This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree sig...This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.展开更多
The poetry of Maggie O’Sullivan, a poet associated with the British Poetry Revival, activates prosodic dissonance and incorporates music, which is to say musical scores. In works like From the Handbook of That & ...The poetry of Maggie O’Sullivan, a poet associated with the British Poetry Revival, activates prosodic dissonance and incorporates music, which is to say musical scores. In works like From the Handbook of That & Furriery and Palace of Reptiles , musical scores are collaged into the body of the poem. Using the phrase “notational poetics,” this analysis is as much concerned with poems that sound as poems that don’t, but poetry nonetheless that both treats the spatial field of the poem scorelike and / or includes actual musical notation. When poetry meets music myriad questions crop up: Is poetry a kind of (analogous) “music,” as often suggested? What draws poetry to music, and vice versa? Is some mutual estrangement the result of poetry and music having become further alienated over time?展开更多
While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scro...While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.展开更多
AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架...AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.展开更多
This paper uses the concept of algorithmic efficiency to present a unified theory of intelligence. Intelligence is defined informally, formally, and computationally. We introduce the concept of dimensional complexity ...This paper uses the concept of algorithmic efficiency to present a unified theory of intelligence. Intelligence is defined informally, formally, and computationally. We introduce the concept of dimensional complexity in algorithmic efficiency and deduce that an optimally efficient algorithm has zero time complexity, zero space complexity, and an infinite dimensional complexity. This algorithm is used to generate the number line.展开更多
形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安...形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安全性和可靠性描述为某时刻组状态的性质。组管理过程是事件触发的组状态的变换过程,其终极目标是保证组在任一个稳定时刻都处于安全状态,但完全安全是不可能的。本文给出一个组策略框架,在此框架下提出安全组管理行为规则,并说明根据规则组状态转换过程满足安全策略约束。展开更多
An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelatin...An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelating ligand and the calcination temperature was determined by the thermogravimetric analysis of the precursor mass.They acted as good fluoride adsorbent in the presence of co-ions, different pH(2–11) via chemisorption revealed from Fourier-transform infrared spectroscopy(FTIR) and photodegraded Methylene Blue(MB).The satisfactory results were for MCA1(specific surface area 25.05 m^2/g) with 97%fluoride removal at pH 7.0 for the 10 mg/L initial fluoride concentration for 1.5 g/L adsorbent dose with 45 min contact time obeying the Langmuir isotherm model with negative thermodynamic parameters and 4 mmol of MCA3 with 98.51% photodegradation for 10-5 mol/L MB solution obeying pseudo-second-order and pseudo-first-order kinetics respectively.The proposed photodegradation mechanism of MB was established by the FTIR and high-performance liquid chromatography(HPLC) analysis.The nanoparticles are cubic, estimated through X-ray diffraction(XRD) and transmission electron microscopy(TEM) analysis.The band gap energies, grain size, and the effective working pH were estimated by diffuse reflectance spectra(DRS), scanning electron microscope(SEM), and zero-point potential analysis respectively.A soil candle with MCA1 also fabricated for the household purpose and tested with some fluorinated field samples.The MCA3 was able to enhance the latent fingerprint on smooth surfaces.展开更多
The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagon...The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagonal crystal structure proposed by Roe and Bunge are not in accord with the normal direction(ND)being perpendicular to the rolling direction(RD).In this paper,these formulae are deduced independently according to the notations proposed by Roe and Bunge.The results show that in addition to the coincidence with the formulae for the cubic crystal structure given by the Roe and Bunge,the other formulae are different from Roe’s and Bunge’s.The new formulae are in accord with ND,RD,and transverse direction(TD)at right angles.展开更多
This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing...This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing limitations,vehicle destination,etc.Most researchers who previously investigated this problem assumed the vehicle would not return to the depot,but did not consider its final destination.However,by considering 3PL in the B2B e-commerce,the vehicle is required back to the nearest 3PL location with available space.This paper formulates the problem as a mixed integer linear programming(MILP)model with the objective of minimizing the total travel distance.A coordinate representation particle swarm optimization(CRPSO)algorithm is developed to obtain the best delivery sequencing and the capacity of each vehicle.Results of the computational study show that the proposed method provides solution within a reasonable amount of time.Finally,the result compared to PSO also indicates that the CRPSO is effective.展开更多
