forecasting method.展开更多
Dynamic load on anchoring structures(AS)within deep roadways can result in cumulative damage and failure.This study develops an experimental device designed to test AS under triaxial loads.The device enables the inves...Dynamic load on anchoring structures(AS)within deep roadways can result in cumulative damage and failure.This study develops an experimental device designed to test AS under triaxial loads.The device enables the investigation of the mechanical response,failure mode,instability assessment criteria,and anchorage effect of AS subjected to combined cyclic dynamic-static triaxial stress paths.The results show that the peak bearing strength is positively correlated with the anchoring matrix strength,anchorage length,and edgewise compressive strength.The bearing capacity decreases significantly when the anchorage direction is severely inclined.The free face failure modes are typically transverse cracking,concave fracturing,V-shaped slipping and detachment,and spallation detachment.Besides,when the anchoring matrix strength and the anchorage length decrease while the edgewise compressive strength,loading rate,and anchorage inclination angle increase,the failure intensity rises.Instability is determined by a negative tangent modulus of the displacement-strength curve or the continued deformation increase against the general downward trend.Under cyclic loads,the driving force that breaks the rock mass along the normal vector and the rigidity of the AS are the two factors that determine roadway stability.Finally,a control measure for surrounding rock stability is proposed to reduce the internal driving force via a pressure relief method and improve the rigidity of the AS by full-length anchorage and grouting modification.展开更多
It is a pleasure to write a commentary on the work of Dr.Hannah Rice and colleagues,l who have advanced our understanding of how the mechanical loading environment of the tibia changes as a function of running grade a...It is a pleasure to write a commentary on the work of Dr.Hannah Rice and colleagues,l who have advanced our understanding of how the mechanical loading environment of the tibia changes as a function of running grade and speed.It is important that we understand how the tibia is loaded during conditions that an individual is likely to encounter when running as it is these internal loads which we believe are responsible for the development of bone-stress injuries.展开更多
This work presents a novel approach to the dynamic response analysis of a Euler-Bernoulli beam resting on a Winkler soil model and subjected to an impact loading.The approach considers that damping has much less impor...This work presents a novel approach to the dynamic response analysis of a Euler-Bernoulli beam resting on a Winkler soil model and subjected to an impact loading.The approach considers that damping has much less importance in controlling the maximum response to impulsive loadings because the maximum response is reached in a very short time,before the damping forces can dissipate a significant portion of the energy input into the system.The development of two sine series solutions,relating to different types of impulsive loadings,one involving a single concentrated force and the other a distributed line load,are presented.This study revealed that when a simply supported Euler-Bernoulli beam,resting on a Winkler soil model,is subject to an impact load,the resulting vertical displacements,bending moments and shear forces produced along the span of the beam are considerably affected.In particular,the quantification of this effect is best observed,relative to the corresponding static solution,via an amplification factor.The computed impact amplification factors,for the sub-grade moduli used in this study,were in magnitude greater than 2,thus confirming the multiple-degree-of-freedom nature of the problem.展开更多
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m...Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.展开更多
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am...Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.展开更多
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit...In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
By combination of the transient Raman spectroscopic measurement and the density functional theoretical calculations,the structural evolution and stability of TATB under shock compression was investigated.Due to the im...By combination of the transient Raman spectroscopic measurement and the density functional theoretical calculations,the structural evolution and stability of TATB under shock compression was investigated.Due to the improvement in synchronization control between two-stage light gas gun and the transient Raman spectra acquisition,as well as the sample preparation,the Raman peak of the N-O mode of TATB was firstly observed under shock pressure up to 13.6 GPa,noticeably higher than the upper limit of 8.5 GPa reported in available literatures.By taking into account of the continuous shift of the main peak and other observed Raman peaks,we did not distinguish any structural transition or any new species.Moreover,both the present Raman spectra and the time-resolved radiation of TATB during shock loading showed that TATB exhibits higher chemical stability than previous declaration.To reveal the detailed structural response and evolution of TATB under compression,the density functional theoretical calculations were conducted,and it was found that the pressure make N-O bond lengths shorter,nitro bond angles larger,and intermolecular and intra-molecular hydrogen bond interactions enhanced.The observed red shift of Raman peak was ascribed to the abnormal enhancement of H-bound effect on the scissor vibration mode of the nitro group.展开更多
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver...Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.展开更多
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金We acknowledge the funding support from the National Natural Science Foundation of China Youth Fund(Grant No.52004019)the National Natural Science Foundation of China(Grant No.41825018)China Postdoctoral Science Foundation(Grant No.2023M733481).
