Behind the removal of tariffs lies a multiplication of benefits for both China and Africa A transformative policy is set to significantly reshape economic relations between China and Africa.China’s policy to grant ze...Behind the removal of tariffs lies a multiplication of benefits for both China and Africa A transformative policy is set to significantly reshape economic relations between China and Africa.China’s policy to grant zero-tariff treatment to imports from the 53 African nations with diplomatic ties will go into effect on 1 May this year.This initiative,which Chinese Foreign Minister Wang Yi likened to an arithmetic operation during this year’s Two Sessions,marks a further step in China’s efforts to boost imports from Africa.展开更多
In physics,our expectations for system behavior are often guided by intuitive arithmetic.For systems composed of identical units,we anticipate synergy of the contributions from these units,where 1+1=2.Conversely,for s...In physics,our expectations for system behavior are often guided by intuitive arithmetic.For systems composed of identical units,we anticipate synergy of the contributions from these units,where 1+1=2.Conversely,for systems built from opposing units,we expect cancellation of their contributions,where 1-1=0.This intuitive arithmetic has long underpinned our understanding of physical properties of materials,from electronic transport to optical responses.However,scientific breakthroughs often occur when nature reveals ways to circumvent these seemingly fundamental rules,opening new possibilities that challenge our deepest assumptions about material behavior.展开更多
In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
Let a_(1),a_(2),a_(3)be nonzero integers with gcd(a_(1),a_(2),a_(3))=1,and let k be any positive integer,K=max[3,|a_(1)|,|a_(2)|,|a_(3)|,k].Suppose that l_(1),l_(2),l_(3)are integers each coprime to k.Suppose further ...Let a_(1),a_(2),a_(3)be nonzero integers with gcd(a_(1),a_(2),a_(3))=1,and let k be any positive integer,K=max[3,|a_(1)|,|a_(2)|,|a_(3)|,k].Suppose that l_(1),l_(2),l_(3)are integers each coprime to k.Suppose further that b is any integer satisfying some necessary congruent conditions.The solvability of linear equation a_(1)p_(1)+a_(2)p_(2)+a_(3)p_(3)=b(p_(j)=l_(j)(mod k),1≤j≤3)with prime variables pi,p_(2),ps is investigated.It is proved that if ai,a_(2),a_(3)are all positive,then the above equation is solvable whenever b≥K^(25);if a,a_(2),a_(3)are not all of the same sign,then the above equation has a solution p_(1),p_(2),p_(3)satisfying max(p_(1),p_(2),p_(3))≤3|b|+K^(25).展开更多
Reversible data hiding in encrypted images(RDH-EI)enables the concealment of secret data within ciphertext images while preserving the ability to fully recover both the original image and the hidden message.However,ex...Reversible data hiding in encrypted images(RDH-EI)enables the concealment of secret data within ciphertext images while preserving the ability to fully recover both the original image and the hidden message.However,existing RDH-EI schemes based on vacating room after encryption(VRAE)suffer from limited embedding capacity.To address this issue,we propose a method based on arithmetic coding and dual prediction for encrypted images.First,the original image is encrypted with a chunked modulus and permutation.Then,using the upper-left corner pixel of each subblock as a reference,adaptive MSB prediction and difference prediction are employed to predict the remaining pixels within the subblock.The resulting label map is then compressed via arithmetic coding to vacate the embedding space for the secret message.Finally,the separable operations of the original image restoration and secret message extraction can be performed on the basis of the type of key possessed.The experimental results demonstrate that the proposed algorithm not only successfully extracts the secret information but also recovers the original image without any loss.Furthermore,it effectively enhances the embedding capacity by fully utilizing the correlation between adjacent pixels while ensuring the security of the image.展开更多
In order to decrease the calculation complexity of connectivity reliability of road networks, an improved recursive decomposition arithmetic is proposed. First, the basic theory of recursive decomposition arithmetic i...In order to decrease the calculation complexity of connectivity reliability of road networks, an improved recursive decomposition arithmetic is proposed. First, the basic theory of recursive decomposition arithmetic is reviewed. Then the characteristics of road networks, which are different from general networks, are analyzed. Under this condition, an improved recursive decomposition arithmetic is put forward which fits road networks better. Furthermore, detailed calculation steps are presented which are convenient for the computer, and the advantage of the approximate arithmetic is analyzed based on this improved arithmetic. This improved recursive decomposition arithmetic directly produces disjoint minipaths and avoids the non-polynomial increasing problems. And because the characteristics of road networks are considered, this arithmetic is greatly simplified. Finally, an example is given to prove its validity.展开更多
In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although thi...In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although this new method has a better compression performance than its original version, it is found that there are some problems with its security and decryption processes. In this paper, it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key. After discussing the security and decryption problems of the Li Heng-Jian et al. algorithm, we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure.展开更多
