The deposition characteristics of nasal formulations directly determine the efficacy of the drugs,whilst the complexity of human nasal airway structure encumbers quantitative evaluation of nasal spatial deposition.Mal...The deposition characteristics of nasal formulations directly determine the efficacy of the drugs,whilst the complexity of human nasal airway structure encumbers quantitative evaluation of nasal spatial deposition.Male and female standard nasal airway structure models were calculated from computed tomography data of 128 Chinese Han nationality using statistical shape model.The deposition evaluation devices were further designed,and an imaging method was then employed to obtain drug deposition information.Furthermore,drug spatial deposition atlases were proposed by UV unwrapping,a mathematical mapping procedure flattening three-dimensional(3D)information to two-dimension bidirectionally,to achieve quantification of drug deposition fractions in the regions of interest.Moreover,the feasibility and universality of this method were verified by correlating it with the chemical quantitative results and computational fluid dynamic simulation of drug deposition of mometasone furoate nasal spray and hydroxypropyl methylcellulose nasal powder,respectively.Finally,the unique drug spatial deposition atlases of these two formulations in the male and female evaluation devices were generated,respectively.In summary,the standard nasal airway structure models of the Chinese Han nationality and the drug spatial deposition atlases provide scientific tools for the formulation optimization and quality control of nasal formulations.展开更多
Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the l...Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the last”SM particle.展开更多
We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. B...We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. Both quantum gravity and the particle model are shown to be derivable from the supersymmetric 3d Chern-Simons action. Forces-Matter unification is achieved.展开更多
To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hy...To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hypersonic transition research vehicle(HyTRV).The configuration of HyTRV is fully analytical,and details of the design process are discussed in this study.The transition characteristics for HyTRV are investigated using three combined methods,i.e.,theoretical analyses,numerical simulations,and wind tunnel experiments.Results show that the fully analytic parameterization design of HyTRV can satisfy the model simplification requirements from both numerical simulations and wind tunnel experiments.Meanwhile,the flow field of HyTRV reveals typical transition mechanisms in six relatively separated regions,including the streamwise vortex instability,crossflow instability,secondary instability,and attachment-line instability.Therefore,the proposed HyTRV model is valuable for fundamental researches in hypersonic boundary layer transition.展开更多
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde...In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.展开更多
Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symp...Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symptoms are caused by numerous complex variant types of the circle.Additionally,the lack of an evaluation system for the cer-ebral ischemia/reperfusion(I/R)model of gerbils has shackled the application of this model.Methods:We created a symptom-oriented principle and detailed neurobehavioral scoring criteria.At different time points of reperfusion,we analyzed the alteration in locomotion by rotarod test and grip force score,infarct volume by triphenyltetrazo-lium chloride(TTC)staining,neuron loss using Nissl staining,and histological charac-teristics using hematoxylin-eosin(H&E)straining.Results:With a successful model rate of 56%,32 of the 57 gerbils operated by our method harbored typical features of cerebral I/R injury,and the mortality rate in the male gerbils was significantly higher than that in the female gerbils.The suc-cessfully prepared I/R gerbils demonstrated a significant reduction in motility and grip strength at 1 day after reperfusion;formed obvious infarction;exhibited typi-cal pathological features,such as tissue edema,neuronal atrophy and death,and vacuolated structures;and were partially recovered with the extension of reperfu-sion time.Conclusion:This study developed a new method for the unilateral common carotid artery ligation I/R model of gerbil and established a standardized evaluation system for this model,which could provide a new cerebral I/R model of gerbils with more practical applications.展开更多
Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can ...Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can get rid of the certificate management problem in the traditional Public Key Infrastructure(PKI)and eliminate the key-escrow problem in the identity-based PKC.Lately,a new Certificateless Signature(CLS)scheme has been proposed by Kyung-Ah Shim(IEEE SYSTEMS JOURNAL,2018,13(2)),which claimed to achieve provable security in the standard model.Unfortunately,we present a concrete attack to demonstrate that the scheme cannot defend against the Type I adversary.In this type of attack,the adversary can replace the public key of the signer,and then he plays the role of the signer to forge a legal certificateless signature on any message.Furthermore,we give an improved CLS scheme to resist such an attack.In terms of the efficiency and the signature length,the improved CLS is preferable to the original scheme and some recently proposed CLS schemes in the case of precomputation.展开更多
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public...Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.展开更多
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or ...A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.展开更多
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos...To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment.展开更多
The weakly forced vibration of an axially moving viscoelastic beam is inves- tigated. The viscoelastic material of the beam is constituted by the standard linear solid model with the material time derivative involved....The weakly forced vibration of an axially moving viscoelastic beam is inves- tigated. The viscoelastic material of the beam is constituted by the standard linear solid model with the material time derivative involved. The nonlinear equations governing the transverse vibration are derived from the dynamical, constitutive, and geometrical relations. The method of multiple scales is used to determine the steady-state response. The modulation equation is derived from the solvability condition of eliminating secular terms. Closed-form expressions of the amplitude and existence condition of nontrivial steady-state response are derived from the modulation equation. The stability of non- trivial steady-state response is examined via the Routh-Hurwitz criterion.展开更多
To facilitate stability analysis of discrete-time bidirectional associative memory (BAM) neural networks, they were converted into novel neural network models, termed standard neural network models (SNNMs), which inte...To facilitate stability analysis of discrete-time bidirectional associative memory (BAM) neural networks, they were converted into novel neural network models, termed standard neural network models (SNNMs), which interconnect linear dynamic systems and bounded static nonlinear operators. By combining a number of different Lyapunov functionals with S-procedure, some useful criteria of global asymptotic stability and global exponential stability of the equilibrium points of SNNMs were derived. These stability conditions were formulated as linear matrix inequalities (LMIs). So global stability of the discrete-time BAM neural networks could be analyzed by using the stability results of the SNNMs. Compared to the existing stability analysis methods, the proposed approach is easy to implement, less conservative, and is applicable to other recurrent neural networks.展开更多
The underlying rules for a natural system describing cellular automata are simple, but produce highly complex behavior. A mathematical basis for the spectra of discrete coherent and non-coherent electromagnetic (EM) f...The underlying rules for a natural system describing cellular automata are simple, but produce highly complex behavior. A mathematical basis for the spectra of discrete coherent and non-coherent electromagnetic (EM) frequencies was derived, in which the algorithm exhibits an information distribution according to ratios of 2:3 in 1:2 at a semi-harmonic manner. This generalized music (GM) model shows that energy both in elementary particles and animate systems is semi-harmonic, quantized and discrete. A support for an ontological basis of the Standard Model was found, and indicates that the GM-model underlies the quantum field theory of subatomic particles. The present theory combines quantum mechanics and classical periodic systems, obeys to locality and solves the “hidden variable theory of Bohm”. The discovered pattern of electromagnetic field eigenvalues, within a broad range of discrete frequencies, points at a de Broglie/Bohm type of causal interpretation of quantum mechanics, implying an integral resonant pilot-wave/particle modality. The model has been substantiated by a meta-analysis of measured discrete energies of: 37 different Elementary Particles, 45 different EPR-measurements, zero-point energies of elements and about 450 electromagnetic wave frequencies of cells with a mean accuracy of 0.58%. It has been shown that the GM-scale is frequency-locked with zero-point oscillations, and thereby evidently implies involvement of entanglement.展开更多