文摘Rock-encased-backfill(RB)structures are common in underground mining,for example in the cut-andfill and stoping methods.To understand the effects of cyclic excavation and blasting activities on the damage of these RB structures,a series of triaxial stepwise-increasing-amplitude cyclic loading experiments was conducted with cylindrical RB specimens(rock on outside,backfill on inside)with different volume fractions of rock(VF=0.48,0.61,0.73,and 0.84),confining pressures(0,6,9,and 12 MPa),and cyclic loading rates(200,300,400,and 500 N/s).The damage evolution and meso-crack formation during the cyclic tests were analyzed with results from stress-strain hysteresis loops,acoustic emission events,and post-failure X-ray 3D fracture morphology.The results showed significant differences between cyclic and monotonic loadings of RB specimens,particularly with regard to the generation of shear microcracks,the development of stress memory and strain hardening,and the contact forces and associated friction that develops along the rock-backfill interface.One important finding is that as a function of the number of cycles,the elastic strain increases linearly and the dissipated energy increases exponentially.Also,compared with monotonic loading,the cyclic strain hardening characteristics are more sensitive to rising confining pressures during the initial compaction stage.Another finding is that compared with monotonic loading,more shear microcracks are generated during every reloading stage,but these microcracks tend to be dispersed and lessen the likelihood of large shear fracture formation.The transition from elastic to plastic behavior varies depending on the parameters of each test(confinement,volume fraction,and cyclic rate),and an interesting finding was that the transformation to plastic behavior is significantly lower under the conditions of 0.73 rock volume fraction,400 N/s cyclic loading rate,and 9 MPa confinement.All the findings have important practical implications on the ability of backfill to support underground excavations.
基金National Natural Science Foundation of China under Grant No.52278503。
文摘Coral sandy soils widely exist in coral island reefs and seashores in tropical and subtropical regions.Due to the unique marine depositional environment of coral sandy soils,the engineering characteristics and responses of these soils subjected to monotonic and cyclic loadings have been a subject of intense interest among the geotechnical and earthquake engineering communities.This paper critically reviews the progress of experimental investigations on the undrained behavior of coral sandy soils under monotonic and cyclic loadings over the last three decades.The focus of coverage includes the contractive-dilative behavior,the pattern of excess pore-water pressure(EPWP)generation and the liquefaction mechanism and liquefaction resistance,the small-strain shear modulus and strain-dependent shear modulus and damping,the cyclic softening feature,and the anisotropic characteristics of undrained responses of saturated coral sandy soils.In particular,the advances made in the past decades are reviewed from the following aspects:(1)the characterization of factors that impact the mechanism and patterns of EPWP build-up;(2)the identification of liquefaction triggering in terms of the apparent viscosity and the average flow coefficient;(3)the establishment of the invariable form of strain-based,stress-based,or energy-based EPWP ratio formulas and the unique relationship between the new proxy of liquefaction resistance and the number of cycles required to reach liquefaction;(4)the establishment of the invariable form of the predictive formulas of small strain modulus and strain-dependent shear modulus;and(5)the investigation on the effects of stress-induced anisotropy on liquefaction susceptibility and dynamic deformation characteristics.Insights gained through the critical review of these advances in the past decades offer a perspective for future research to further resolve the fundamental issues concerning the liquefaction mechanism and responses of coral sandy sites subjected to cyclic loadings associated with seismic events in marine environments.
基金funding support from National Natural Science Foundation of China(Grant No.52179109)Jiangsu Provincial Natural Science Foundation(Grant No.BK20230967)Open Research Fund of State Key Laboratory of Mechanical Behavior and System Safety of Traffic Engineering Structures,Shijiazhuang Tiedao University(Grant No.KF2022-02).
