Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symp...Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symptoms are caused by numerous complex variant types of the circle.Additionally,the lack of an evaluation system for the cer-ebral ischemia/reperfusion(I/R)model of gerbils has shackled the application of this model.Methods:We created a symptom-oriented principle and detailed neurobehavioral scoring criteria.At different time points of reperfusion,we analyzed the alteration in locomotion by rotarod test and grip force score,infarct volume by triphenyltetrazo-lium chloride(TTC)staining,neuron loss using Nissl staining,and histological charac-teristics using hematoxylin-eosin(H&E)straining.Results:With a successful model rate of 56%,32 of the 57 gerbils operated by our method harbored typical features of cerebral I/R injury,and the mortality rate in the male gerbils was significantly higher than that in the female gerbils.The suc-cessfully prepared I/R gerbils demonstrated a significant reduction in motility and grip strength at 1 day after reperfusion;formed obvious infarction;exhibited typi-cal pathological features,such as tissue edema,neuronal atrophy and death,and vacuolated structures;and were partially recovered with the extension of reperfu-sion time.Conclusion:This study developed a new method for the unilateral common carotid artery ligation I/R model of gerbil and established a standardized evaluation system for this model,which could provide a new cerebral I/R model of gerbils with more practical applications.展开更多
Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispa...Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispatch system. Analyzed and finded out the law among them, and designed model maker to realize the automatic pro- gramming of the new model program.展开更多
With the globalization and diversification of the market and the rapid development of Information Technology(IT)and Artificial Intelligence(AI),the digital revolution of manufacturing is coming.One of the key technolo...With the globalization and diversification of the market and the rapid development of Information Technology(IT)and Artificial Intelligence(AI),the digital revolution of manufacturing is coming.One of the key technologies in digital manufacturing is product digital modeling.This paper firstly analyzes the information and features of the product digital model during each stage in the product whole lifecycle,then researches on the three critical technologies of digital modeling in digital man-ufacturing-product modeling,standard for the exchange of product model data and digital product data management.And the potential signification of the product digital model during the process of digital manufacturing is concluded-product digital model integrates primary features of each stage during the product whole lifecycle based on graphic features,applies STEP as data ex-change mechanism,and establishes PDM system to manage the large amount,complicated and dynamic product data to implement the product digital model data exchange,sharing and integration.展开更多
In this manuscript,we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites,bypassing general computational homogenization.The method is based on the reduced-order hom...In this manuscript,we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites,bypassing general computational homogenization.The method is based on the reduced-order homogenization(ROH)approach.The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an‘off-line’stage,which offers substantial cost savings compared to direct computational homogenization methods.Due to the unique structure of the fibrous unit cell,“off-line”stage calculation can be eliminated by influence functions obtained analytically.Introducing the standard solid model to the ROH method enables the creation of a comprehensive analytical homogeneous viscoelastic constitutive model.This method treats fibrous composite materials as homogeneous,anisotropic viscoelastic materials,significantly reducing computational time due to its analytical nature.This approach also enables precise determination of a homogenized anisotropic relaxation modulus and accurate capture of various viscoelastic responses under different loading conditions.Three sets of numerical examples,including unit cell tests,three-point beam bending tests,and torsion tests,are given to demonstrate the predictive performance of the homogenized viscoelastic model.Furthermore,the model is validated against experimental measurements,confirming its accuracy and reliability.展开更多
Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the l...Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the last”SM particle.展开更多
We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. B...We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. Both quantum gravity and the particle model are shown to be derivable from the supersymmetric 3d Chern-Simons action. Forces-Matter unification is achieved.展开更多
