期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Geology and mineralization of the Tiegelongnan supergiant porphyry-epithermal Cu(Au, Ag) deposit(10 Mt) in western Tibet, China: A review 被引量:2
1
作者 Huan-huan Yang Qin Wang +15 位作者 Yan-bo Li Bin Lin Yang Song Yi-yun Wang Wen He Hong-wei Li She Li Jian-li Li Chang-cheng Liu Shi-bin Feng Tang Xin Xue-lian Fu Xin-juan Liang Qi Zhang Bei-qi Wang Yang Li 《China Geology》 2022年第1期136-159,共24页
The Tiegelongnan Cu(Au,Ag)deposit in central Tibet contains more than 10 Mt of copper ranking 29 th in the world.It is characterized by typical porphyry-epithermal alteration and mineralization.In order to improve the... The Tiegelongnan Cu(Au,Ag)deposit in central Tibet contains more than 10 Mt of copper ranking 29 th in the world.It is characterized by typical porphyry-epithermal alteration and mineralization.In order to improve the understanding of porphyry-epithermal copper deposit in Tibet,new zircon U-Pb age and sulfur isotope data along with published data in the Tiegelongnan are presented to investigate the formation and preservation mechanism.Ore-related intrusive rocks in the Tiegelongnan including Early Cretaceous(about 120 Ma)granodiorite porphyry and diorite porphyry are closely related to the northward subduction of Bangongco-Nujiang ocean.Sulfur mainly comes from deep magma,and ore-forming fluid is affected by both magmatic and meteoric water.The metallogenic setting of Tiegelongnan is consistent with those of Andean porphyry copper deposits in South America.The cover of the Meiriqiecuo Formation volcanic rocks,Lhasa-Qiangtang collision and India-Eurasian collision have significance in the preservation and uplift of the deposit.The formation,preservation and discovery of Tiegelongnan play an important role in exploration of ancient porphyry-epithermal deposits in Tibet. 展开更多
关键词 Giant porphyry-epithermal copper deposit Mineralization and alteration Formation and preservation mechanism Tiegelongnan Duolong ore district Early Cretaceous Mineral exploration engineering Bangongco-Nujiang metallogenic belt TIBET
下载PDF
Location Privacy in Device-Dependent Location-Based Services:Challenges and Solution 被引量:1
2
作者 Yuhang Wang Yanbin Sun +4 位作者 Shen Su Zhihong Tian Mohan Li Jing Qiu Xianzhi Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期983-993,共11页
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi... With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness. 展开更多
关键词 Location privacy device-dependent location-based service location-based service credit system location privacy preserving mechanism shared bicycle
下载PDF
Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage
3
作者 Qirun Wang Fujian Zhu +2 位作者 Yan Leng Yongjun Ren Jinyue Xia 《Journal on Internet of Things》 2019年第1期33-39,共7页
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron... With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records. 展开更多
关键词 Electronic record cloud storage preservation mechanism coding theory
下载PDF
Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation
4
作者 Yu-E Sun He Huang +4 位作者 Xiang-Yang Li Yang Du Miaomiao Tian Hongli Xu Mingjun Xiao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期119-134,共16页
In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is a... In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is always trustworthy in the sealed-bid auctions, which is not always true in a more realistic scenario. Besides the privacy-preserving issue, the performance guarantee of social efficiency maximization is also crucial for auction mechanism design. In this paper, we study the auction mechanisms that consider the above two aspects. We discuss two multi-unit auction models: the identical multiple-items auction and the distinct multiple-items auction.Since the problem of determining a multi-unit auction mechanism that can maximize its social efficiency is NPhard, we design a series of nearly optimal multi-unit auction mechanisms for the proposed models. We prove that the proposed auction mechanisms are strategyproof. Moreover, we also prove that the privacy of bid value from each bidder can be preserved in the auction mechanisms. To the best of our knowledge, this is the first work on the strategyproof multi-unit auction mechanisms that simultaneously consider privacy preservation and social efficiency maximization. The extensive simulations show that the proposed mechanisms have low computation and communication overheads. 展开更多
关键词 approximation mechanism multi-unit auction privacy preserving social efficiency strategyproof
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部