文摘Existing studies have focused on the behavior of the retaining wall equipped with expanded polystyrene(EPS)geofoam inclusions under semi-infinite surcharge loading rather than limited surcharge loading.In this paper,the failure mode and the earth pressure acting on the rigid retaining wall with EPS geofoam inclusions and granular backfills(henceforth referred to as EPS-wall),under limited surcharge loading are investigated through two-and three-dimensional model tests.The testing results show that different from the sliding of almost all the backfill in the EPS-wall under semi-infinite surcharge loading,only an approximately triangular backfill slides in the wall under limited surcharge loading.The distribution of the lateral earth pressure on the EPS-wall under limited surcharge loading is non-linear,and the distribution changes from the increase of the wall depth to the decrease with the increase of the limited surcharge loading.An approach based on the force equilibrium of a differential element is developed to predict the lateral earth pressure behind the EPS-wall subjected to limited surcharge loading,and its performance was fully validated by the three-dimensional model tests.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported by the Basic Science(Natural Science)Research Project of Jiangsu Higher Education Institutions(No.23KJB470020)the Natural Science Foundation of Jiangsu Province(Youth Fund)(No.BK20230384)。
文摘To facilitate the coordinated and large-scale participation of residential flexible loads in demand response(DR),a load aggregator(LA)can integrate these loads for scheduling.In this study,a residential DR optimization scheduling strategy was formulated considering the participation of flexible loads in DR.First,based on the operational characteristics of flexible loads such as electric vehicles,air conditioners,and dishwashers,their DR participation,the base to calculate the compensation price to users,was determined by considering these loads as virtual energy storage.It was quantified based on the state of virtual energy storage during each time slot.Second,flexible loads were clustered using the K-means algorithm,considering the typical operational and behavioral characteristics as the cluster centroid.Finally,the LA scheduling strategy was implemented by introducing a DR mechanism based on the directrix load.The simulation results demonstrate that the proposed DR approach can effectively reduce peak loads and fill valleys,thereby improving the load management performance.
基金supported by the National Natural Science Foundation of China(Grant No.62063016).
文摘In a“low-carbon”context,the power load is affected by the coupling of multiple factors,which gradually evolves from the traditional“pure load”to the generalized load with the dual characteristics of“load+power supply.”Traditional time-series forecasting methods are no longer suitable owing to the complexity and uncertainty associated with generalized loads.From the perspective of image processing,this study proposes a graphical short-term prediction method for generalized loads based on modal decomposition.First,the datasets are normalized and feature-filtered by comparing the results of Xtreme gradient boosting,gradient boosted decision tree,and random forest algorithms.Subsequently,the generalized load data are decomposed into three sets of modalities by modal decomposition,and red,green,and blue(RGB)images are generated using them as the pixel values of the R,G,and B channels.The generated images are diversified,and an optimized DenseNet neural network was used for training and prediction.Finally,the base load,wind power,and photovoltaic power generation data are selected,and the characteristic curves of the generalized load scenarios under different permeabilities of wind power and photovoltaic power generation are obtained using the density-based spatial clustering of applications with noise algorithm.Based on the proposed graphical forecasting method,the feasibility of the generalized load graphical forecasting method is verified by comparing it with the traditional time-series forecasting method.
基金This paper is financially supported by the National Natural Science Foundation of China(Grant Nos.52074263 and 52034007)the Postgraduate Research and Practice Innovation Program of Jiangsu Province(Grant No.KYCX21_2332).
