期刊文献+
共找到2,403篇文章
< 1 2 121 >
每页显示 20 50 100
从社会幸福感到积极心理健康模型—Keyes介评 被引量:21
1
作者 苗元江 赵姗 《心理研究》 2009年第5期13-16,25,共5页
继主观幸福感、心理幸福感后,Keyes提出了社会幸福感理论,构成幸福感理论第三阵营。其主要贡献涉及社会幸福感理论与测量、心理健康双因素理念,倡导积极心理健康模型,深化了幸福感的理解,拓展了幸福感的应用,架构了从幸福感到积极心理... 继主观幸福感、心理幸福感后,Keyes提出了社会幸福感理论,构成幸福感理论第三阵营。其主要贡献涉及社会幸福感理论与测量、心理健康双因素理念,倡导积极心理健康模型,深化了幸福感的理解,拓展了幸福感的应用,架构了从幸福感到积极心理健康的桥梁。 展开更多
关键词 keyes 社会幸福感 双因素理论 积极心理健康模型
在线阅读 下载PDF
Nitrogen-cycling processes under long-term compound heavy metal(loids)pressure around a gold mine:Stimulation of nitrite reduction 被引量:1
2
作者 Xuesong Hu Xiaoxia Liu +1 位作者 Shuo Zhang Caihong Yu 《Journal of Environmental Sciences》 2025年第1期571-581,共11页
Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This ... Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This study aims to elucidate the response patterns of nitrogen-cycling microorganisms under long-term heavy metal(loids)exposure.The results showed that the diversity and abundance of nitrogen-cyclingmicroorganisms showed negative feedback to heavy metal(loids)concentrations.Denitrifying microorganisms were shown to be the dominant microorganisms with over 60%of relative abundance and a complex community structure including 27 phyla.Further,the key bacterial species in the denitrification process were calculated using a random forest model,where the top three key species(Pseudomonas stutzei,Sphingobium japonicum and Leifsonia rubra)were found to play a prominent role in nitrite reduction.Functional gene analysis and qPCR revealed that nirK,which is involved in nitrite reduction,significantly accumulated in the most metal-rich soil with the increase of absolute abundance of 63.86%.The experimental results confirmed that the activity of nitrite reductase(Nir)encoded by nirK in the soil was increased at high concentrations of heavy metal(loids).Partial least squares-path model identified three potential modes of nitrite reduction processes being stimulated by heavy metal(loids),the most prominent of which contributed to enhanced nirK abundance and soil Nir activity through positive stimulation of key species.The results provide new insights and preliminary evidence on the stimulation of nitrite reduction processes by heavy metal(loids). 展开更多
关键词 N cycle Nitrite reduction Nitrite reductase METAGENOME Key species
原文传递
MG-SLAM: RGB-D SLAM Based on Semantic Segmentation for Dynamic Environment in the Internet of Vehicles 被引量:1
3
作者 Fengju Zhang Kai Zhu 《Computers, Materials & Continua》 2025年第2期2353-2372,共20页
The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology play... The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2, MG-SLAM incorporates a dynamic target detection process that enables the detection of both known and unknown moving objects. In this process, a separate semantic segmentation thread is required to segment dynamic target instances, and the Mask R-CNN algorithm is applied on the Graphics Processing Unit (GPU) to accelerate segmentation. To reduce computational cost, only key frames are segmented to identify known dynamic objects. Additionally, a multi-view geometry method is adopted to detect unknown moving objects. The results demonstrate that MG-SLAM achieves higher precision, with an improvement from 0.2730 m to 0.0135 m in precision. Moreover, the processing time required by MG-SLAM is significantly reduced compared to other dynamic scene SLAM algorithms, which illustrates its efficacy in locating objects in dynamic scenes. 展开更多
关键词 Visual SLAM dynamic scene semantic segmentation GPU acceleration key segmentation frame
在线阅读 下载PDF
Optimizing Fine-Tuning in Quantized Language Models:An In-Depth Analysis of Key Variables
4
作者 Ao Shen Zhiquan Lai +1 位作者 Dongsheng Li Xiaoyu Hu 《Computers, Materials & Continua》 SCIE EI 2025年第1期307-325,共19页
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci... Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments. 展开更多
关键词 Large-scale Language Model Parameter-Efficient Fine-Tuning parameter quantization key variable trainable parameters experimental analysis
在线阅读 下载PDF
融合代理重加密和零知识证明的USBKey联盟链追溯系统
5
作者 张磊 万昕元 +3 位作者 肖超恩 王建新 邓昊东 郑玉崝 《信息安全研究》 北大核心 2025年第1期81-90,共10页
目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Ke... 目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Key可信追溯解决方案.首先,在区块链上链存储过程中引入了星际文件系统(interplanetary file system,IPFS)和代理重加密技术,为参与双方建立了一个安全、高效的信息存储机制;同时,在数据查询过程中引入了zk-SNARK零知识证明机制,对查询用户进行身份认证和确权操作,确保了追溯数据查询过程中用户身份的私密性;最后,基于上述可信追溯解决方案,利用Hyperledger Fabric分布式账本实现了一个USB Key的信息追溯原型系统.通过实验,证明了该方案切实可行,并有效地保障了USB Key追溯系统中追溯信息的保密性和真实性,以及在实现权限分配的前提下用户身份的隐私性. 展开更多