The future space-borne gravitational wave(GW)detectors would provide a promising probe for the new physics beyond the standard model that admits the first-order phase transitions.The predictions for the GW background ...The future space-borne gravitational wave(GW)detectors would provide a promising probe for the new physics beyond the standard model that admits the first-order phase transitions.The predictions for the GW background vary sensitively among different concrete particle physics models but also share a large degeneracy in the model buildings,which motivates an effective model description on the phase transition based on different patterns of the electroweak symmetry breaking(EWSB).In this paper,using the scalar N-plet model as a demonstration,we propose an effective classification for three different patterns of EWSB:(1)radiative symmetry breaking with classical scale invariance,(2)the Higgs mechanism in a generic scalar extension,and(3)higher-dimensional operators.We conclude that a strong first-order phase transition could be realized for(1)and(2)with a small quartic coupling and a small isospin of an additional N-plet field for the light scalar field model with and without the classical scale invariance,and(3)with a large mixing coupling between scalar fields and a large isospin of the N-plet field for the heavy scalar field model.展开更多
To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hy...To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hypersonic transition research vehicle(HyTRV).The configuration of HyTRV is fully analytical,and details of the design process are discussed in this study.The transition characteristics for HyTRV are investigated using three combined methods,i.e.,theoretical analyses,numerical simulations,and wind tunnel experiments.Results show that the fully analytic parameterization design of HyTRV can satisfy the model simplification requirements from both numerical simulations and wind tunnel experiments.Meanwhile,the flow field of HyTRV reveals typical transition mechanisms in six relatively separated regions,including the streamwise vortex instability,crossflow instability,secondary instability,and attachment-line instability.Therefore,the proposed HyTRV model is valuable for fundamental researches in hypersonic boundary layer transition.展开更多
We calculate the long-range Van der Waals force and the photoelectric cross section in a noncommutative setup. It is argued that non-commutativity effects could not be discerned for the Van der Waals interactions. The...We calculate the long-range Van der Waals force and the photoelectric cross section in a noncommutative setup. It is argued that non-commutativity effects could not be discerned for the Van der Waals interactions. The result for the photoelectric effect shows deviation from the usual commutative one, which in principle can be used to put bounds on the space-space non-commutativity parameter.展开更多
The non-stationary behavior, caused by the train rmverrent, is the rmin factor for the variation of high speed railway channel. To measure the tirce-variant effect, the parameter of stationarity interval, in which the...The non-stationary behavior, caused by the train rmverrent, is the rmin factor for the variation of high speed railway channel. To measure the tirce-variant effect, the parameter of stationarity interval, in which the channel keeps constant or has no great change, is adopted based on Zhengzfiou- Xi'an (Zhengxi) passenger dedicated line measurement with different train speeds. The stationarity interval is calculated through the definition of Local Region of Stationarity (LRS) under three train ve- locities. Furthermore, the time non-stationary characteristic of high speed pared with five standard railway channel is corn- Multiple-Input MultipleOutput (MIMO) channel models, i.e. Spatial Channel Model (SCM), extended version of SCM (SCME), Wireless World Initiative New Radio Phase II (WINNERII), International Mobile Teleconmnications-Advanced (IMT-Advanced) and WiMAX models which contain the high speed moving scenario. The stationarity interval of real channel is 9 ms in 80% of the cases, which is shorter than those of the standard models. Hence the real channel of high speed railway changes more rapidly. The stationarity intervals of standard models are different due to different modeling methods and scenario def- initions. And the compared results are instructive for wireless system design in high speed railway.展开更多
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde...In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.展开更多
The variation of the Asian winter monsoonal strength has seriously affected the climate and environmental conditions in the Asian monsoonal region, and even in marginal islands and the ocean in the East Asian region. ...The variation of the Asian winter monsoonal strength has seriously affected the climate and environmental conditions in the Asian monsoonal region, and even in marginal islands and the ocean in the East Asian region. However, relevant under-standing remains unclear due to the lack of suitable geological materials and effective proxies in the key study areas. Here, we present a grain-size record derived from the palaeo-aeolian sand dune in the southeastern Mu Us Desert, together with other proxies and OSL dating, which reflect a relatively detailed history of the winter monsoon and abrupt environmental events during the past 