The Standard Model of particle physics does not account for charged fermion mass values and neutrino mass, or explain why only three particles are in each charge state 0, -e/3, 2e/3, and -e. These issues are addressed...The Standard Model of particle physics does not account for charged fermion mass values and neutrino mass, or explain why only three particles are in each charge state 0, -e/3, 2e/3, and -e. These issues are addressed by treating Standard Model particles with mass m as spheres with diameter equal to their Compton wavelength l =ħ/mc, where ħis Planck’s constant and c the speed of light, and any charge in diametrically opposed pairs ±ne/6 with n = 1, 2, or 3 at the axis of rotation on the sphere surface. Particles are ground state solutions of quantized Friedmann equations from general relativity, with differing internal gravitational constants. Energy distribution within particles identifies Standard Model particles with spheres containing central black holes with mass m, and particle spin resulting from black hole angular momentum. In each charge state, energy distribution within particles satisfies a cubic equation in l, allowing only three particles in the charge state and requiring neutrino mass. Cosmic vacuum energy density is a lower limit on energy density of systems in the universe, and setting electron neutrino average energy density equal to cosmic vacuum energy density predicts neutrino masses consistent with experiment. Relations between charged fermion wavelength solutions to cubic equations in different charge states determine charged fermion masses relative to electron mass as a consequence of charge neutrality of the universe. An appendix shows assigning charge ±e/6 to bits of information on the event horizon available for holographic description of physics in the observable universe accounts for dominance of matter over anti-matter. The analysis explains why only three Standard Models are in each charge state and predicts neutrino masses based on cosmic vacuum energy density as a lower bound on neutrino energy density.展开更多
We investigated the neutral Higgs boson pair production at the CERN Large Hadron Collider (LHC) in the SM with four families. We found that the gluon-gluon fusion mode is the most dominant one in producing neutral Hig...We investigated the neutral Higgs boson pair production at the CERN Large Hadron Collider (LHC) in the SM with four families. We found that the gluon-gluon fusion mode is the most dominant one in producing neutral Higgs boson pair at the LHC, and it can be used to probe the trilinear Higgs coupling. If the heavy quarks of the fourth generation really exist within the SM, they can manifest their effect on the cross section of the Higgs pair production process at the LHC. Our numerical results show that there will be neutral Higgs boson pair production events per year if the next generation heavy quarks really exist, while there will be only events produced per year if there are only three families in the SM.展开更多
We consider single production of the heavy top quark T predicted by the three-site Higgsless model in future high energy collider experiments, such as the high energy linear e+ e- collider (ILC), the linear-ring ty...We consider single production of the heavy top quark T predicted by the three-site Higgsless model in future high energy collider experiments, such as the high energy linear e+ e- collider (ILC), the linear-ring type ep collider (THERA), and the CERN Large Hadron Collider (LHC). Our numerical results show that the possible signals of the heavy top quark T might be detected via the subproeess qb → q'T at the LHC.展开更多
The top-charm associated production with the effects from both B- and L-violating interactions in TeV scale photon-proton collisions is investigated in the framework of minimal supersymmetric standard model. Within t...The top-charm associated production with the effects from both B- and L-violating interactions in TeV scale photon-proton collisions is investigated in the framework of minimal supersymmetric standard model. Within the bounds on the relevant R-parity violating couplings, the total cross section will reach the order of 10 fb in some parts of the parameter space.展开更多
Using the form factors calculated in the three-point QCD sum rules, we calculate the new physics contri- butions to the physical observables of Bc→D;μ+ μ- decay in a family non-universal Z' model. Under the consi...Using the form factors calculated in the three-point QCD sum rules, we calculate the new physics contri- butions to the physical observables of Bc→D;μ+ μ- decay in a family non-universal Z' model. Under the consideration of three cases of the new physics parameters, we find that: (a) the Z' boson can provide large contributions to the differential decay rates; (b) the forward-backward asymmetry (FBA) can be increased by about 47%, 38%, and 110% at most in S1, S2, and extreme limR values (ELV), respectively. In addition, the zero crossing can be shifted in all the cases; (c) when s 〉 0.08, the value Of PL can be changed from -1 in the Standard Model (SM) to -0.5 in S1, -0.6 in S2, and 0 in extreme limit values, respectively; (d) the new physics corrections to PT will decrease the SM prediction about 25% for the cases of S1 and S2, 100% for the case of ELV.展开更多
