The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho...The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy.展开更多
In this paper,we study the uniqueness of positive solutions to the following semilinear equations{-Δu=λ|x|^(α)ue^(u^(2)),in B_(1),u=0,onδB_(1)ueu2;in B_(1);u=0;on@B_(1);whereλ>0,α>-2;B_(1)denotes the unit ...In this paper,we study the uniqueness of positive solutions to the following semilinear equations{-Δu=λ|x|^(α)ue^(u^(2)),in B_(1),u=0,onδB_(1)ueu2;in B_(1);u=0;on@B_(1);whereλ>0,α>-2;B_(1)denotes the unit disk in R^(2):By delicate and relatively complicated computation of radial solutions to the above equation and the asymptotic expansion of solutions near the boundary of B_(1),the uniqueness of positive solutions is obtained.The results of this paper extend the uniqueness result for the semilinear equation with critical exponential growth in CHEN et al.(2022)to the case that includes a Henon term.展开更多
The hydrological system in Central Asia is highly sensitive to global climate change,significantly affecting water supply and energy production.In Tajikistan,the Vakhsh River—one of the main tributaries of the Amu Da...The hydrological system in Central Asia is highly sensitive to global climate change,significantly affecting water supply and energy production.In Tajikistan,the Vakhsh River—one of the main tributaries of the Amu Darya—plays a key role in the region’s hydropower and irrigation.However,research on long-term hydrological changes in its two top large basins—the Surkhob and Khingov river basins—remains limited.Therefore,this study analyzed long-term climate and hydrological changes in the Vakhsh River,including its main tributaries—the Surkhob and Khingov rivers—which are vital for the water resource management in Tajikistan and even in Central Asia.Using long-term hydrometeorological observations,the change trends of temperature(1933–2020),precipitation(1970–2020),and runoff(1940–2018)were examined to assess the impact of climate change on the regional water resources.The analysis revealed the occurrence of significant warming and a spatially uneven increase in precipitation.The temperature changes across three climatic periods(1933–1960,1960–1990,and 1990–2020)indicated that there was a transition from baseline level to accelerated warming.The precipitation showed a 2.99 mm/a increase in the Khingov River Basin and a 2.80 mm/a increase in the Surkhob River Basin during 1970–2020.Moreover,there was a gradual shift toward wetter conditions in recent decades.Despite the relatively stable annual mean runoff,seasonal redistribution occurred,with increased runoff in spring and reduced runoff in summer,due to the compensation of glacier melting.Moreover,this study forecasted runoff change during 2019–2040 using the exponential triple smoothing(ETS)method and revealed the occurrence of alternating wet and dry phases,emphasizing the sensitivity of the Vakhsh River Basin’s hydrological system to climate change and the necessity of adaptive water resource management in mountainous regions of Central Asia.Therefore,this study can provide evidence-based insights that are critical for future water resources planning,climate-resilient hydropower development,and regional adaptation strategies in climate-vulnerable basins in Central Asia.展开更多
【目的】为及时发现海上风电机组发电机轴承的故障,提出一种基于蜣螂优化(Dung Beetle Optimizer,DBO)算法和极端梯度提升树(eXtreme Gradient Boosting,XGBoost)模型的DBO-XGBoost发电机轴承温度预测模型,并结合指数加权移动平均值(Exp...【目的】为及时发现海上风电机组发电机轴承的故障,提出一种基于蜣螂优化(Dung Beetle Optimizer,DBO)算法和极端梯度提升树(eXtreme Gradient Boosting,XGBoost)模型的DBO-XGBoost发电机轴承温度预测模型,并结合指数加权移动平均值(Exponentially Weighted Moving Average,EWMA)控制图实现发电机轴承的故障预测。【方法】首先,通过最大互信息系数(Maximal Information Coefficient,MIC)选取数据采集与监视控制(Supervisory Control And Data Acquisition,SCADA)系统中能准确表征发电机轴承状态的关键特征,并将其输入DBO-XGBoost模型中,对正常工况下的发电机轴承温度进行预测。其次,使用马氏距离(Mahalanobis Distance,MD)衡量真实值与预测值之间的偏差,并将MD序列输入基于EWMA控制图的变点检测算法中,以获取故障出现的变点,从而实现故障预测。最后,基于特征的重要性构建轴承故障模式知识图谱。【结果】结果表明,所提方法能对正常工况下发电机轴承的温度实现较为精准的预测,并能提前3天对故障进行预警,与通过设定单一阈值进行故障预警的方法相比,所提方法能更准确地检测到故障发生的时间。构建的轴承故障模式知识图谱为运维人员提供了可视化的运维决策支持。展开更多
Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the...Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modnlar exponentiation, which is one of the most complex computing tasks in discrete- log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsnurce modular expnnentiation operation to only a single server, which eliminates the potential for a cnllusinn attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to clnud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability, The user could detect any misbehavior with a probability of one if the server returns a fault result.展开更多
基金supported in part by National Natural Science Foundation of China Project(Grant No.60873216) Scientific and Technological Research Priority Projects of Sichuan Province(Grant No. 2012GZ0017)
文摘The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy.