In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the math...In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the mathematical kinematic position modeling of the laparoscopic tools used for autonomous positioning of a laparoscope in such operations. These models are obtained using Denavit-Hartenberg (D-H) Notations and Homogenous Transformation Matrix (HTM). The laparoscopic tools are considered as six degrees of freedom (DOF) mechanisms while the laparoscope has four DOF. The 3D loop closure equation is used to obtain the laparoscope kinematic position models in terms of those of the laparoscopic tools. These models are used to simulate and align the laparoscope camera with the surgeon’s laparoscopic Tools Center Points (TCP). The obtained results show the smooth positioning of the laparoscope camera for better visu-alization of laparoscopic surgery environments.展开更多
Based on cognitive science, the EnergyCalculus in Chinese language segmentation was presented to eliminate segmentation ambiguity. The notion of “EnergyCost” was advanced to denote the extent of the under standabili...Based on cognitive science, the EnergyCalculus in Chinese language segmentation was presented to eliminate segmentation ambiguity. The notion of “EnergyCost” was advanced to denote the extent of the under standability of a certain segmentation. EnergyCost function was defined with Z notation. This approcah is effective to all natural language segmentation.展开更多
The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This pape...The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.展开更多
Communication is a basic need of every human being;by this,they can learn,express their feelings and exchange their ideas,but deaf people cannot listen and speak.For communication,they use various hands gestures,also ...Communication is a basic need of every human being;by this,they can learn,express their feelings and exchange their ideas,but deaf people cannot listen and speak.For communication,they use various hands gestures,also known as Sign Language(SL),which they learn from special schools.As normal people have not taken SL classes;therefore,they are unable to perform signs of daily routine sentences(e.g.,what are the specifications of this mobile phone?).A technological solution can facilitate in overcoming this communication gap by which normal people can communicate with deaf people.This paper presents an architecture for an application named Sign4PSL that translates the sentences to Pakistan Sign Language(PSL)for deaf people with visual representation using virtual signing character.This research aims to develop a generic independent application that is lightweight and reusable on any platform,including web and mobile,with an ability to perform offline text translation.The Sign4PSL relies on a knowledge base that stores both corpus of PSL Words and their coded form in the notation system.Sign4PSL takes English language text as an input,performs the translation to PSL through sign language notation and displays gestures to the user using virtual character.The system is tested on deaf students at a special school.The results have shown that the students were able to understand the story presented to them appropriately.展开更多
The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to a...The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues that are yet to be solved due to dynamic complex nature of wireless systems, multimedia software applications and software requirements. Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for the current LTE systems that are addressed very recently in the scientific literature. Formal method is one of the promising software engineering techniques that assure quality and perfection in software system models. Formal methods use mathematical language to explicitly specify system specifications and requirements that serve as initial grounds for further development and implementation. It efficiently handles all component connections and resource management parameters using discrete structures. Z Schema language is used to model static aspects of LTE communications system. All the schemas are being verified using Z/Eves toolset. The aim is to provide sound mathematical foundation for system validation and verification that eventually results in a more reliable, scalable and complete software system.展开更多
基金funded by the Ministry of Science and Higher Education of Kazakhstan and carried out within the framework of the project AP23488112“Development and study of a quantum-resistant digital signature scheme based on a Verkle tree”at the Institute of Information and Computational Technologies.
文摘This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.
