In order to solve the so-called "bull-eye" problem caused by using a simple bilinear interpolation as an observational mapping operator in the cost function in the multigrid three-dimensional variational (3DVAR) d...In order to solve the so-called "bull-eye" problem caused by using a simple bilinear interpolation as an observational mapping operator in the cost function in the multigrid three-dimensional variational (3DVAR) data assimilation scheme, a smoothing term, equivalent to a penalty term, is introduced into the cost function to serve as a means of troubleshooting. A theoretical analysis is first performed to figure out what on earth results in the issue of "bull-eye", and then the meaning of such smoothing term is elucidated and the uniqueness of solution of the multigrid 3DVAR with the smoothing term added is discussed through the theoretical deduction for one-dimensional (1D) case, and two idealized data assimilation experiments (one- and two-dimensional (2D) cases). By exploring the relationship between the smoothing term and the recursive filter theoretically and practically, it is revealed why satisfied analysis results can be achieved by using such proposed solution for the issue of the multigrid 3DVAR.展开更多
Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu...Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.展开更多
为探明典型浓度路径下(高端路径RCP8.5和稳定路径RCP4.5)长江中下游地区未来30a平均气温的时空变化趋势和分布特征,运用联合国政府间气候变化委员会(IPCC)AR5提出的模拟能力较强的BCC-CSM1-1(Beijing Climate Center Climate System Mod...为探明典型浓度路径下(高端路径RCP8.5和稳定路径RCP4.5)长江中下游地区未来30a平均气温的时空变化趋势和分布特征,运用联合国政府间气候变化委员会(IPCC)AR5提出的模拟能力较强的BCC-CSM1-1(Beijing Climate Center Climate System Model version1-1)气候系统模式,基于典型浓度情景RCP(Representative Concentration Pathway)输出的2021-2050年0.5×0.5格点主要气象要素的逐日模式模拟数据资料,应用双线性内插法降尺度到长江中下游及邻近区域62个基本气象站点。以1961-1990为基准年,根据同期等长模拟数据和观测数据的非线性函数关系建立订正模型,并利用方差订正法对2021-2050年模拟数据进行误差订正。结果表明:RCP情景输出数据的模拟效果良好,方差订正可降低模拟值与观测值的相对误差和方差,更加真实反应未来气候变化趋势。RCP8.5和RCP4.5两种排放情景下,长江中下游地区2021-2050年年平均气温均呈显著上升趋势,增温幅度总体表现为自南向北逐渐减少。就季节而言,四季均呈现升温趋势,夏季增温幅度最高,变化倾向率大,春冬两季RCP8.5情景下增温幅度大于RCP4.5下,夏秋季则相反;RCP8.5情景下,研究区域年平均气温呈现自中部向东西递减,春夏季增温幅度高于秋季,冬季增温幅度最小,且变化倾向率低,大部分地区未通过0.05水平的显著性检验。RCP4.5情景下,研究区年平均气温自北向南逐渐降低,变化倾向率则表现为北部大于南部,夏季变化速率较大,增温幅度达1.2℃·10a^(-1)(P<0.01),冬季较小且未通过显著性检验。展开更多
可证明数据持有性验证(provable data possession,PDP)是云存储中重要的完整性验证技术,采用可证明数据持有验证,客户可通过常量级运算验证云服务器是否诚实地持有客户数据.某些情况下,客户无法亲自验证云端的数据持有,此时客户需要授...可证明数据持有性验证(provable data possession,PDP)是云存储中重要的完整性验证技术,采用可证明数据持有验证,客户可通过常量级运算验证云服务器是否诚实地持有客户数据.某些情况下,客户无法亲自验证云端的数据持有,此时客户需要授权代理对云端数据进行持有验证.针对上述问题,提出了一种基于部分授权的可证明数据持有验证方案(provable data possession based on partial delegation,PDPPD),新方案基于双线性对及部分授权技术支持数据拥有者直接通过密钥变形方式委任代理方进行数据持有验证,并且数据拥有者可以随时撤销或更换代理方,证明了方案的安全性.与现有数据持有性验证方案相比,新方案在保证相同安全强度的条件下,具有更小的计算量和通信量,且应用场景更加广泛.展开更多
