This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree sig...This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.展开更多
While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scro...While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.展开更多
The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This pape...The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.展开更多
Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin n...Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin notation and an interpretation method of guqin notation were conducted. By using this interpretation method, raw images of handwritten notations are transformed into structural data that can be processed and analyzed by computers easily. The method decomposes each single complex character of guqin notations into simple radicals and finds the structure of the character. According to the radicals and the structure, the character is interpreted into meaningful codes. The experimental results show our method is effective.展开更多
DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general o...DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general of DP enhanced notations. At the same time, it provides a case, based on 145 m DSV built in a yard located at Shanghai, China. This case shows main settings for control systems and auxiliary systems of DNV "DYNPOS-ER". DP analysis and FMEA reports show all these setting can fulfill the requirements of Rules and diving operations.展开更多
A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presente...A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presented at the beginning of the transformation.展开更多
This paper introduces the base-X notation and discusses the conversion between numbers of different bases. It also introduces the tri-value logic that is associated with the base-3 system.
Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual con...Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual conjugates:coordinate representation and momentum representation.This paper gives full play to the efficiency of Dirac notation and proves the convolutions of fractional Fourier transform from the perspective of quantum optics,a field that has been developing rapidly.These two new convolution methods have potential value in signal processing.展开更多
AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架...AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.展开更多
形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安...形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安全性和可靠性描述为某时刻组状态的性质。组管理过程是事件触发的组状态的变换过程,其终极目标是保证组在任一个稳定时刻都处于安全状态,但完全安全是不可能的。本文给出一个组策略框架,在此框架下提出安全组管理行为规则,并说明根据规则组状态转换过程满足安全策略约束。展开更多
An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelatin...An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelating ligand and the calcination temperature was determined by the thermogravimetric analysis of the precursor mass.They acted as good fluoride adsorbent in the presence of co-ions, different pH(2–11) via chemisorption revealed from Fourier-transform infrared spectroscopy(FTIR) and photodegraded Methylene Blue(MB).The satisfactory results were for MCA1(specific surface area 25.05 m^2/g) with 97%fluoride removal at pH 7.0 for the 10 mg/L initial fluoride concentration for 1.5 g/L adsorbent dose with 45 min contact time obeying the Langmuir isotherm model with negative thermodynamic parameters and 4 mmol of MCA3 with 98.51% photodegradation for 10-5 mol/L MB solution obeying pseudo-second-order and pseudo-first-order kinetics respectively.The proposed photodegradation mechanism of MB was established by the FTIR and high-performance liquid chromatography(HPLC) analysis.The nanoparticles are cubic, estimated through X-ray diffraction(XRD) and transmission electron microscopy(TEM) analysis.The band gap energies, grain size, and the effective working pH were estimated by diffuse reflectance spectra(DRS), scanning electron microscope(SEM), and zero-point potential analysis respectively.A soil candle with MCA1 also fabricated for the household purpose and tested with some fluorinated field samples.The MCA3 was able to enhance the latent fingerprint on smooth surfaces.展开更多
The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagon...The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagonal crystal structure proposed by Roe and Bunge are not in accord with the normal direction(ND)being perpendicular to the rolling direction(RD).In this paper,these formulae are deduced independently according to the notations proposed by Roe and Bunge.The results show that in addition to the coincidence with the formulae for the cubic crystal structure given by the Roe and Bunge,the other formulae are different from Roe’s and Bunge’s.The new formulae are in accord with ND,RD,and transverse direction(TD)at right angles.展开更多
This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing...This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing limitations,vehicle destination,etc.Most researchers who previously investigated this problem assumed the vehicle would not return to the depot,but did not consider its final destination.However,by considering 3PL in the B2B e-commerce,the vehicle is required back to the nearest 3PL location with available space.This paper formulates the problem as a mixed integer linear programming(MILP)model with the objective of minimizing the total travel distance.A coordinate representation particle swarm optimization(CRPSO)algorithm is developed to obtain the best delivery sequencing and the capacity of each vehicle.Results of the computational study show that the proposed method provides solution within a reasonable amount of time.Finally,the result compared to PSO also indicates that the CRPSO is effective.展开更多
In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the math...In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the mathematical kinematic position modeling of the laparoscopic tools used for autonomous positioning of a laparoscope in such operations. These models are obtained using Denavit-Hartenberg (D-H) Notations and Homogenous Transformation Matrix (HTM). The laparoscopic tools are considered as six degrees of freedom (DOF) mechanisms while the laparoscope has four DOF. The 3D loop closure equation is used to obtain the laparoscope kinematic position models in terms of those of the laparoscopic tools. These models are used to simulate and align the laparoscope camera with the surgeon’s laparoscopic Tools Center Points (TCP). The obtained results show the smooth positioning of the laparoscope camera for better visu-alization of laparoscopic surgery environments.展开更多
基金funded by the Ministry of Science and Higher Education of Kazakhstan and carried out within the framework of the project AP23488112“Development and study of a quantum-resistant digital signature scheme based on a Verkle tree”at the Institute of Information and Computational Technologies.
文摘This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.
文摘While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.
文摘The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.