4.2 ka. Our grain-size standard deviation model indicated that 〉224 μm content can be considered as an indicator of the intensity of Asian winter monsoon, and it shows declined around 4.2–2.1 ka, enhanced but unstable in 2.1–0.9 ka, and obviously stronger since then. In addition, several typical climate events were also documented, forced by the periodic variation of winter monsoonal intensity. These include the cold intervals of 4.2, 2.8, 1.4 ka, and the Little Ice Age (LIA), and relatively warm sub-phases around 3.0, 2.1, 1.8 ka, and the Medieval Warm Period (MWP), which were roughly accordant with the records of the aeolian materials, peat, stalagmites, ice cores, and sea sediments in various latitudes of the Northern Hemisphere. Combined with the previous progresses of the Asian summer monsoon, we prelimi-narily confirmed a millennial-scale anti-correlation of Asian winter and summer monsoons in the Late Holocene epoch. This study suggests that the evolution of the palaeo-aeolian sand dune has the potential for comprehending the history of Asian monsoon across the desert regions of the modern Asian monsoonal margin in northern China.展开更多
Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can ...Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can get rid of the certificate management problem in the traditional Public Key Infrastructure(PKI)and eliminate the key-escrow problem in the identity-based PKC.Lately,a new Certificateless Signature(CLS)scheme has been proposed by Kyung-Ah Shim(IEEE SYSTEMS JOURNAL,2018,13(2)),which claimed to achieve provable security in the standard model.Unfortunately,we present a concrete attack to demonstrate that the scheme cannot defend against the Type I adversary.In this type of attack,the adversary can replace the public key of the signer,and then he plays the role of the signer to forge a legal certificateless signature on any message.Furthermore,we give an improved CLS scheme to resist such an attack.In terms of the efficiency and the signature length,the improved CLS is preferable to the original scheme and some recently proposed CLS schemes in the case of precomputation.展开更多
Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK sc...Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK scheme, we present an efficient three-round two-party authenticated key exchange protocol with strong security, which is provably secure in the standard model under the decisional Diffie-Hellman (DDH) assumption. The protocol can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary. Compared to the existing protocols, this protocol not only assures strong security but also is more efficient.展开更多
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public...Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.展开更多
A locally resonant viscoelastic mass-spring cell is experimentally realized by a unit cell design fabricated by 3D printing.The standard linear solid model is introduced for the viscoelastic metamaterial.The complex b...A locally resonant viscoelastic mass-spring cell is experimentally realized by a unit cell design fabricated by 3D printing.The standard linear solid model is introduced for the viscoelastic metamaterial.The complex band structures of both viscoelastic unit cell and elastic cases are presented to show the effect of viscoelasticity.Both the harmonic excitation and stochastic excitation are conducted on the finite viscoelastic metamaterial in experiments.Distinct wave attenuation is found in bandgap via sweep frequency response analysis under harmonic excitation.The experiments of the metamaterial under narrow-band noise excitation demonstrate good performance of wave attenuation in bandgap.Finally,the obtained bandgaps via numerical calculation are well consistent with the frequency ranges of wave attenuation from experiments,which confirm the effectiveness of the proposed viscoelastic model.展开更多
The large dual-channel wide-bodied aircraft has a long range and a high cruise Mach number.Therefore,its aerodynamic design requires a high level ofwind tunnel test refinement.Based on the requirements of aerodynamic ...The large dual-channel wide-bodied aircraft has a long range and a high cruise Mach number.Therefore,its aerodynamic design requires a high level ofwind tunnel test refinement.Based on the requirements of aerodynamic design for the future wide-bodied aircraft and the characteristics of high-speed wind tunnel tests,the error theory is introduced to analyze the factors affecting the accuracy of the test data.This study carries out a series of research on the improvement of refined aerodynamic test technology in an FL-26 wind tunnel,including design and optimization of the support system of wide-bodied aircraft,model attitude angle measurement,Mach number control accuracy,measurement and control system stability,test data correction and perfection,high-precision force balance and standard model development.In addition,the effect of the standard specification of the refined aerodynamic test is investigated to improve the data quality.The research findings have been applied in the standard model test and subsequent models of wide-bodied aircraft.The results show that whenMach numbers are less