Dynamic fault tree analysis is widely used for the reliability analysis of the complex system with dynamic failure characteristics. In many circumstances, the exact value of system reliability is difficult to obtain d...Dynamic fault tree analysis is widely used for the reliability analysis of the complex system with dynamic failure characteristics. In many circumstances, the exact value of system reliability is difficult to obtain due to absent or insufficient data for failure probabilities or failure rates of components. The traditional fuzzy operation arithmetic based on extension principle or interval theory may lead to fuzzy accumulations. Moreover, the existing fuzzy dynamic fault tree analysis methods are restricted to the case that all system components follow exponential time-to-failure distributions. To overcome these problems, a new fuzzy dynamic fault tree analysis approach based on the weakest n-dimensional t-norm arithmetic and developed sequential binary decision diagrams method is proposed to evaluate system fuzzy reliability. Compared with the existing approach,the proposed method can effectively reduce fuzzy cumulative and be applicable to any time-tofailure distribution type for system components. Finally, a case study is presented to illustrate the application and advantages of the proposed approach.展开更多
A new interval arithmetic method is proposed to solve interval functions with correlated intervals through which the overestimation problem existing in interval analysis could be significantly alleviated. The correlat...A new interval arithmetic method is proposed to solve interval functions with correlated intervals through which the overestimation problem existing in interval analysis could be significantly alleviated. The correlation between interval parameters is defined by the multidimensional parallelepiped model which is convenient to describe the correlative and independent interval variables in a unified framework. The original interval variables with correlation are transformed into the standard space without correlation,and then the relationship between the original variables and the standard interval variables is obtained. The expressions of four basic interval arithmetic operations, namely addition, subtraction, multiplication, and division, are given in the standard space. Finally, several numerical examples and a two-step bar are used to demonstrate the effectiveness of the proposed method.展开更多
A numerical model for shallow water flow has been developed based on the unsteady Reynolds-averaged Navier-Stokes equations with the hydrodynamic pressure instead of hydrostatic pressure assumption. The equations are ...A numerical model for shallow water flow has been developed based on the unsteady Reynolds-averaged Navier-Stokes equations with the hydrodynamic pressure instead of hydrostatic pressure assumption. The equations are transformed into the σ-coordinate system and the eddy viscosity is calculated with the standard k-ε turbulence model. The control volume method is used to discrete the equations, and the boundary conditions at the bed for shallow water models only include vertical diffusion terms expressed with wall functions. And the semi-implicit method for pressure linked equation arithmetic is adopted to solve the equations. The model is applied to the 2D vertical plane flow of a current over two steep-sided trenches for which experiment data are available for comparison and good agreement is obtained. And the model is used to predicting the flow in a channel with a steep-sided submerged breakwater at the bottom, and the streamline is drawn.展开更多
When the uncertainties of structures may be bounded in intervals, through some suitable discretization, interval finite element method can be constructed by combining the interval analysis with the traditional finite ...When the uncertainties of structures may be bounded in intervals, through some suitable discretization, interval finite element method can be constructed by combining the interval analysis with the traditional finite element method (FEM). The two parameters, median and deviation, were used to represent the uncertainties of interval variables. Based on the arithmetic rules of intervals, some properties and arithmetic rules of interval variables were demonstrated. Combining the procedure of interval analysis with FEM, a static linear interval finite element method was presented to solve the non-random uncertain structures. ne solving of the characteristic parameters of n-freedom uncertain displacement field of the static governing equation was transformed into 2 n-order linear equations. It is shown by a numerical example that the proposed method is practical and effective.展开更多
For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitutio...For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations.By analyzing relative frequencies of synonymous words,synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence.The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data.Then,the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner.On the receiver side,the watermark and compressed data can be extracted by decoding the values of synonyms in the watermarked text,as a result of which the original context can be perfectly recovered by decompressing the extracted compressed data and substituting the replaced synonyms with their original synonyms.Experimental results demonstrate that the proposed method can extract the watermark successfully and achieve a lossless recovery of the original text.Additionally,it achieves a high embedding capacity.展开更多
Let φ(n) denote the Euler-totient function, we study the distribution of solutions of φ(n) ≤ x in arithmetic progressions, where n ≡ l(mod q) and an asymptotic formula was obtained by Perron formula.