We study two aspects of higher dimensional operators in standard model effective field theory.We first introduce a perturbative power counting rule for the entries in the anomalous dimension matrix of operators with e...We study two aspects of higher dimensional operators in standard model effective field theory.We first introduce a perturbative power counting rule for the entries in the anomalous dimension matrix of operators with equal mass dimension.The power counting is determined by the number of loops and the difference of the indices of the two operators involved,which in turn is defined by assuming that all terms in the standard model Lagrangian have an equal perturbative power.Then we show that the operators with the lowest index are unique at each mass dimension d,i.e.,(H^(†)H)^(d/2)for even d≥4,and(L^(T)εH)C(L^(T)εH)^(T)(H^(†)H)^((d-5)/2)for odd d≥5.Here H,L are the Higgs and lepton doublet,andε,C the antisymmetric matrix of rank two and the charge conjugation matrix,respectively.The renormalization group running of these operators can be studied separately from other operators of equal mass dimension at the leading order in power counting.We compute their anomalous dimensions at one loop for general d and find that they are enhanced quadratically in d due to combinatorics.We also make connections with classification of operators in terms of their holomorphic and anti-holomorphic weights.展开更多
Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispa...Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispatch system. Analyzed and finded out the law among them, and designed model maker to realize the automatic pro- gramming of the new model program.展开更多
基金funded by the National Natural Science Foundation of China(No.82273863).
文摘The deposition characteristics of nasal formulations directly determine the efficacy of the drugs,whilst the complexity of human nasal airway structure encumbers quantitative evaluation of nasal spatial deposition.Male and female standard nasal airway structure models were calculated from computed tomography data of 128 Chinese Han nationality using statistical shape model.The deposition evaluation devices were further designed,and an imaging method was then employed to obtain drug deposition information.Furthermore,drug spatial deposition atlases were proposed by UV unwrapping,a mathematical mapping procedure flattening three-dimensional(3D)information to two-dimension bidirectionally,to achieve quantification of drug deposition fractions in the regions of interest.Moreover,the feasibility and universality of this method were verified by correlating it with the chemical quantitative results and computational fluid dynamic simulation of drug deposition of mometasone furoate nasal spray and hydroxypropyl methylcellulose nasal powder,respectively.Finally,the unique drug spatial deposition atlases of these two formulations in the male and female evaluation devices were generated,respectively.In summary,the standard nasal airway structure models of the Chinese Han nationality and the drug spatial deposition atlases provide scientific tools for the formulation optimization and quality control of nasal formulations.
文摘Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the last”SM particle.
文摘We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. Both quantum gravity and the particle model are shown to be derivable from the supersymmetric 3d Chern-Simons action. Forces-Matter unification is achieved.
基金This work was supported by the National Natural Science Foundation of China(Grant 11702315,92052301)the National Key Research and Development Program of China(Grant 2016YFA0401200).
文摘To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hypersonic transition research vehicle(HyTRV).The configuration of HyTRV is fully analytical,and details of the design process are discussed in this study.The transition characteristics for HyTRV are investigated using three combined methods,i.e.,theoretical analyses,numerical simulations,and wind tunnel experiments.Results show that the fully analytic parameterization design of HyTRV can satisfy the model simplification requirements from both numerical simulations and wind tunnel experiments.Meanwhile,the flow field of HyTRV reveals typical transition mechanisms in six relatively separated regions,including the streamwise vortex instability,crossflow instability,secondary instability,and attachment-line instability.Therefore,the proposed HyTRV model is valuable for fundamental researches in hypersonic boundary layer transition.
基金the Natural Science Foundation of Shandong Province (Y2007G37)the Science and Technology Development Program of Shandong Province (2007GG10001012)
文摘In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.