than 0.9,the control accuracy of Mach numbers in the FL-26 wind tunnel is smaller than 0.001 and the measurement error of attack angle is smaller than 0.01°.Therefore,it has the ability to correct the data influenced by factors,such as support/wall interference,model deformation,floating resistance and airflow deflection angle.The repeatability accuracy of the standard model’s comparison test shows that the lift coefficient is less than or equal to 0.0012,the drag coefficient is less than or equal to 0.00004,pitching moment coefficient is less than or equal to 0.0004.The bending resolution of the model’s deformation measurement is less than 0.2 mm,and the tensional deformation is smaller than 0.04°.The revised aerodynamic data and model deformation measurement results have good agreement with that of the ETW wind tunnel.The results demonstrate that the improved technology presented in this paper can significantly enhance the refined aerodynamic test of wide-bodied aircraft.展开更多
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos...To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment.展开更多
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or ...A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.展开更多
A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot....A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot. In this paper we propose an iden- tity-based threshold signature (IBTHS) scheme from bilinear pairings. The signing phase of our scheme is non-interactive, meaning that the signing players do not need to talk to each other. We prove our scheme secure (i.e., unforgeable and robust) in the standard model (i.e., without random oracles). No earlier proposed IBTHS scheme achieved even one of the features of being non-interactive (in the signing phase) and secure in the standard model.展开更多
基金National Key Research and Development Program of China,Grant/Award Number:2021YFF0702402National Natural Science Foundation of China,Grant/Award Number:32070531。
文摘Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symptoms are caused by numerous complex variant types of the circle.Additionally,the lack of an evaluation system for the cer-ebral ischemia/reperfusion(I/R)model of gerbils has shackled the application of this model.Methods:We created a symptom-oriented principle and detailed neurobehavioral scoring criteria.At different time points of reperfusion,we analyzed the alteration in locomotion by rotarod test and grip force score,infarct volume by triphenyltetrazo-lium chloride(TTC)staining,neuron loss using Nissl staining,and histological charac-teristics using hematoxylin-eosin(H&E)straining.Results:With a successful model rate of 56%,32 of the 57 gerbils operated by our method harbored typical features of cerebral I/R injury,and the mortality rate in the male gerbils was significantly higher than that in the female gerbils.The suc-cessfully prepared I/R gerbils demonstrated a significant reduction in motility and grip strength at 1 day after reperfusion;formed obvious infarction;exhibited typi-cal pathological features,such as tissue edema,neuronal atrophy and death,and vacuolated structures;and were partially recovered with the extension of reperfu-sion time.Conclusion:This study developed a new method for the unilateral common carotid artery ligation I/R model of gerbil and established a standardized evaluation system for this model,which could provide a new cerebral I/R model of gerbils with more practical applications.
基金Supported by the Production Safety and Supervision of Management Bureau of China(04-116) the Returned Overseas Scholar Fund of Educational De-partment of P.R.C(2003406)+1 种基金 the Soft Science Planning Program of Shandong Province (A200423-6) the National Soft Science Planed Program (2004DGQ3D090).
文摘Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispatch system. Analyzed and finded out the law among them, and designed model maker to realize the automatic pro- gramming of the new model program.
文摘With the globalization and diversification of the market and the rapid development of Information Technology(IT)and Artificial Intelligence(AI),the digital revolution of manufacturing is coming.One of the key technologies in digital manufacturing is product digital modeling.This paper firstly analyzes the information and features of the product digital model during each stage in the product whole lifecycle,then researches on the three critical technologies of digital modeling in digital man-ufacturing-product modeling,standard for the exchange of product model data and digital product data management.And the potential signification of the product digital model during the process of digital manufacturing is concluded-product digital model integrates primary features of each stage during the product whole lifecycle based on graphic features,applies STEP as data ex-change mechanism,and establishes PDM system to manage the large amount,complicated and dynamic product data to implement the product digital model data exchange,sharing and integration.
基金support by the National Key R&D Program of China(Grant No.2023YFA1008901)the National Natural Science Foundation of China(Grant Nos.11988102,12172009)is gratefully acknowledged.