关键词 USB Key 代理重加密 零知识证明 区块链 信息追溯
在线阅读 下载PDF
Optimizing the key parameter to accelerate the recovery of AMOC under a rapid increase of greenhouse gas forcing
6
作者 Haolan Ren Fei Zheng +1 位作者 Tingwei Cao Qiang Wang 《Atmospheric and Oceanic Science Letters》 2025年第1期39-45,共7页
Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in c... Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale. 展开更多
关键词 Recovery of AMOC 4×CO_(2) forcing Key parameter Parameter estimation Data assimilation Machine learning
在线阅读 下载PDF
Quantum Cryptanalysis of Lightweight Block Cipher TWINE-80
7
作者 SUN Ying WANG Chen-Xi +1 位作者 XIE Hui-Qin WANG Ke 《密码学报(中英文)》 北大核心 2025年第4期945-960,共16页
The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel s... The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel structure.By constructing a round function,a new 7-round quantum distinguisher for TWINE-80 is identified.Leveraging the reuse characteristics of round keys in the algorithm,three pairs of repeated round keys are discovered during the 5-round transformation process.Using Grover’s algorithm to search for partial round keys,a 17-round quantum key recovery attack on TWINE-80 is successfully implemented,with a time complexity of 296 and requiring 327 qubits.Compared to similar studies,this work reduces the time complexity by 26 and slightly decreases the required quantum resources by 12 qubits. 展开更多
关键词 generalized Feistel structure quantum key recovery attack TWINE algorithm
在线阅读 下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
8
《China Rare Earth Information》 2025年第2期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
关键词 key laboratories State Key Laboratory rare earth resource National Key Laboratories Baiyun Obo Rare Earth Resources Ministry Science Technology Comprehensive Utilization key laboratory
在线阅读 下载PDF
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
9
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
10
《China Rare Earth Information》 2025年第1期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la... State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization. 展开更多
关键词 key laboratories rare earth resource Ministry Science Technology state key laboratory Baiyun Obo rare earth resource researches comprehensive utilization rare earth resources reconstruction national key laboratories
在线阅读 下载PDF
You Can Find It!
11
作者 Ruth Devlin 《空中英语教室(初级版.大家说英语)》 2025年第10期19-20,52,共3页
Sometimes you lose something.Itmaybeakeyoryourphone.Thenyou haveto look for it.Youcan lookinmanyplaces.Itmaybeinapocketor in adrawer.Youcan also look onthings.Itmay beonadeskora table.You may also need to look underth... Sometimes you lose something.Itmaybeakeyoryourphone.Thenyou haveto look for it.Youcan lookinmanyplaces.Itmaybeinapocketor in adrawer.Youcan also look onthings.Itmay beonadeskora table.You may also need to look underthings.Look between things,too.Itmay be between two books ortwosheets of paper.Or it may be nextto yourbed or your backpack.Lookcarefully.Youcan find it! 展开更多
关键词 PHONE DESK DRAWER underthing finding key TABLE losing
原文传递
Two new species of Dolerus Panzer(Hymenoptera:Tenthredinidae)from China
12
作者 Gucheng XIA Meicai WEI 《Entomotaxonomia》 2025年第1期96-102,共7页
Two new species of Dolerinae from Mt.Liupan,Ningxia of China are described:Dolerus liupanicus Wei sp.nov.and D.xiai Wei sp.nov.Dolerus liupanicus is similar to D.purus Jakovlev,1891 but differs from it by the pronotum... Two new species of Dolerinae from Mt.Liupan,Ningxia of China are described:Dolerus liupanicus Wei sp.nov.and D.xiai Wei sp.nov.Dolerus liupanicus is similar to D.purus Jakovlev,1891 but differs from it by the pronotum,tegula,mesoscutal middle lobe and the first abdominal tergum entirely black,the setae of apical sheath almost straight and extending outward at an angle of about 100 degrees,the alaspiculae of middle annuli very large,the middle serrulae each with about 14 to 15 small subbasal teeth.Dolerus xiai is similar to D.japonicus Kirby,1882 but differs from the latter by the fore wing deeply infuscate,the mesepisternum and legs entirely black,the setae on apical sheath blackish brown,the apical sheath in lateral view narrow and strongly tapering toward apex,the middle carina on mesoscutellar appendage not concave,the male abdomen with broad reddish brown rings,and the dorsal apical corner of penis valve convex.A key to species of Dolerinae from Mt.Liupan and nearby area is also provided. 展开更多
