期刊文献+
共找到49,978篇文章
< 1 2 250 >
每页显示 20 50 100
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
1
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:4
2
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 ATTRIBUTE-BASED re-encryption scheme standard model network storage
在线阅读 下载PDF
A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks 被引量:1
3
作者 Pang Li Lifeng Zhu +1 位作者 Brij B.Gupta Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第12期2079-2090,共12页
In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called mult... In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called multi-conditional proxy broadcast re-encryption(MC-PBRE).The scheme consists of the following roles:the source node,proxy server,and the target node.If the condition is met,the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt.It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the target node in a different group,while the proxy server does not need to store the key or reveal the plaintext.At the same time,the proxy server cannot obtain any valuable information in the ciphertext.This paper formalizes the concept of MC-PBRE and its security model,and proposes a MC-PBRE scheme of ciphertext security.Finally,the scheme security has been proved in the random oracle. 展开更多
关键词 Proxy re-encryption sensor network security broadcast re-encryption
在线阅读 下载PDF
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
4
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
5
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
在线阅读 下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
6
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
在线阅读 下载PDF
IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption
7
作者 Han-Yu Lin Tung-Tso Tsai Yi-Chuan Wang 《Computers, Materials & Continua》 2026年第3期431-447,共17页
Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud ar... Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption. 展开更多
关键词 Equality test proxy re-encryption IDENTITY-BASED REVOCABLE fog computing
在线阅读 下载PDF
Identity-based threshold proxy re-encryption scheme from lattices and its applications 被引量:4
8
作者 Liqiang WU Yiliang HAN +1 位作者 Xiaoyuan YANG Minqing ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第2期258-277,共20页
Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal ... Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal services even when certain proxy servers are paralyzed or damaged.A non-interactive identity-based TPRE(IB-TPRE)scheme over lattices is proposed which removes the public key certificates.To accomplish this scheme,Shamir’s secret sharing is employed twice,which not only effectively hides the delegator’s private key information,but also decentralizes the proxy power by splitting the re-encryption key.Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share.This property is achieved by lattice-based fully homomorphic signatures.As a result,the whole scheme is thoroughly capable of resisting quantum attacks even when they are available.The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model.Two typical application scenarios,including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography,are presented. 展开更多
关键词 Post-quantum cryptography Threshold proxy re-encryption LATTICES ROBUSTNESS DECENTRALIZATION
原文传递
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
9
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption WEB3.0
在线阅读 下载PDF
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
10
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
11
作者 Yongli Tang Huanhuan Lian +1 位作者 Zemao Zhao Xixi Yan 《Computers, Materials & Continua》 SCIE EI 2018年第8期339-352,共14页
With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,bus... With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment. 展开更多
关键词 Cloud computing keyword search proxy re-encryption provable security
在线阅读 下载PDF
Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
12
作者 Meng Hui Ren Lina Zhao Zongqu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第5期51-60,共10页
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base... Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-based PRE(IB-PRE)scheme from learning with errors over ring(RLWE)assumption with ciphertext evolution(IB-LPRE-CE)was proposed.IB-LPRE-CE generates the private key using the preimage sampling algorithm(SamplePre)and completes the ciphertext delegation using the re-encryption algorithm.In addition,for the problem of ciphertext delegation change caused by the long-term secret key update,the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation,which improves the efficiency of secure data sharing.In terms of security,IB-LPRE-CE is CCA security based on RLWE assumption.Compared with the current LPRE schemes,IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm. 展开更多
关键词 proxy re-encryption(PRE) learning with errors over ring(RLWE) chosen-ciphertext attack(CCA) ciphertext delegation ciphertext evolution
原文传递
STRONG CONVERGENCE OF AN EXPLICIT FULL-DISCRETE SCHEME FOR STOCHASTIC BURGERS-HUXLEY EQUATION
13
作者 Yibo Wang Wanrong Cao Yanzhao Cao 《Journal of Computational Mathematics》 2026年第1期35-60,共26页