文摘Dynamic load on anchoring structures(AS)within deep roadways can result in cumulative damage and failure.This study develops an experimental device designed to test AS under triaxial loads.The device enables the investigation of the mechanical response,failure mode,instability assessment criteria,and anchorage effect of AS subjected to combined cyclic dynamic-static triaxial stress paths.The results show that the peak bearing strength is positively correlated with the anchoring matrix strength,anchorage length,and edgewise compressive strength.The bearing capacity decreases significantly when the anchorage direction is severely inclined.The free face failure modes are typically transverse cracking,concave fracturing,V-shaped slipping and detachment,and spallation detachment.Besides,when the anchoring matrix strength and the anchorage length decrease while the edgewise compressive strength,loading rate,and anchorage inclination angle increase,the failure intensity rises.Instability is determined by a negative tangent modulus of the displacement-strength curve or the continued deformation increase against the general downward trend.Under cyclic loads,the driving force that breaks the rock mass along the normal vector and the rigidity of the AS are the two factors that determine roadway stability.Finally,a control measure for surrounding rock stability is proposed to reduce the internal driving force via a pressure relief method and improve the rigidity of the AS by full-length anchorage and grouting modification.
文摘It is a pleasure to write a commentary on the work of Dr.Hannah Rice and colleagues,l who have advanced our understanding of how the mechanical loading environment of the tibia changes as a function of running grade and speed.It is important that we understand how the tibia is loaded during conditions that an individual is likely to encounter when running as it is these internal loads which we believe are responsible for the development of bone-stress injuries.
基金l’UniversitéLaval for the financial support of his sabbatical year at Dipartimento di Bioscienze e Territorio,Universitàdegli Studi del Molise in Campobasso,Italy。
文摘This work presents a novel approach to the dynamic response analysis of a Euler-Bernoulli beam resting on a Winkler soil model and subjected to an impact loading.The approach considers that damping has much less importance in controlling the maximum response to impulsive loadings because the maximum response is reached in a very short time,before the damping forces can dissipate a significant portion of the energy input into the system.The development of two sine series solutions,relating to different types of impulsive loadings,one involving a single concentrated force and the other a distributed line load,are presented.This study revealed that when a simply supported Euler-Bernoulli beam,resting on a Winkler soil model,is subject to an impact load,the resulting vertical displacements,bending moments and shear forces produced along the span of the beam are considerably affected.In particular,the quantification of this effect is best observed,relative to the corresponding static solution,via an amplification factor.The computed impact amplification factors,for the sub-grade moduli used in this study,were in magnitude greater than 2,thus confirming the multiple-degree-of-freedom nature of the problem.
基金supported by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(No.JZNY202114)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX210734).
文摘Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.
文摘Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.
基金Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134)the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30)+1 种基金the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01)the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
文摘In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
文摘In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金supported by the National Natural Science Foundation of China(Grant Nos.12072299,11902276)the Natural Science Foundation of Sichuan Province(Grant No.2022NSFSC1802)+1 种基金the Basic Research Project of Southwest Jiaotong University(Grant No.2682023ZTPY009)the National Key Laboratory for Shock Wave and Detonation Physics of China(Grant No.JCKYS2019212007)。
文摘By combination of the transient Raman spectroscopic measurement and the density functional theoretical calculations,the structural evolution and stability of TATB under shock compression was investigated.Due to the improvement in synchronization control between two-stage light gas gun and the transient Raman spectra acquisition,as well as the sample preparation,the Raman peak of the N-O mode of TATB was firstly observed under shock pressure up to 13.6 GPa,noticeably higher than the upper limit of 8.5 GPa reported in available literatures.By taking into account of the continuous shift of the main peak and other observed Raman peaks,we did not distinguish any structural transition or any new species.Moreover,both the present Raman spectra and the time-resolved radiation of TATB during shock loading showed that TATB exhibits higher chemical stability than previous declaration.To reveal the detailed structural response and evolution of TATB under compression,the density functional theoretical calculations were conducted,and it was found that the pressure make N-O bond lengths shorter,nitro bond angles larger,and intermolecular and intra-molecular hydrogen bond interactions enhanced.The observed red shift of Raman peak was ascribed to the abnormal enhancement of H-bound effect on the scissor vibration mode of the nitro group.
基金supported by National Natural Sciences Foundation of China(No.62271165,62027802,61831008)the Guangdong Basic and Applied Basic Research Foundation(No.2023A1515030297,2021A1515011572)Shenzhen Science and Technology Program ZDSYS20210623091808025,Stable Support Plan Program GXWD20231129102638002.
文摘Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.