A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n...A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.展开更多
Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified mult...Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control.展开更多
Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of d...Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of data access delay among these three structures in various cases. Finally these structures are realized on Xilinx FPGA development board and DCT,FFT,SAD,IME,FME,and de-blocking filtering algorithms are mapped onto the structures. Compared with available architectures,our proposed structures have lower data access delay and lower area.展开更多
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.展开更多
Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural ga...Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural gas(LNG) infrastructure are mainly monopolized by large state-owned companies, and one of the important market reform policies is to open up LNG import rights to smaller private companies and traders. Therefore, in the present study, a game theoretical model is proposed to analyze and compare the impacts of different market structures on infrastructure deployment and social welfare. Moreover, a support vector machine-based rolling horizon stochastic method is adopted in the model to simulate real LNG price fluctuations. Four market reform scenarios are proposed considering different policies such as business separation, third-party access(TPA) and their combinations. The results indicate that, with third-party access(TPA)entrance into the LNG market, the construction of LNG infrastructure will be promoted and more gas will be provided at lower prices, and thus the total social welfare will be improved greatly.展开更多
Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate t...Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate the membrane protein's structure by wet-lab experiments,accurate and fast amino acid sequence-based computational methods are highly desired. In this paper, we report an online prediction tool called Mem Brain, whose input is the amino acid sequence. Mem Brain consists of specialized modules for predicting transmembrane helices, residue–residue contacts and relative accessible surface area of a-helical membrane proteins. Mem Brain achieves aprediction accuracy of 97.9% of ATMH, 87.1% of AP,3.2 ± 3.0 of N-score, 3.1 ± 2.8 of C-score. Mem BrainContact obtains 62%/64.1% prediction accuracy on training and independent dataset on top L/5 contact prediction,respectively. And Mem Brain-Rasa achieves Pearson correlation coefficient of 0.733 and its mean absolute error of13.593. These prediction results provide valuable hints for revealing the structure and function of membrane proteins.Mem Brain web server is free for academic use and available at www.csbio.sjtu.edu.cn/bioinf/Mem Brain/.展开更多
This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessib...This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessibility analysis. The results showed that the city has poor loop of tourism network,major scenic areas(spots) have moderate network accessibility,in view of this,suggestions for the optimum development of local tourism industry were proposed.展开更多
In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of E...In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of Europe, and the impact of accessibility in Hungary. In this analysis not only the size of gravitational forces but their direction can also be measured. Displacements were illustrated by a bi-dimensional regression, which gives a new perspective to the investigation of spatial structure.展开更多
Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg g...Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg grating(SSFBG) written with perfect sequences derived from a short maximal-length sequence. A tunable SSFBG will be available to overcome the prohibitive temperature variation of the optical codecs. Nevertheless,we presented a method to implement coherent time spreading optical code-division multiple-access(OCDMA) where a unique code(or perfect sequence) can be reused and mixed with different wavelengths to obtain a tunable wavelength-division multiplexing(WDM)system. In order to maximize the binary throughput, we have selected a unique short maximal-length sequence composed of 7 chips that can be tuned with 7 different optical wavelengths. We found thousands of different tunable combinations that presented power contrast ratios(P/C) higher than 12 dB. When a WDM-OCDMA system used 2 different combinations simultaneously, the perfect binary detection with error correction codes was achieved successfully. The tunable SSFBG with colloidal crystals will be a simple and good alternative choice for fiber-to-the-home(FTTH) communications.展开更多
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed...With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.展开更多
基金Supported bythe National Basic Research Programof China(973 Program G1999035805)
文摘A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.
基金supported by The National Key Technology R&D Program (Grant No. 2011BAH19B00)The National Basic Research Program of China (973) (Grant No. 2012CB315900)The National High Technology Research and Development Program of China (863) (Grant No. 2015AA016102)
文摘Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control.