基金National Natural Science Foundation of China(No.6097507)
文摘Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin notation and an interpretation method of guqin notation were conducted. By using this interpretation method, raw images of handwritten notations are transformed into structural data that can be processed and analyzed by computers easily. The method decomposes each single complex character of guqin notations into simple radicals and finds the structure of the character. According to the radicals and the structure, the character is interpreted into meaningful codes. The experimental results show our method is effective.
文摘DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general of DP enhanced notations. At the same time, it provides a case, based on 145 m DSV built in a yard located at Shanghai, China. This case shows main settings for control systems and auxiliary systems of DNV "DYNPOS-ER". DP analysis and FMEA reports show all these setting can fulfill the requirements of Rules and diving operations.
文摘A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presented at the beginning of the transformation.
文摘This paper introduces the base-X notation and discusses the conversion between numbers of different bases. It also introduces the tri-value logic that is associated with the base-3 system.
基金National Natural Science Foundation of China(Grant Number:11304126)College Students' Innovation Training Program(Grant Number:202110299696X)。
文摘Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual conjugates:coordinate representation and momentum representation.This paper gives full play to the efficiency of Dirac notation and proves the convolutions of fractional Fourier transform from the perspective of quantum optics,a field that has been developing rapidly.These two new convolution methods have potential value in signal processing.
文摘AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.
文摘形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安全性和可靠性描述为某时刻组状态的性质。组管理过程是事件触发的组状态的变换过程,其终极目标是保证组在任一个稳定时刻都处于安全状态,但完全安全是不可能的。本文给出一个组策略框架,在此框架下提出安全组管理行为规则,并说明根据规则组状态转换过程满足安全策略约束。
基金Department of Science and Technology,Government of West Bengal,India,vide project sanction(No.674(sanc)/ST/P/S&T/15G/5/2016)dated 09/11/2016 for financial supportthe Council of Scientific and Industrial Research(CSIR),Government of India for the Senior Research fellowship(No.09/1156(0004)/18-EMR-I).
文摘An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelating ligand and the calcination temperature was determined by the thermogravimetric analysis of the precursor mass.They acted as good fluoride adsorbent in the presence of co-ions, different pH(2–11) via chemisorption revealed from Fourier-transform infrared spectroscopy(FTIR) and photodegraded Methylene Blue(MB).The satisfactory results were for MCA1(specific surface area 25.05 m^2/g) with 97%fluoride removal at pH 7.0 for the 10 mg/L initial fluoride concentration for 1.5 g/L adsorbent dose with 45 min contact time obeying the Langmuir isotherm model with negative thermodynamic parameters and 4 mmol of MCA3 with 98.51% photodegradation for 10-5 mol/L MB solution obeying pseudo-second-order and pseudo-first-order kinetics respectively.The proposed photodegradation mechanism of MB was established by the FTIR and high-performance liquid chromatography(HPLC) analysis.The nanoparticles are cubic, estimated through X-ray diffraction(XRD) and transmission electron microscopy(TEM) analysis.The band gap energies, grain size, and the effective working pH were estimated by diffuse reflectance spectra(DRS), scanning electron microscope(SEM), and zero-point potential analysis respectively.A soil candle with MCA1 also fabricated for the household purpose and tested with some fluorinated field samples.The MCA3 was able to enhance the latent fingerprint on smooth surfaces.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51962017)。
文摘The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagonal crystal structure proposed by Roe and Bunge are not in accord with the normal direction(ND)being perpendicular to the rolling direction(RD).In this paper,these formulae are deduced independently according to the notations proposed by Roe and Bunge.The results show that in addition to the coincidence with the formulae for the cubic crystal structure given by the Roe and Bunge,the other formulae are different from Roe’s and Bunge’s.The new formulae are in accord with ND,RD,and transverse direction(TD)at right angles.
文摘This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing limitations,vehicle destination,etc.Most researchers who previously investigated this problem assumed the vehicle would not return to the depot,but did not consider its final destination.However,by considering 3PL in the B2B e-commerce,the vehicle is required back to the nearest 3PL location with available space.This paper formulates the problem as a mixed integer linear programming(MILP)model with the objective of minimizing the total travel distance.A coordinate representation particle swarm optimization(CRPSO)algorithm is developed to obtain the best delivery sequencing and the capacity of each vehicle.Results of the computational study show that the proposed method provides solution within a reasonable amount of time.Finally,the result compared to PSO also indicates that the CRPSO is effective.
文摘In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the mathematical kinematic position modeling of the laparoscopic tools used for autonomous positioning of a laparoscope in such operations. These models are obtained using Denavit-Hartenberg (D-H) Notations and Homogenous Transformation Matrix (HTM). The laparoscopic tools are considered as six degrees of freedom (DOF) mechanisms while the laparoscope has four DOF. The 3D loop closure equation is used to obtain the laparoscope kinematic position models in terms of those of the laparoscopic tools. These models are used to simulate and align the laparoscope camera with the surgeon’s laparoscopic Tools Center Points (TCP). The obtained results show the smooth positioning of the laparoscope camera for better visu-alization of laparoscopic surgery environments.