文摘In this manuscript,we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites,bypassing general computational homogenization.The method is based on the reduced-order homogenization(ROH)approach.The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an‘off-line’stage,which offers substantial cost savings compared to direct computational homogenization methods.Due to the unique structure of the fibrous unit cell,“off-line”stage calculation can be eliminated by influence functions obtained analytically.Introducing the standard solid model to the ROH method enables the creation of a comprehensive analytical homogeneous viscoelastic constitutive model.This method treats fibrous composite materials as homogeneous,anisotropic viscoelastic materials,significantly reducing computational time due to its analytical nature.This approach also enables precise determination of a homogenized anisotropic relaxation modulus and accurate capture of various viscoelastic responses under different loading conditions.Three sets of numerical examples,including unit cell tests,three-point beam bending tests,and torsion tests,are given to demonstrate the predictive performance of the homogenized viscoelastic model.Furthermore,the model is validated against experimental measurements,confirming its accuracy and reliability.
文摘Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the last”SM particle.
文摘We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. Both quantum gravity and the particle model are shown to be derivable from the supersymmetric 3d Chern-Simons action. Forces-Matter unification is achieved.
基金supported by the National Key Research and Development Program of China under Grant Nos.2021YFC2203004,2021YFA0718304,2020YFC2201501RGC is supported by the National Natural Science Foundation of China under Grants Nos.11947302,11991052,11690022,11821505 and 11851302+8 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences(CAS)under Grant Nos.XDB23030100 and XDA15020701the Key Research Program of the CAS under Grant No.XDPB15the Key Research Program of Frontier Sciences of CAS.SJW is supported by the National Key Research and Development Program of China under Grant Nos.2021YFC2203004 and 2021YFA0718304the National Natural Science Foundation of China under Grant Nos.12422502 and 12105344the China Manned Space Project under Grant No.CMS-CSST-2021-B01JHY is supported by the National Science Foundation of China under Grant Nos.12022514,11875003 and 12047503the National Key Research and Development Program of China under Grant Nos.2020YFC2201501 and 2021YFA0718304the CAS Project for Young Scientists in Basic Research under Grant No.YSBR-006the Key Research Program of the CAS under Grant No.XDPB15.
文摘The future space-borne gravitational wave(GW)detectors would provide a promising probe for the new physics beyond the standard model that admits the first-order phase transitions.The predictions for the GW background vary sensitively among different concrete particle physics models but also share a large degeneracy in the model buildings,which motivates an effective model description on the phase transition based on different patterns of the electroweak symmetry breaking(EWSB).In this paper,using the scalar N-plet model as a demonstration,we propose an effective classification for three different patterns of EWSB:(1)radiative symmetry breaking with classical scale invariance,(2)the Higgs mechanism in a generic scalar extension,and(3)higher-dimensional operators.We conclude that a strong first-order phase transition could be realized for(1)and(2)with a small quartic coupling and a small isospin of an additional N-plet field for the light scalar field model with and without the classical scale invariance,and(3)with a large mixing coupling between scalar fields and a large isospin of the N-plet field for the heavy scalar field model.
基金This work was supported by the National Natural Science Foundation of China(Grant 11702315,92052301)the National Key Research and Development Program of China(Grant 2016YFA0401200).
文摘To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hypersonic transition research vehicle(HyTRV).The configuration of HyTRV is fully analytical,and details of the design process are discussed in this study.The transition characteristics for HyTRV are investigated using three combined methods,i.e.,theoretical analyses,numerical simulations,and wind tunnel experiments.Results show that the fully analytic parameterization design of HyTRV can satisfy the model simplification requirements from both numerical simulations and wind tunnel experiments.Meanwhile,the flow field of HyTRV reveals typical transition mechanisms in six relatively separated regions,including the streamwise vortex instability,crossflow instability,secondary instability,and attachment-line instability.Therefore,the proposed HyTRV model is valuable for fundamental researches in hypersonic boundary layer transition.
基金Supported by the National Natural Science Foundation of China under Grant No 10575026.
文摘We calculate the long-range Van der Waals force and the photoelectric cross section in a noncommutative setup. It is argued that non-commutativity effects could not be discerned for the Van der Waals interactions. The result for the photoelectric effect shows deviation from the usual commutative one, which in principle can be used to put bounds on the space-space non-commutativity parameter.