基金National Key Research and Development Program of China,Grant/Award Number:2021YFF0702402National Natural Science Foundation of China,Grant/Award Number:32070531。
文摘Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symptoms are caused by numerous complex variant types of the circle.Additionally,the lack of an evaluation system for the cer-ebral ischemia/reperfusion(I/R)model of gerbils has shackled the application of this model.Methods:We created a symptom-oriented principle and detailed neurobehavioral scoring criteria.At different time points of reperfusion,we analyzed the alteration in locomotion by rotarod test and grip force score,infarct volume by triphenyltetrazo-lium chloride(TTC)staining,neuron loss using Nissl staining,and histological charac-teristics using hematoxylin-eosin(H&E)straining.Results:With a successful model rate of 56%,32 of the 57 gerbils operated by our method harbored typical features of cerebral I/R injury,and the mortality rate in the male gerbils was significantly higher than that in the female gerbils.The suc-cessfully prepared I/R gerbils demonstrated a significant reduction in motility and grip strength at 1 day after reperfusion;formed obvious infarction;exhibited typi-cal pathological features,such as tissue edema,neuronal atrophy and death,and vacuolated structures;and were partially recovered with the extension of reperfu-sion time.Conclusion:This study developed a new method for the unilateral common carotid artery ligation I/R model of gerbil and established a standardized evaluation system for this model,which could provide a new cerebral I/R model of gerbils with more practical applications.
基金partially supported by the National Natural Science Foundation of China under grant Nos.61872060 and 61772292the National Key R&D Program of China under grant No.2017YFB0802000+3 种基金Key Laboratory of Financial Mathematics of Fujian Province University(Putian University)under grant Nos.JR201806 and JR201901by the Natural Science Foundation of Fujian Province under grant Nos.2019J01752 and 2020J01905by the Program for Innovative Research Team in Science and Technology in Fujian Province University under grant No.2018-049by the Educational Research Projects of Young and Middle-aged Teachers in Fujian Education Department(JAT200514).
文摘Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can get rid of the certificate management problem in the traditional Public Key Infrastructure(PKI)and eliminate the key-escrow problem in the identity-based PKC.Lately,a new Certificateless Signature(CLS)scheme has been proposed by Kyung-Ah Shim(IEEE SYSTEMS JOURNAL,2018,13(2)),which claimed to achieve provable security in the standard model.Unfortunately,we present a concrete attack to demonstrate that the scheme cannot defend against the Type I adversary.In this type of attack,the adversary can replace the public key of the signer,and then he plays the role of the signer to forge a legal certificateless signature on any message.Furthermore,we give an improved CLS scheme to resist such an attack.In terms of the efficiency and the signature length,the improved CLS is preferable to the original scheme and some recently proposed CLS schemes in the case of precomputation.
基金Supported by the National Natural Science Foundation of China (6057303)the Program for New Century Excellent Talents in University by Ministry of Education (NCET-05-0398)
文摘Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.
基金the Natural Science Foundation of Shaanxi Province (No.2010JQ8017)the China Postdoctoral Science Foundation (No.2011M501427)the Special Found for Basic Scientific Research of Central Colleges of Chang’an University(No.CHD2012JC047)
文摘A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.
基金the National Natural Science Foundation of China (No.60970119)the National Basic Research Program (973) of China (No.2007CB311201)
文摘To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment.
基金Project supported by the National Natural Science Foundation of China (No.10972143)the Shanghai Municipal Education Commission (No.YYY11040)+2 种基金the Shanghai Leading Academic Discipline Project (No.J51501)the Leading Academic Discipline Project of Shanghai Institute of Technology(No.1020Q121001)the Start Foundation for Introducing Talents of Shanghai Institute of Technology (No.YJ2011-26)
文摘The weakly forced vibration of an axially moving viscoelastic beam is inves- tigated. The viscoelastic material of the beam is constituted by the standard linear solid model with the material time derivative involved. The nonlinear equations governing the transverse vibration are derived from the dynamical, constitutive, and geometrical relations. The method of multiple scales is used to determine the steady-state response. The modulation equation is derived from the solvability condition of eliminating secular terms. Closed-form expressions of the amplitude and existence condition of nontrivial steady-state response are derived from the modulation equation. The stability of non- trivial steady-state response is examined via the Routh-Hurwitz criterion.