For any x ∈ (0, 1] (except at most countably many points), there exists a unique sequence {dn(x)}n≥1 of integers, called the digit sequence of x, such that x =∞ ∑j=1 1/d1(x)(d1(x)-1)……dj-1(x)(dj-1...For any x ∈ (0, 1] (except at most countably many points), there exists a unique sequence {dn(x)}n≥1 of integers, called the digit sequence of x, such that x =∞ ∑j=1 1/d1(x)(d1(x)-1)……dj-1(x)(dj-1(x)-1)dj(x). The dexter infinite series expansion is called the Liiroth expansion of x. This paper is con- cerned with the size of the set of points x whose digit sequence in its Liiroth expansion is strictly increasing and contains arbitrarily long arithmetic progressions with arbitrary com- mon difference. More precisely, we determine the Hausdorff dimension of the above set.展开更多
文摘Behind the removal of tariffs lies a multiplication of benefits for both China and Africa A transformative policy is set to significantly reshape economic relations between China and Africa.China’s policy to grant zero-tariff treatment to imports from the 53 African nations with diplomatic ties will go into effect on 1 May this year.This initiative,which Chinese Foreign Minister Wang Yi likened to an arithmetic operation during this year’s Two Sessions,marks a further step in China’s efforts to boost imports from Africa.
基金supported by the National Natural Science Foundation of China (Grant No.12374109)the National Key Research and Development Program of China (Grant No.2023YFA1406600)。
文摘In physics,our expectations for system behavior are often guided by intuitive arithmetic.For systems composed of identical units,we anticipate synergy of the contributions from these units,where 1+1=2.Conversely,for systems built from opposing units,we expect cancellation of their contributions,where 1-1=0.This intuitive arithmetic has long underpinned our understanding of physical properties of materials,from electronic transport to optical responses.However,scientific breakthroughs often occur when nature reveals ways to circumvent these seemingly fundamental rules,opening new possibilities that challenge our deepest assumptions about material behavior.
文摘In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
文摘Let a_(1),a_(2),a_(3)be nonzero integers with gcd(a_(1),a_(2),a_(3))=1,and let k be any positive integer,K=max[3,|a_(1)|,|a_(2)|,|a_(3)|,k].Suppose that l_(1),l_(2),l_(3)are integers each coprime to k.Suppose further that b is any integer satisfying some necessary congruent conditions.The solvability of linear equation a_(1)p_(1)+a_(2)p_(2)+a_(3)p_(3)=b(p_(j)=l_(j)(mod k),1≤j≤3)with prime variables pi,p_(2),ps is investigated.It is proved that if ai,a_(2),a_(3)are all positive,then the above equation is solvable whenever b≥K^(25);if a,a_(2),a_(3)are not all of the same sign,then the above equation has a solution p_(1),p_(2),p_(3)satisfying max(p_(1),p_(2),p_(3))≤3|b|+K^(25).
基金supported by the Provincial Colleges Quality Project of Anhui Prov-ince(2020xsxxkc047)the National Undergraduate Innovation and Entrepreneurship Training Program(2023103570289).
文摘Reversible data hiding in encrypted images(RDH-EI)enables the concealment of secret data within ciphertext images while preserving the ability to fully recover both the original image and the hidden message.However,existing RDH-EI schemes based on vacating room after encryption(VRAE)suffer from limited embedding capacity.To address this issue,we propose a method based on arithmetic coding and dual prediction for encrypted images.First,the original image is encrypted with a chunked modulus and permutation.Then,using the upper-left corner pixel of each subblock as a reference,adaptive MSB prediction and difference prediction are employed to predict the remaining pixels within the subblock.The resulting label map is then compressed via arithmetic coding to vacate the embedding space for the secret message.Finally,the separable operations of the original image restoration and secret message extraction can be performed on the basis of the type of key possessed.The experimental results demonstrate that the proposed algorithm not only successfully extracts the secret information but also recovers the original image without any loss.Furthermore,it effectively enhances the embedding capacity by fully utilizing the correlation between adjacent pixels while ensuring the security of the image.
基金The National Key Technology R& D Program of Chinaduring the 11th Five-Year Plan Period (No.2006BAJ18B03).
文摘In order to decrease the calculation complexity of connectivity reliability of road networks, an improved recursive decomposition arithmetic is proposed. First, the basic theory of recursive decomposition arithmetic is reviewed. Then the characteristics of road networks, which are different from general networks, are analyzed. Under this condition, an improved recursive decomposition arithmetic is put forward which fits road networks better. Furthermore, detailed calculation steps are presented which are convenient for the computer, and the advantage of the approximate arithmetic is analyzed based on this improved arithmetic. This improved recursive decomposition arithmetic directly produces disjoint minipaths and avoids the non-polynomial increasing problems. And because the characteristics of road networks are considered, this arithmetic is greatly simplified. Finally, an example is given to prove its validity.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province of China (Grant No. 20082165)
文摘In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although this new method has a better compression performance than its original version, it is found that there are some problems with its security and decryption processes. In this paper, it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key. After discussing the security and decryption problems of the Li Heng-Jian et al. algorithm, we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure.