基金Acknowledgements This work was supported partially by the Beijing Natural Science Foundation under Crant No. 4112048 the Program for New Century Excellent Talents in University under Gant No. NCET-09-0206+4 种基金 the National Natural Science Foundation of China under Crant No. 60830001 the Key Project of State Key Laboratory of Rail Traffic Control and Safety under Crants No. RCS2008ZZ006, No. RCS2011ZZ008 the Program for Changjiang Scholars and Innovative Research Team in University under Crant No. IRT0949 the Project of State Key kab. of Rail Traffic Control and Safety under C~ants No. RCS2008ZT005, No. RCS2010ZT012 the Fundamental Research Funds for the Central Universities under Crants No. 2010JBZ(~8, No. 2011YJS010.
文摘The non-stationary behavior, caused by the train rmverrent, is the rmin factor for the variation of high speed railway channel. To measure the tirce-variant effect, the parameter of stationarity interval, in which the channel keeps constant or has no great change, is adopted based on Zhengzfiou- Xi'an (Zhengxi) passenger dedicated line measurement with different train speeds. The stationarity interval is calculated through the definition of Local Region of Stationarity (LRS) under three train ve- locities. Furthermore, the time non-stationary characteristic of high speed pared with five standard railway channel is corn- Multiple-Input MultipleOutput (MIMO) channel models, i.e. Spatial Channel Model (SCM), extended version of SCM (SCME), Wireless World Initiative New Radio Phase II (WINNERII), International Mobile Teleconmnications-Advanced (IMT-Advanced) and WiMAX models which contain the high speed moving scenario. The stationarity interval of real channel is 9 ms in 80% of the cases, which is shorter than those of the standard models. Hence the real channel of high speed railway changes more rapidly. The stationarity intervals of standard models are different due to different modeling methods and scenario def- initions. And the compared results are instructive for wireless system design in high speed railway.
基金the Natural Science Foundation of Shandong Province (Y2007G37)the Science and Technology Development Program of Shandong Province (2007GG10001012)
文摘In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.
基金funded by the Knowledge Innovation Program of the Chinese Academy of Sciences (No. KZZD-EW-04-04)the National Natural Science Foundation of China (Nos., 41271215, 41501220)+1 种基金the China Postdoctoral Science Foundation (No. 2015M570861)the State Key Laboratory of Earth Surface Processes and Resource Ecology, Beijing Normal University (No. 2015-KF-13)
文摘The variation of the Asian winter monsoonal strength has seriously affected the climate and environmental conditions in the Asian monsoonal region, and even in marginal islands and the ocean in the East Asian region. However, relevant under-standing remains unclear due to the lack of suitable geological materials and effective proxies in the key study areas. Here, we present a grain-size record derived from the palaeo-aeolian sand dune in the southeastern Mu Us Desert, together with other proxies and OSL dating, which reflect a relatively detailed history of the winter monsoon and abrupt environmental events during the past 4.2 ka. Our grain-size standard deviation model indicated that 〉224 μm content can be considered as an indicator of the intensity of Asian winter monsoon, and it shows declined around 4.2–2.1 ka, enhanced but unstable in 2.1–0.9 ka, and obviously stronger since then. In addition, several typical climate events were also documented, forced by the periodic variation of winter monsoonal intensity. These include the cold intervals of 4.2, 2.8, 1.4 ka, and the Little Ice Age (LIA), and relatively warm sub-phases around 3.0, 2.1, 1.8 ka, and the Medieval Warm Period (MWP), which were roughly accordant with the records of the aeolian materials, peat, stalagmites, ice cores, and sea sediments in various latitudes of the Northern Hemisphere. Combined with the previous progresses of the Asian summer monsoon, we prelimi-narily confirmed a millennial-scale anti-correlation of Asian winter and summer monsoons in the Late Holocene epoch. This study suggests that the evolution of the palaeo-aeolian sand dune has the potential for comprehending the history of Asian monsoon across the desert regions of the modern Asian monsoonal margin in northern China.
基金partially supported by the National Natural Science Foundation of China under grant Nos.61872060 and 61772292the National Key R&D Program of China under grant No.2017YFB0802000+3 种基金Key Laboratory of Financial Mathematics of Fujian Province University(Putian University)under grant Nos.JR201806 and JR201901by the Natural Science Foundation of Fujian Province under grant Nos.2019J01752 and 2020J01905by the Program for Innovative Research Team in Science and Technology in Fujian Province University under grant No.2018-049by the Educational Research Projects of Young and Middle-aged Teachers in Fujian Education Department(JAT200514).
