The Tiegelongnan Cu(Au,Ag)deposit in central Tibet contains more than 10 Mt of copper ranking 29 th in the world.It is characterized by typical porphyry-epithermal alteration and mineralization.In order to improve the...The Tiegelongnan Cu(Au,Ag)deposit in central Tibet contains more than 10 Mt of copper ranking 29 th in the world.It is characterized by typical porphyry-epithermal alteration and mineralization.In order to improve the understanding of porphyry-epithermal copper deposit in Tibet,new zircon U-Pb age and sulfur isotope data along with published data in the Tiegelongnan are presented to investigate the formation and preservation mechanism.Ore-related intrusive rocks in the Tiegelongnan including Early Cretaceous(about 120 Ma)granodiorite porphyry and diorite porphyry are closely related to the northward subduction of Bangongco-Nujiang ocean.Sulfur mainly comes from deep magma,and ore-forming fluid is affected by both magmatic and meteoric water.The metallogenic setting of Tiegelongnan is consistent with those of Andean porphyry copper deposits in South America.The cover of the Meiriqiecuo Formation volcanic rocks,Lhasa-Qiangtang collision and India-Eurasian collision have significance in the preservation and uplift of the deposit.The formation,preservation and discovery of Tiegelongnan play an important role in exploration of ancient porphyry-epithermal deposits in Tibet.展开更多
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi...With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.展开更多
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron...With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records.展开更多
In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is a...In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is always trustworthy in the sealed-bid auctions, which is not always true in a more realistic scenario. Besides the privacy-preserving issue, the performance guarantee of social efficiency maximization is also crucial for auction mechanism design. In this paper, we study the auction mechanisms that consider the above two aspects. We discuss two multi-unit auction models: the identical multiple-items auction and the distinct multiple-items auction.Since the problem of determining a multi-unit auction mechanism that can maximize its social efficiency is NPhard, we design a series of nearly optimal multi-unit auction mechanisms for the proposed models. We prove that the proposed auction mechanisms are strategyproof. Moreover, we also prove that the privacy of bid value from each bidder can be preserved in the auction mechanisms. To the best of our knowledge, this is the first work on the strategyproof multi-unit auction mechanisms that simultaneously consider privacy preservation and social efficiency maximization. The extensive simulations show that the proposed mechanisms have low computation and communication overheads.展开更多
基金funded by the National Natural Science Foundation of China(42002103)the Technical Service for Quality Monitoring of Mineral Exploration in Tiegelongnan Mining Area,Duolong Ore district,Gaize County,Tibet(XZJL-JS-2021-004)+1 种基金the Chinese Geological Survey(DD20190167)the Basal Research Fund of Chinese Academy of Geological Sciences(KK2017)。
文摘The Tiegelongnan Cu(Au,Ag)deposit in central Tibet contains more than 10 Mt of copper ranking 29 th in the world.It is characterized by typical porphyry-epithermal alteration and mineralization.In order to improve the understanding of porphyry-epithermal copper deposit in Tibet,new zircon U-Pb age and sulfur isotope data along with published data in the Tiegelongnan are presented to investigate the formation and preservation mechanism.Ore-related intrusive rocks in the Tiegelongnan including Early Cretaceous(about 120 Ma)granodiorite porphyry and diorite porphyry are closely related to the northward subduction of Bangongco-Nujiang ocean.Sulfur mainly comes from deep magma,and ore-forming fluid is affected by both magmatic and meteoric water.The metallogenic setting of Tiegelongnan is consistent with those of Andean porphyry copper deposits in South America.The cover of the Meiriqiecuo Formation volcanic rocks,Lhasa-Qiangtang collision and India-Eurasian collision have significance in the preservation and uplift of the deposit.The formation,preservation and discovery of Tiegelongnan play an important role in exploration of ancient porphyry-epithermal deposits in Tibet.
基金This work was supported by National Natural Science Foundation of China(Grant Nos.61871140,61702223,61702220,61572153,61723022,61601146)and the National Key research and Development Plan(Grant No.2018YFB0803504,2017YFB0803300).
文摘With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.
文摘With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records.
基金supported by the National Natural Science Foundation of China (Nos. 61572342 and 61672369)the Natural Science Foundation of Jiangsu Province (Nos. BK20151240 and BK20161258)China Postdoctoral Science Foundation (Nos. 2015M580470 and 2016M591920)
文摘In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is always trustworthy in the sealed-bid auctions, which is not always true in a more realistic scenario. Besides the privacy-preserving issue, the performance guarantee of social efficiency maximization is also crucial for auction mechanism design. In this paper, we study the auction mechanisms that consider the above two aspects. We discuss two multi-unit auction models: the identical multiple-items auction and the distinct multiple-items auction.Since the problem of determining a multi-unit auction mechanism that can maximize its social efficiency is NPhard, we design a series of nearly optimal multi-unit auction mechanisms for the proposed models. We prove that the proposed auction mechanisms are strategyproof. Moreover, we also prove that the privacy of bid value from each bidder can be preserved in the auction mechanisms. To the best of our knowledge, this is the first work on the strategyproof multi-unit auction mechanisms that simultaneously consider privacy preservation and social efficiency maximization. The extensive simulations show that the proposed mechanisms have low computation and communication overheads.