基金Supported by the National Natural Science Foundation of China(61272120,61634004,61602377)the Shaanxi Provincial Co-ordination Innovation Project of Science and Technology(2016KTZDGY02-04-02)Scientific Research Program Funded by Shannxi Provincial Education Department(17JK0689)
文摘Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of data access delay among these three structures in various cases. Finally these structures are realized on Xilinx FPGA development board and DCT,FFT,SAD,IME,FME,and de-blocking filtering algorithms are mapped onto the structures. Compared with available architectures,our proposed structures have lower data access delay and lower area.
文摘A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
基金financial support of the National Natural Science Foundation of China (Grant No. 71774171)Science Foundation of China University of Petroleum, Beijing (No. 2462017YB11)
文摘Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural gas(LNG) infrastructure are mainly monopolized by large state-owned companies, and one of the important market reform policies is to open up LNG import rights to smaller private companies and traders. Therefore, in the present study, a game theoretical model is proposed to analyze and compare the impacts of different market structures on infrastructure deployment and social welfare. Moreover, a support vector machine-based rolling horizon stochastic method is adopted in the model to simulate real LNG price fluctuations. Four market reform scenarios are proposed considering different policies such as business separation, third-party access(TPA) and their combinations. The results indicate that, with third-party access(TPA)entrance into the LNG market, the construction of LNG infrastructure will be promoted and more gas will be provided at lower prices, and thus the total social welfare will be improved greatly.
基金supported by the National Natural Science Foundation of China(Nos.61671288,91530321,61603161)Science and Technology Commission of Shanghai Municipality(Nos.16JC1404300,17JC1403500,16ZR1448700)
文摘Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate the membrane protein's structure by wet-lab experiments,accurate and fast amino acid sequence-based computational methods are highly desired. In this paper, we report an online prediction tool called Mem Brain, whose input is the amino acid sequence. Mem Brain consists of specialized modules for predicting transmembrane helices, residue–residue contacts and relative accessible surface area of a-helical membrane proteins. Mem Brain achieves aprediction accuracy of 97.9% of ATMH, 87.1% of AP,3.2 ± 3.0 of N-score, 3.1 ± 2.8 of C-score. Mem BrainContact obtains 62%/64.1% prediction accuracy on training and independent dataset on top L/5 contact prediction,respectively. And Mem Brain-Rasa achieves Pearson correlation coefficient of 0.733 and its mean absolute error of13.593. These prediction results provide valuable hints for revealing the structure and function of membrane proteins.Mem Brain web server is free for academic use and available at www.csbio.sjtu.edu.cn/bioinf/Mem Brain/.
基金Supported by"Twelfth Five-year Plan"of Social Science Research Program of Jilin Provincial Development of Education(2012NO.532,2013NO.333)
文摘This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessibility analysis. The results showed that the city has poor loop of tourism network,major scenic areas(spots) have moderate network accessibility,in view of this,suggestions for the optimum development of local tourism industry were proposed.
文摘In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of Europe, and the impact of accessibility in Hungary. In this analysis not only the size of gravitational forces but their direction can also be measured. Displacements were illustrated by a bi-dimensional regression, which gives a new perspective to the investigation of spatial structure.
文摘Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg grating(SSFBG) written with perfect sequences derived from a short maximal-length sequence. A tunable SSFBG will be available to overcome the prohibitive temperature variation of the optical codecs. Nevertheless,we presented a method to implement coherent time spreading optical code-division multiple-access(OCDMA) where a unique code(or perfect sequence) can be reused and mixed with different wavelengths to obtain a tunable wavelength-division multiplexing(WDM)system. In order to maximize the binary throughput, we have selected a unique short maximal-length sequence composed of 7 chips that can be tuned with 7 different optical wavelengths. We found thousands of different tunable combinations that presented power contrast ratios(P/C) higher than 12 dB. When a WDM-OCDMA system used 2 different combinations simultaneously, the perfect binary detection with error correction codes was achieved successfully. The tunable SSFBG with colloidal crystals will be a simple and good alternative choice for fiber-to-the-home(FTTH) communications.
基金the National Natural Science Foundation of China(Grant Numbers 622724786210245062102451).
文摘With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.