基金The National Basic Research Program of China under contract No. 2013CB430304the National High-Tech R&D Program of China under contract No. 2013AA09A505the National Natural Science Foundation of China under contract Nos 41030854,40906015,40906016,41106005 and 41176003
文摘In order to solve the so-called "bull-eye" problem caused by using a simple bilinear interpolation as an observational mapping operator in the cost function in the multigrid three-dimensional variational (3DVAR) data assimilation scheme, a smoothing term, equivalent to a penalty term, is introduced into the cost function to serve as a means of troubleshooting. A theoretical analysis is first performed to figure out what on earth results in the issue of "bull-eye", and then the meaning of such smoothing term is elucidated and the uniqueness of solution of the multigrid 3DVAR with the smoothing term added is discussed through the theoretical deduction for one-dimensional (1D) case, and two idealized data assimilation experiments (one- and two-dimensional (2D) cases). By exploring the relationship between the smoothing term and the recursive filter theoretically and practically, it is revealed why satisfied analysis results can be achieved by using such proposed solution for the issue of the multigrid 3DVAR.
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)the National Natural Science Foundation of China(51378350)
文摘Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.
文摘为探明典型浓度路径下(高端路径RCP8.5和稳定路径RCP4.5)长江中下游地区未来30a平均气温的时空变化趋势和分布特征,运用联合国政府间气候变化委员会(IPCC)AR5提出的模拟能力较强的BCC-CSM1-1(Beijing Climate Center Climate System Model version1-1)气候系统模式,基于典型浓度情景RCP(Representative Concentration Pathway)输出的2021-2050年0.5×0.5格点主要气象要素的逐日模式模拟数据资料,应用双线性内插法降尺度到长江中下游及邻近区域62个基本气象站点。以1961-1990为基准年,根据同期等长模拟数据和观测数据的非线性函数关系建立订正模型,并利用方差订正法对2021-2050年模拟数据进行误差订正。结果表明:RCP情景输出数据的模拟效果良好,方差订正可降低模拟值与观测值的相对误差和方差,更加真实反应未来气候变化趋势。RCP8.5和RCP4.5两种排放情景下,长江中下游地区2021-2050年年平均气温均呈显著上升趋势,增温幅度总体表现为自南向北逐渐减少。就季节而言,四季均呈现升温趋势,夏季增温幅度最高,变化倾向率大,春冬两季RCP8.5情景下增温幅度大于RCP4.5下,夏秋季则相反;RCP8.5情景下,研究区域年平均气温呈现自中部向东西递减,春夏季增温幅度高于秋季,冬季增温幅度最小,且变化倾向率低,大部分地区未通过0.05水平的显著性检验。RCP4.5情景下,研究区年平均气温自北向南逐渐降低,变化倾向率则表现为北部大于南部,夏季变化速率较大,增温幅度达1.2℃·10a^(-1)(P<0.01),冬季较小且未通过显著性检验。
文摘可证明数据持有性验证(provable data possession,PDP)是云存储中重要的完整性验证技术,采用可证明数据持有验证,客户可通过常量级运算验证云服务器是否诚实地持有客户数据.某些情况下,客户无法亲自验证云端的数据持有,此时客户需要授权代理对云端数据进行持有验证.针对上述问题,提出了一种基于部分授权的可证明数据持有验证方案(provable data possession based on partial delegation,PDPPD),新方案基于双线性对及部分授权技术支持数据拥有者直接通过密钥变形方式委任代理方进行数据持有验证,并且数据拥有者可以随时撤销或更换代理方,证明了方案的安全性.与现有数据持有性验证方案相比,新方案在保证相同安全强度的条件下,具有更小的计算量和通信量,且应用场景更加广泛.