基金Project (No. 60074008) supported by the National Natural Science Foundation of China
文摘To facilitate stability analysis of discrete-time bidirectional associative memory (BAM) neural networks, they were converted into novel neural network models, termed standard neural network models (SNNMs), which interconnect linear dynamic systems and bounded static nonlinear operators. By combining a number of different Lyapunov functionals with S-procedure, some useful criteria of global asymptotic stability and global exponential stability of the equilibrium points of SNNMs were derived. These stability conditions were formulated as linear matrix inequalities (LMIs). So global stability of the discrete-time BAM neural networks could be analyzed by using the stability results of the SNNMs. Compared to the existing stability analysis methods, the proposed approach is easy to implement, less conservative, and is applicable to other recurrent neural networks.
文摘The underlying rules for a natural system describing cellular automata are simple, but produce highly complex behavior. A mathematical basis for the spectra of discrete coherent and non-coherent electromagnetic (EM) frequencies was derived, in which the algorithm exhibits an information distribution according to ratios of 2:3 in 1:2 at a semi-harmonic manner. This generalized music (GM) model shows that energy both in elementary particles and animate systems is semi-harmonic, quantized and discrete. A support for an ontological basis of the Standard Model was found, and indicates that the GM-model underlies the quantum field theory of subatomic particles. The present theory combines quantum mechanics and classical periodic systems, obeys to locality and solves the “hidden variable theory of Bohm”. The discovered pattern of electromagnetic field eigenvalues, within a broad range of discrete frequencies, points at a de Broglie/Bohm type of causal interpretation of quantum mechanics, implying an integral resonant pilot-wave/particle modality. The model has been substantiated by a meta-analysis of measured discrete energies of: 37 different Elementary Particles, 45 different EPR-measurements, zero-point energies of elements and about 450 electromagnetic wave frequencies of cells with a mean accuracy of 0.58%. It has been shown that the GM-scale is frequency-locked with zero-point oscillations, and thereby evidently implies involvement of entanglement.
文摘The Standard Model of particle physics does not account for charged fermion mass values and neutrino mass, or explain why only three particles are in each charge state 0, -e/3, 2e/3, and -e. These issues are addressed by treating Standard Model particles with mass m as spheres with diameter equal to their Compton wavelength l =ħ/mc, where ħis Planck’s constant and c the speed of light, and any charge in diametrically opposed pairs ±ne/6 with n = 1, 2, or 3 at the axis of rotation on the sphere surface. Particles are ground state solutions of quantized Friedmann equations from general relativity, with differing internal gravitational constants. Energy distribution within particles identifies Standard Model particles with spheres containing central black holes with mass m, and particle spin resulting from black hole angular momentum. In each charge state, energy distribution within particles satisfies a cubic equation in l, allowing only three particles in the charge state and requiring neutrino mass. Cosmic vacuum energy density is a lower limit on energy density of systems in the universe, and setting electron neutrino average energy density equal to cosmic vacuum energy density predicts neutrino masses consistent with experiment. Relations between charged fermion wavelength solutions to cubic equations in different charge states determine charged fermion masses relative to electron mass as a consequence of charge neutrality of the universe. An appendix shows assigning charge ±e/6 to bits of information on the event horizon available for holographic description of physics in the observable universe accounts for dominance of matter over anti-matter. The analysis explains why only three Standard Models are in each charge state and predicts neutrino masses based on cosmic vacuum energy density as a lower bound on neutrino energy density.