基金Supported by the Natural Science Foundation of China(12571122,12061010)。
文摘In this paper,we study the uniqueness of positive solutions to the following semilinear equations{-Δu=λ|x|^(α)ue^(u^(2)),in B_(1),u=0,onδB_(1)ueu2;in B_(1);u=0;on@B_(1);whereλ>0,α>-2;B_(1)denotes the unit disk in R^(2):By delicate and relatively complicated computation of radial solutions to the above equation and the asymptotic expansion of solutions near the boundary of B_(1),the uniqueness of positive solutions is obtained.The results of this paper extend the uniqueness result for the semilinear equation with critical exponential growth in CHEN et al.(2022)to the case that includes a Henon term.
基金supported by the National Natural Science Foundation of China(W2412135).
文摘The hydrological system in Central Asia is highly sensitive to global climate change,significantly affecting water supply and energy production.In Tajikistan,the Vakhsh River—one of the main tributaries of the Amu Darya—plays a key role in the region’s hydropower and irrigation.However,research on long-term hydrological changes in its two top large basins—the Surkhob and Khingov river basins—remains limited.Therefore,this study analyzed long-term climate and hydrological changes in the Vakhsh River,including its main tributaries—the Surkhob and Khingov rivers—which are vital for the water resource management in Tajikistan and even in Central Asia.Using long-term hydrometeorological observations,the change trends of temperature(1933–2020),precipitation(1970–2020),and runoff(1940–2018)were examined to assess the impact of climate change on the regional water resources.The analysis revealed the occurrence of significant warming and a spatially uneven increase in precipitation.The temperature changes across three climatic periods(1933–1960,1960–1990,and 1990–2020)indicated that there was a transition from baseline level to accelerated warming.The precipitation showed a 2.99 mm/a increase in the Khingov River Basin and a 2.80 mm/a increase in the Surkhob River Basin during 1970–2020.Moreover,there was a gradual shift toward wetter conditions in recent decades.Despite the relatively stable annual mean runoff,seasonal redistribution occurred,with increased runoff in spring and reduced runoff in summer,due to the compensation of glacier melting.Moreover,this study forecasted runoff change during 2019–2040 using the exponential triple smoothing(ETS)method and revealed the occurrence of alternating wet and dry phases,emphasizing the sensitivity of the Vakhsh River Basin’s hydrological system to climate change and the necessity of adaptive water resource management in mountainous regions of Central Asia.Therefore,this study can provide evidence-based insights that are critical for future water resources planning,climate-resilient hydropower development,and regional adaptation strategies in climate-vulnerable basins in Central Asia.
文摘【目的】为及时发现海上风电机组发电机轴承的故障,提出一种基于蜣螂优化(Dung Beetle Optimizer,DBO)算法和极端梯度提升树(eXtreme Gradient Boosting,XGBoost)模型的DBO-XGBoost发电机轴承温度预测模型,并结合指数加权移动平均值(Exponentially Weighted Moving Average,EWMA)控制图实现发电机轴承的故障预测。【方法】首先,通过最大互信息系数(Maximal Information Coefficient,MIC)选取数据采集与监视控制(Supervisory Control And Data Acquisition,SCADA)系统中能准确表征发电机轴承状态的关键特征,并将其输入DBO-XGBoost模型中,对正常工况下的发电机轴承温度进行预测。其次,使用马氏距离(Mahalanobis Distance,MD)衡量真实值与预测值之间的偏差,并将MD序列输入基于EWMA控制图的变点检测算法中,以获取故障出现的变点,从而实现故障预测。最后,基于特征的重要性构建轴承故障模式知识图谱。【结果】结果表明,所提方法能对正常工况下发电机轴承的温度实现较为精准的预测,并能提前3天对故障进行预警,与通过设定单一阈值进行故障预警的方法相比,所提方法能更准确地检测到故障发生的时间。构建的轴承故障模式知识图谱为运维人员提供了可视化的运维决策支持。
文摘Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modnlar exponentiation, which is one of the most complex computing tasks in discrete- log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsnurce modular expnnentiation operation to only a single server, which eliminates the potential for a cnllusinn attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to clnud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability, The user could detect any misbehavior with a probability of one if the server returns a fault result.