文摘The poetry of Maggie O’Sullivan, a poet associated with the British Poetry Revival, activates prosodic dissonance and incorporates music, which is to say musical scores. In works like From the Handbook of That & Furriery and Palace of Reptiles , musical scores are collaged into the body of the poem. Using the phrase “notational poetics,” this analysis is as much concerned with poems that sound as poems that don’t, but poetry nonetheless that both treats the spatial field of the poem scorelike and / or includes actual musical notation. When poetry meets music myriad questions crop up: Is poetry a kind of (analogous) “music,” as often suggested? What draws poetry to music, and vice versa? Is some mutual estrangement the result of poetry and music having become further alienated over time?
文摘While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.
文摘AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.
文摘This paper uses the concept of algorithmic efficiency to present a unified theory of intelligence. Intelligence is defined informally, formally, and computationally. We introduce the concept of dimensional complexity in algorithmic efficiency and deduce that an optimally efficient algorithm has zero time complexity, zero space complexity, and an infinite dimensional complexity. This algorithm is used to generate the number line.
文摘形式化方法是研究复杂管理系统的有用工具。本文提出一个基于状态的安全组管理形式模型,采用 Z Nota-tion语言描述。安全组是共享组密钥的授权成员的集合,本文不是直接定义安全组而是定义组状态,组状态是某一时刻的组安全上下文,组的安全性和可靠性描述为某时刻组状态的性质。组管理过程是事件触发的组状态的变换过程,其终极目标是保证组在任一个稳定时刻都处于安全状态,但完全安全是不可能的。本文给出一个组策略框架,在此框架下提出安全组管理行为规则,并说明根据规则组状态转换过程满足安全策略约束。
基金Department of Science and Technology,Government of West Bengal,India,vide project sanction(No.674(sanc)/ST/P/S&T/15G/5/2016)dated 09/11/2016 for financial supportthe Council of Scientific and Industrial Research(CSIR),Government of India for the Senior Research fellowship(No.09/1156(0004)/18-EMR-I).
文摘An adaptable, energy efficient chemical process is employed to synthesize Cu^2+engrafted MgAl2O4 nanoparticles(Mg1-xCuxAl2O4, x = 0, 0.1, 0.3, 0.5 abbreviated as MCA0, MCA1, MCA3,and MCA5 respectively), using chelating ligand and the calcination temperature was determined by the thermogravimetric analysis of the precursor mass.They acted as good fluoride adsorbent in the presence of co-ions, different pH(2–11) via chemisorption revealed from Fourier-transform infrared spectroscopy(FTIR) and photodegraded Methylene Blue(MB).The satisfactory results were for MCA1(specific surface area 25.05 m^2/g) with 97%fluoride removal at pH 7.0 for the 10 mg/L initial fluoride concentration for 1.5 g/L adsorbent dose with 45 min contact time obeying the Langmuir isotherm model with negative thermodynamic parameters and 4 mmol of MCA3 with 98.51% photodegradation for 10-5 mol/L MB solution obeying pseudo-second-order and pseudo-first-order kinetics respectively.The proposed photodegradation mechanism of MB was established by the FTIR and high-performance liquid chromatography(HPLC) analysis.The nanoparticles are cubic, estimated through X-ray diffraction(XRD) and transmission electron microscopy(TEM) analysis.The band gap energies, grain size, and the effective working pH were estimated by diffuse reflectance spectra(DRS), scanning electron microscope(SEM), and zero-point potential analysis respectively.A soil candle with MCA1 also fabricated for the household purpose and tested with some fluorinated field samples.The MCA3 was able to enhance the latent fingerprint on smooth surfaces.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51962017)。
文摘The formulae of the relationships between Euler angles and texture are important for the orientation distribution functions of research materials.At present,it is found that the formulae for the orthogonal and hexagonal crystal structure proposed by Roe and Bunge are not in accord with the normal direction(ND)being perpendicular to the rolling direction(RD).In this paper,these formulae are deduced independently according to the notations proposed by Roe and Bunge.The results show that in addition to the coincidence with the formulae for the cubic crystal structure given by the Roe and Bunge,the other formulae are different from Roe’s and Bunge’s.The new formulae are in accord with ND,RD,and transverse direction(TD)at right angles.