The strong convergence of an explicit full-discrete scheme is investigated for the stochastic Burgers-Huxley equation driven by additive space-time white noise,which possesses both Burgers-type and cubic nonlinearitie... The strong convergence of an explicit full-discrete scheme is investigated for the stochastic Burgers-Huxley equation driven by additive space-time white noise,which possesses both Burgers-type and cubic nonlinearities.To discretize the continuous problem in space,we utilize a spectral Galerkin method.Subsequently,we introduce a nonlinear-tamed exponential integrator scheme,resulting in a fully discrete scheme.Within the framework of semigroup theory,this study provides precise estimations of the Sobolev regularity,L^(∞) regularity in space,and Hölder continuity in time for the mild solution,as well as for its semi-discrete and full-discrete approximations.Building upon these results,we establish moment boundedness for the numerical solution and obtain strong convergence rates in both spatial and temporal dimensions.A numerical example is presented to validate the theoretical findings. 展开更多
关键词 Stochastic Burgers-Huxley equation Strong convergence rate Non-globally monotone nonlinearity Fully discrete scheme Tamed exponential integrator scheme
原文传递
Ponzi Scheme Detection for Smart Contracts Based on Oversampling
14
作者 Yafei Liu Yuling Chen +2 位作者 Xuewei Wang Yuxiang Yang Chaoyue Tan 《Computers, Materials & Continua》 2026年第1期1065-1085,共21页
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ... As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods. 展开更多
关键词 Blockchain smart contracts Ponzi schemes class imbalance graph structure construction
在线阅读 下载PDF
Improvement of Low-cloud Simulations with a Revised Cloud Microphysics Scheme in an Atmospheric General Circulation Model
15
作者 LI Jia-bo PENG Xin-dong +2 位作者 LI Xiao-han GU Juan DUAN Sheng-ni 《Journal of Tropical Meteorology》 2026年第1期1-18,共18页
Clouds play an important role in global atmospheric energy and water vapor budgets, and the low cloud simulations suffer from large biases in many atmospheric general circulation models. In this study, cloud microphys... Clouds play an important role in global atmospheric energy and water vapor budgets, and the low cloud simulations suffer from large biases in many atmospheric general circulation models. In this study, cloud microphysical processes such as raindrop evaporation and cloud water accretion in a double-moment six-class cloud microphysics scheme were revised to enhance the simulation of low clouds using the Global-Regional Integrated Forecast System(GRIST)model. The validation of the revised scheme using a single-column version of the GRIST demonstrated a reasonable reduction in liquid water biases. The revised parameterization simulated medium-and low-level cloud fractions that were in better agreement with the observations than the original scheme. Long-term global simulations indicate the mitigation of the originally overestimated low-level cloud fraction and cloud-water mixing ratio in mid-to high-latitude regions,primarily owing to enhanced accretion processes and weakened raindrop evaporation. The reduced low clouds with the revised scheme showed better consistency with satellite observations, particularly at mid-and high-latitudes. Further improvements can be observed in the simulated cloud shortwave radiative forcing and vertical distribution of total cloud cover. Annual precipitation in mid-latitude regions has also improved, particularly over the oceans, with significantly increased large-scale and decreased convective precipitation. 展开更多
关键词 low cloud cloud microphysics scheme general circulation model accretion process raindrop evaporation
在线阅读 下载PDF
A Finite Volume Trigonometric WENO Scheme for Nonlinear Degenerate Parabolic Equation
16
作者 Gulikayier Haerman Kaiyishaer Reheman +1 位作者 Muyesaier Aihemaiti Wei Xunan 《新疆大学学报(自然科学版中英文)》 2026年第1期16-26,共11页
In this paper,we present a finite volume trigonometric weighted essentially non-oscillatory(TWENO)scheme to solve nonlinear degenerate parabolic equations that may exhibit non-smooth solutions.The present method is de... In this paper,we present a finite volume trigonometric weighted essentially non-oscillatory(TWENO)scheme to solve nonlinear degenerate parabolic equations that may exhibit non-smooth solutions.The present method is developed using the trigonometric scheme,which is based on zero,first,and second moments,and the direct discontinuous Galerkin(DDG)flux is used to discretize the diffusion term.Moreover,the DDG method directly applies the weak form of the parabolic equation to each computational cell,which can better capture the characteristics of the solution,especially the discontinuous solution.Meanwhile,the third-order TVD-Runge-Kutta method is applied for temporal discretization.Finally,the effectiveness and stability of the method constructed in this paper are evaluated through numerical tests. 展开更多
关键词 trigonometric WENO scheme finite volume method nonlinear degenerate parabolic equation TVD-Runge-Kutta method
在线阅读 下载PDF
AUGMENTED SUBSPACE SCHEME FOR EIGENVALUE PROBLEM BY WEAK GALERKIN FINITE ELEMENT METHOD
17
作者 Yue Feng Zhijin Guan +1 位作者 Hehu Xie Chenguang Zhou, 《Journal of Computational Mathematics》 2026年第1期135-164,共30页