关键词 TENTHREDINOIDEA Dolerinae SAWFLIES TAXONOMY key
原文传递
A knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes
13
作者 Xiaoyu Qi Han Meng +2 位作者 Nengxiong Xu Gang Mei Jianbing Peng 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第6期3726-3746,共21页
Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impair... Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property. 展开更多
关键词 Key blocks identification Rock slope stability Key block theory Knowledge-data dually driven Graph deep learning
在线阅读 下载PDF
A new species of the Macrophya malaisei group in Macrophya Dahlbom (Hymenoptera: Tenthredinidae) from China
14
作者 Zejian LI Mengmeng LIU Meicai WEI 《Entomotaxonomia》 2025年第3期301-307,共7页
A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malai... A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malaisei group is provided. 展开更多
关键词 TENTHREDINOIDEA Tenthredinine TAXONOMY key
原文传递
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
15
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
Unleashing the Potential of Metaverse in Social IoV:An Authentication Protocol Based on Blockchain
16
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第8期3175-3192,共18页
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in... As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality. 展开更多
关键词 AUTHENTICATION key agreement SIoV metaverse blockchain
在线阅读 下载PDF
Two new species of Metallopeus Malaise(Hymenoptera:Tenthredinidae)from Shennongjia,China
17
作者 Beibei TAN Shuhang LI +1 位作者 Deqingyixi Meicai WEI 《Entomotaxonomia》 2025年第3期293-300,共8页
Two new beautiful species of Tenthredinidae are described from Shennongjia,China:Metallopeus shennongjiana Wei sp.nov.and M.xiansui Wei sp.nov.The morphological differences between these new species and their nearest ... Two new beautiful species of Tenthredinidae are described from Shennongjia,China:Metallopeus shennongjiana Wei sp.nov.and M.xiansui Wei sp.nov.The morphological differences between these new species and their nearest relatives are briefly discussed.A key to species groups within Metallopeus and known species of the M.sinensis group and M.splendidus group is provided. 展开更多
关键词 Tenthredinomorpha Tenthredininae TAXONOMY KEY
原文传递
Mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states
18
作者 Zhigang Shen Yuting Lu +1 位作者 Yang Yu Shengmei Zhao 《Chinese Physics B》 2025年第9期57-64,共8页
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde... A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack. 展开更多
关键词 mode-pairing quantum key distribution heralded pair-coherent source passive decoy-state key generation rate
原文传递
Key Factors and Countermeasures for the Current Development of Chinese Language Education in Italy
19
作者 Siyu Chen 《Journal of Contemporary Educational Research》 2025年第7期216-225,共10页
With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.Howev... With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.However,the current“Chinese language craze”in Italy seems to have cooled down,and the demand for Italians to learn Chinese has stabilized or even declined.This phenomenon involves multiple factors.From the perspective of cross-cultural perspective,this paper analyzes the current development status of Chinese language education in Italy,as well as the practical problems existing in various aspects such as teachers,textbooks,and curriculum settings.It explores the key factors for the better development of Chinese language education in Italy and provides suggestions on how to solve the current problems,aiming to promote the sound development of Chinese language education in Italy. 展开更多
关键词 ITALY Chinese education Key factors SOLUTIONS CULTURE
在线阅读 下载PDF
Multi-protocol quantum key distribution decoding chip
20
作者 Chun-Xue Zhang Jian-Guang Li +3 位作者 Yue Wang Wei Chen Jia-Shun Zhang Jun-Ming An 《Chinese Physics B》 2025年第5期34-41,共8页
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca... Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks. 展开更多
关键词 quantum key distribution(QKD) secure key rate decoding chip quantum bit error rate
原文传递
上一页 1 2 121 下一页 到第
使用帮助 返回顶部