基金supported by the National Defense Basic Scientific Research program of China (No.61325102)
文摘Dynamic fault tree analysis is widely used for the reliability analysis of the complex system with dynamic failure characteristics. In many circumstances, the exact value of system reliability is difficult to obtain due to absent or insufficient data for failure probabilities or failure rates of components. The traditional fuzzy operation arithmetic based on extension principle or interval theory may lead to fuzzy accumulations. Moreover, the existing fuzzy dynamic fault tree analysis methods are restricted to the case that all system components follow exponential time-to-failure distributions. To overcome these problems, a new fuzzy dynamic fault tree analysis approach based on the weakest n-dimensional t-norm arithmetic and developed sequential binary decision diagrams method is proposed to evaluate system fuzzy reliability. Compared with the existing approach,the proposed method can effectively reduce fuzzy cumulative and be applicable to any time-tofailure distribution type for system components. Finally, a case study is presented to illustrate the application and advantages of the proposed approach.
基金supported by the National Natural Science Foundation for Excellent Young Scholars(Grant 51222502)the National Natural Science Foundation of China(Grant 11172096)the Funds for State Key Laboratory of Construction Machinery(SKLCM2014-1)
文摘A new interval arithmetic method is proposed to solve interval functions with correlated intervals through which the overestimation problem existing in interval analysis could be significantly alleviated. The correlation between interval parameters is defined by the multidimensional parallelepiped model which is convenient to describe the correlative and independent interval variables in a unified framework. The original interval variables with correlation are transformed into the standard space without correlation,and then the relationship between the original variables and the standard interval variables is obtained. The expressions of four basic interval arithmetic operations, namely addition, subtraction, multiplication, and division, are given in the standard space. Finally, several numerical examples and a two-step bar are used to demonstrate the effectiveness of the proposed method.
文摘A numerical model for shallow water flow has been developed based on the unsteady Reynolds-averaged Navier-Stokes equations with the hydrodynamic pressure instead of hydrostatic pressure assumption. The equations are transformed into the σ-coordinate system and the eddy viscosity is calculated with the standard k-ε turbulence model. The control volume method is used to discrete the equations, and the boundary conditions at the bed for shallow water models only include vertical diffusion terms expressed with wall functions. And the semi-implicit method for pressure linked equation arithmetic is adopted to solve the equations. The model is applied to the 2D vertical plane flow of a current over two steep-sided trenches for which experiment data are available for comparison and good agreement is obtained. And the model is used to predicting the flow in a channel with a steep-sided submerged breakwater at the bottom, and the streamline is drawn.
文摘When the uncertainties of structures may be bounded in intervals, through some suitable discretization, interval finite element method can be constructed by combining the interval analysis with the traditional finite element method (FEM). The two parameters, median and deviation, were used to represent the uncertainties of interval variables. Based on the arithmetic rules of intervals, some properties and arithmetic rules of interval variables were demonstrated. Combining the procedure of interval analysis with FEM, a static linear interval finite element method was presented to solve the non-random uncertain structures. ne solving of the characteristic parameters of n-freedom uncertain displacement field of the static governing equation was transformed into 2 n-order linear equations. It is shown by a numerical example that the proposed method is practical and effective.
基金This project is supported by National Natural Science Foundation of China(No.61202439)partly supported by Scientific Research Foundation of Hunan Provincial Education Department of China(No.16A008)partly supported by Hunan Key Laboratory of Smart Roadway and Cooperative Vehicle-Infrastructure Systems(No.2017TP1016).
文摘For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations.By analyzing relative frequencies of synonymous words,synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence.The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data.Then,the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner.On the receiver side,the watermark and compressed data can be extracted by decoding the values of synonyms in the watermarked text,as a result of which the original context can be perfectly recovered by decompressing the extracted compressed data and substituting the replaced synonyms with their original synonyms.Experimental results demonstrate that the proposed method can extract the watermark successfully and achieve a lossless recovery of the original text.Additionally,it achieves a high embedding capacity.
基金Supported by the National Natural Science Foundation of China(11271249) Supported by the Scientific and Technological Research Program of Chongqing Municipal Education Commission(1601213) Supported by the Scientific Research Program of Yangtze Normal University(2012XJYBO31)
文摘Let φ(n) denote the Euler-totient function, we study the distribution of solutions of φ(n) ≤ x in arithmetic progressions, where n ≡ l(mod q) and an asymptotic formula was obtained by Perron formula.
文摘For any x ∈ (0, 1] (except at most countably many points), there exists a unique sequence {dn(x)}n≥1 of integers, called the digit sequence of x, such that x =∞ ∑j=1 1/d1(x)(d1(x)-1)……dj-1(x)(dj-1(x)-1)dj(x). The dexter infinite series expansion is called the Liiroth expansion of x. This paper is con- cerned with the size of the set of points x whose digit sequence in its Liiroth expansion is strictly increasing and contains arbitrarily long arithmetic progressions with arbitrary com- mon difference. More precisely, we determine the Hausdorff dimension of the above set.