This study proposes a class of augmented subspace schemes for the weak Galerkin(WG)finite element method used to solve eigenvalue problems.The augmented subspace is built with the conforming linear finite element spac... This study proposes a class of augmented subspace schemes for the weak Galerkin(WG)finite element method used to solve eigenvalue problems.The augmented subspace is built with the conforming linear finite element space defined on the coarse mesh and the eigen-function approximations in the WG finite element space defined on the fine mesh.Based on this augmented subspace,solving the eigenvalue problem in the fine WG finite element space can be reduced to the solution of the linear boundary value problem in the same WG finite element space and a low dimensional eigenvalue problem in the augmented sub-space.The proposed augmented subspace techniques have the second order convergence rate with respect to the coarse mesh size,as demonstrated by the accompanying error esti-mates.Finally,a few numerical examples are provided to validate the proposed numerical techniques. 展开更多
关键词 Eigenvalue problem Augmented subspace scheme Weak Galerkin finite ele-ment method Second order convergence rate
原文传递
OPTIMAL POINT-WISE ERROR ESTIMATE OF TWO SECOND-ORDER ACCURATE FINITE DIFFERENCE SCHEMES FOR THE HEAT EQUATION WITH CONCENTRATED CAPACITY
18
作者 Leilei Shi Tingchun Wang Xuanxuan Zhou 《Journal of Computational Mathematics》 2026年第1期61-83,共23页
In this paper,we propose and analyze two second-order accurate finite difference schemes for the one-dimensional heat equation with concentrated capacity on a computa-tional domain=[a,b].We first transform the target ... In this paper,we propose and analyze two second-order accurate finite difference schemes for the one-dimensional heat equation with concentrated capacity on a computa-tional domain=[a,b].We first transform the target equation into the standard heat equation on the domain excluding the singular point equipped with an inner interface matching(IIM)condition on the singular point x=ξ∈(a,b),then adopt Taylor’s ex-pansion to approximate the IIM condition at the singular point and apply second-order finite difference method to approximate the standard heat equation at the nonsingular points.This discrete procedure allows us to choose different grid sizes to partition the two sub-domains[a,ξ]and[ξ,b],which ensures that x=ξ is a grid point,and hence the pro-posed schemes can be generalized to the heat equation with more than one concentrated capacities.We prove that the two proposed schemes are uniquely solvable.And through in-depth analysis of the local truncation errors,we rigorously prove that the two schemes are second-order accurate both in temporal and spatial directions in the maximum norm without any constraint on the grid ratio.Numerical experiments are carried out to verify our theoretical conclusions. 展开更多
关键词 Heat equation with concentrated capacity Finite difference scheme Inner interface matching condition Unconditional convergence Optimal error estimate
原文传递
HIGH-ORDER COMPACT ADI SCHEMES FOR 2D SEMI-LINEAR REACTION-DIFFUSION EQUATIONS WITH PIECEWISE CONTINUOUS ARGUMENT IN REACTION TERM
19
作者 Bo Hou Chengjian Zhang 《Journal of Computational Mathematics》 2026年第1期191-212,共22页
This paper deals with the numerical solutions of two-dimensional(2D)semi-linear reaction-diffusion equations(SLRDEs)with piecewise continuous argument(PCA)in reaction term.A high-order compact difference method called... This paper deals with the numerical solutions of two-dimensional(2D)semi-linear reaction-diffusion equations(SLRDEs)with piecewise continuous argument(PCA)in reaction term.A high-order compact difference method called Ⅰ-type basic scheme is developed for solving the equations and it is proved under the suitable conditions that this method has the computational accuracy O(τ^(2)+h_(x)^(4)+h_(y)^(4)),where τ,h_(x )and h_(y) are the calculation stepsizes of the method in t-,x-and y-direction,respectively.With the above method and Newton linearized technique,a Ⅱ-type basic scheme is also suggested.Based on the both basic schemes,the corresponding Ⅰ-and Ⅱ-type alternating direction implicit(ADI)schemes are derived.Finally,with a series of numerical experiments,the computational accuracy and efficiency of the four numerical schemes are further illustrated. 展开更多
关键词 Semi-linear reaction-diffusion equations Piecewise continuous argument Highorder compact difference methods Alternating direction implicit schemes Computational accuracy and efficiency
原文传递
原位构筑双S-Scheme NiO/Fe_(2)O_(3)/g-C_(3)N_(4)异质结协同可见光-Fenton催化降解土霉素
20
作者 毛娜 马欣玥 唐嘉璇 《高校化学工程学报》 北大核心 2026年第1期146-158,共13页
针对g-C_(3)N_(4)对可见光响应效率低和光生电子-空穴分离效率较低的问题,提出将半导体负载到g-C_(3)N_(4)表面的方法,可以提升g-C_(3)N_(4)在光催化降解有机污染物中的应用。文中采用浸渍法合成了三元复合材料NiO/Fe_(2)O_(3)/g-C_(3)N... 针对g-C_(3)N_(4)对可见光响应效率低和光生电子-空穴分离效率较低的问题,提出将半导体负载到g-C_(3)N_(4)表面的方法,可以提升g-C_(3)N_(4)在光催化降解有机污染物中的应用。文中采用浸渍法合成了三元复合材料NiO/Fe_(2)O_(3)/g-C_(3)N_(4),对复合材料进行X射线衍射(XRD)、傅里叶变换红外光谱(FT-IR)、荧光光谱(PL)等表征,研究NiO/Fe_(2)O_(3)/g-C_(3)N_(4)复合材料对土霉素(OTC)光催化降解的性能。研究结果表明,在可见光-类Fenton体系中,OTC的降解率达89.1%。在添加空穴捕获剂三乙醇胺后,OTC溶液的降解效率由89.1%下降至42.1%,空穴(h^(+))、超氧自由基(·O_(2)^(-))和羟基自由基(·OH)是OTC降解过程的主要影响因素。复合材料具有良好的光催化性能是因为Fe_(2)O_(3)与NiO半导体和g-C_(3)N_(4)形成双S-Scheme异质结可以有效地将电子和空穴分离,抑制电子空穴复合。研究结论为异质结催化剂协同光-Fenton在污水处理中的应用提供参考。 展开更多
关键词 光催化降解 双S-scheme NiO/Fe_(2)O_(3)/g-C_(3)N_(4)复合材料 异质结 可见光-Fenton体系 土霉素
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部