基金The project supported in part by National Natural Science Foundation of China
文摘We investigated the neutral Higgs boson pair production at the CERN Large Hadron Collider (LHC) in the SM with four families. We found that the gluon-gluon fusion mode is the most dominant one in producing neutral Higgs boson pair at the LHC, and it can be used to probe the trilinear Higgs coupling. If the heavy quarks of the fourth generation really exist within the SM, they can manifest their effect on the cross section of the Higgs pair production process at the LHC. Our numerical results show that there will be neutral Higgs boson pair production events per year if the next generation heavy quarks really exist, while there will be only events produced per year if there are only three families in the SM.
基金Supported in part by the National Natural Science Foundation of China under Qrants No 10675057, and Foundation of Liaoning Educational Committee (2007T086).
文摘We consider single production of the heavy top quark T predicted by the three-site Higgsless model in future high energy collider experiments, such as the high energy linear e+ e- collider (ILC), the linear-ring type ep collider (THERA), and the CERN Large Hadron Collider (LHC). Our numerical results show that the possible signals of the heavy top quark T might be detected via the subproeess qb → q'T at the LHC.
文摘The top-charm associated production with the effects from both B- and L-violating interactions in TeV scale photon-proton collisions is investigated in the framework of minimal supersymmetric standard model. Within the bounds on the relevant R-parity violating couplings, the total cross section will reach the order of 10 fb in some parts of the parameter space.
基金Supported by the National Natural Science Foundation of China under Grant Nos. 10947020 and 11147004Natural Science Foundation of Henan Province under Grant No. 112300410188
文摘Using the form factors calculated in the three-point QCD sum rules, we calculate the new physics contri- butions to the physical observables of Bc→D;μ+ μ- decay in a family non-universal Z' model. Under the consideration of three cases of the new physics parameters, we find that: (a) the Z' boson can provide large contributions to the differential decay rates; (b) the forward-backward asymmetry (FBA) can be increased by about 47%, 38%, and 110% at most in S1, S2, and extreme limR values (ELV), respectively. In addition, the zero crossing can be shifted in all the cases; (c) when s 〉 0.08, the value Of PL can be changed from -1 in the Standard Model (SM) to -0.5 in S1, -0.6 in S2, and 0 in extreme limit values, respectively; (d) the new physics corrections to PT will decrease the SM prediction about 25% for the cases of S1 and S2, 100% for the case of ELV.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11025525,11575089the CAS Center for Excellence in Particle Physics(CCEPP)
文摘We study two aspects of higher dimensional operators in standard model effective field theory.We first introduce a perturbative power counting rule for the entries in the anomalous dimension matrix of operators with equal mass dimension.The power counting is determined by the number of loops and the difference of the indices of the two operators involved,which in turn is defined by assuming that all terms in the standard model Lagrangian have an equal perturbative power.Then we show that the operators with the lowest index are unique at each mass dimension d,i.e.,(H^(†)H)^(d/2)for even d≥4,and(L^(T)εH)C(L^(T)εH)^(T)(H^(†)H)^((d-5)/2)for odd d≥5.Here H,L are the Higgs and lepton doublet,andε,C the antisymmetric matrix of rank two and the charge conjugation matrix,respectively.The renormalization group running of these operators can be studied separately from other operators of equal mass dimension at the leading order in power counting.We compute their anomalous dimensions at one loop for general d and find that they are enhanced quadratically in d due to combinatorics.We also make connections with classification of operators in terms of their holomorphic and anti-holomorphic weights.
基金Supported by the Production Safety and Supervision of Management Bureau of China(04-116) the Returned Overseas Scholar Fund of Educational De-partment of P.R.C(2003406)+1 种基金 the Soft Science Planning Program of Shandong Province (A200423-6) the National Soft Science Planed Program (2004DGQ3D090).
文摘Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispatch system. Analyzed and finded out the law among them, and designed model maker to realize the automatic pro- gramming of the new model program.