文摘This paper proposes a solution to the open vehicle routing problem with time windows(OVRPTW)considering third-party logistics(3PL).For the typical OVRPTW problem,most researchers consider time windows,capacity,routing limitations,vehicle destination,etc.Most researchers who previously investigated this problem assumed the vehicle would not return to the depot,but did not consider its final destination.However,by considering 3PL in the B2B e-commerce,the vehicle is required back to the nearest 3PL location with available space.This paper formulates the problem as a mixed integer linear programming(MILP)model with the objective of minimizing the total travel distance.A coordinate representation particle swarm optimization(CRPSO)algorithm is developed to obtain the best delivery sequencing and the capacity of each vehicle.Results of the computational study show that the proposed method provides solution within a reasonable amount of time.Finally,the result compared to PSO also indicates that the CRPSO is effective.
文摘In laparoscopic surgery, the surgeons are equipped with the suitable tools for the surgery, while the laparoscope is used to capture the operation environment and displays it on a monitor. This paper presents the mathematical kinematic position modeling of the laparoscopic tools used for autonomous positioning of a laparoscope in such operations. These models are obtained using Denavit-Hartenberg (D-H) Notations and Homogenous Transformation Matrix (HTM). The laparoscopic tools are considered as six degrees of freedom (DOF) mechanisms while the laparoscope has four DOF. The 3D loop closure equation is used to obtain the laparoscope kinematic position models in terms of those of the laparoscopic tools. These models are used to simulate and align the laparoscope camera with the surgeon’s laparoscopic Tools Center Points (TCP). The obtained results show the smooth positioning of the laparoscope camera for better visu-alization of laparoscopic surgery environments.
文摘Based on cognitive science, the EnergyCalculus in Chinese language segmentation was presented to eliminate segmentation ambiguity. The notion of “EnergyCost” was advanced to denote the extent of the under standability of a certain segmentation. EnergyCost function was defined with Z notation. This approcah is effective to all natural language segmentation.
文摘The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.
基金This research is ongoing research supported by Yayasan Universiti Teknologi PETRONAS Grant Scheme,015LC0029 and 015LC0277.
文摘Communication is a basic need of every human being;by this,they can learn,express their feelings and exchange their ideas,but deaf people cannot listen and speak.For communication,they use various hands gestures,also known as Sign Language(SL),which they learn from special schools.As normal people have not taken SL classes;therefore,they are unable to perform signs of daily routine sentences(e.g.,what are the specifications of this mobile phone?).A technological solution can facilitate in overcoming this communication gap by which normal people can communicate with deaf people.This paper presents an architecture for an application named Sign4PSL that translates the sentences to Pakistan Sign Language(PSL)for deaf people with visual representation using virtual signing character.This research aims to develop a generic independent application that is lightweight and reusable on any platform,including web and mobile,with an ability to perform offline text translation.The Sign4PSL relies on a knowledge base that stores both corpus of PSL Words and their coded form in the notation system.Sign4PSL takes English language text as an input,performs the translation to PSL through sign language notation and displays gestures to the user using virtual character.The system is tested on deaf students at a special school.The results have shown that the students were able to understand the story presented to them appropriately.
文摘The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues that are yet to be solved due to dynamic complex nature of wireless systems, multimedia software applications and software requirements. Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for the current LTE systems that are addressed very recently in the scientific literature. Formal method is one of the promising software engineering techniques that assure quality and perfection in software system models. Formal methods use mathematical language to explicitly specify system specifications and requirements that serve as initial grounds for further development and implementation. It efficiently handles all component connections and resource management parameters using discrete structures. Z Schema language is used to model static aspects of LTE communications system. All the schemas are being verified using Z/Eves toolset. The aim is to provide sound mathematical foundation for system validation and verification that eventually results in a more reliable, scalable and complete software system.