文摘Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can get rid of the certificate management problem in the traditional Public Key Infrastructure(PKI)and eliminate the key-escrow problem in the identity-based PKC.Lately,a new Certificateless Signature(CLS)scheme has been proposed by Kyung-Ah Shim(IEEE SYSTEMS JOURNAL,2018,13(2)),which claimed to achieve provable security in the standard model.Unfortunately,we present a concrete attack to demonstrate that the scheme cannot defend against the Type I adversary.In this type of attack,the adversary can replace the public key of the signer,and then he plays the role of the signer to forge a legal certificateless signature on any message.Furthermore,we give an improved CLS scheme to resist such an attack.In terms of the efficiency and the signature length,the improved CLS is preferable to the original scheme and some recently proposed CLS schemes in the case of precomputation.
基金Supported by the Key Laboratory Foundation of Communication Technology of China (9140C1103040902)
文摘Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK scheme, we present an efficient three-round two-party authenticated key exchange protocol with strong security, which is provably secure in the standard model under the decisional Diffie-Hellman (DDH) assumption. The protocol can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary. Compared to the existing protocols, this protocol not only assures strong security but also is more efficient.
基金Supported by the National Natural Science Foundation of China (6057303)the Program for New Century Excellent Talents in University by Ministry of Education (NCET-05-0398)
文摘Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.
基金This work is supported in part by the National Natural Science Foundation of China under Grant Nos.11632003 and 51921003in part by the National Science Fund for Distinguished Young Scholars under Grant No.11925205.
文摘A locally resonant viscoelastic mass-spring cell is experimentally realized by a unit cell design fabricated by 3D printing.The standard linear solid model is introduced for the viscoelastic metamaterial.The complex band structures of both viscoelastic unit cell and elastic cases are presented to show the effect of viscoelasticity.Both the harmonic excitation and stochastic excitation are conducted on the finite viscoelastic metamaterial in experiments.Distinct wave attenuation is found in bandgap via sweep frequency response analysis under harmonic excitation.The experiments of the metamaterial under narrow-band noise excitation demonstrate good performance of wave attenuation in bandgap.Finally,the obtained bandgaps via numerical calculation are well consistent with the frequency ranges of wave attenuation from experiments,which confirm the effectiveness of the proposed viscoelastic model.
文摘The large dual-channel wide-bodied aircraft has a long range and a high cruise Mach number.Therefore,its aerodynamic design requires a high level ofwind tunnel test refinement.Based on the requirements of aerodynamic design for the future wide-bodied aircraft and the characteristics of high-speed wind tunnel tests,the error theory is introduced to analyze the factors affecting the accuracy of the test data.This study carries out a series of research on the improvement of refined aerodynamic test technology in an FL-26 wind tunnel,including design and optimization of the support system of wide-bodied aircraft,model attitude angle measurement,Mach number control accuracy,measurement and control system stability,test data correction and perfection,high-precision force balance and standard model development.In addition,the effect of the standard specification of the refined aerodynamic test is investigated to improve the data quality.The research findings have been applied in the standard model test and subsequent models of wide-bodied aircraft.The results show that whenMach numbers are less than 0.9,the control accuracy of Mach numbers in the FL-26 wind tunnel is smaller than 0.001 and the measurement error of attack angle is smaller than 0.01°.Therefore,it has the ability to correct the data influenced by factors,such as support/wall interference,model deformation,floating resistance and airflow deflection angle.The repeatability accuracy of the standard model’s comparison test shows that the lift coefficient is less than or equal to 0.0012,the drag coefficient is less than or equal to 0.00004,pitching moment coefficient is less than or equal to 0.0004.The bending resolution of the model’s deformation measurement is less than 0.2 mm,and the tensional deformation is smaller than 0.04°.The revised aerodynamic data and model deformation measurement results have good agreement with that of the ETW wind tunnel.The results demonstrate that the improved technology presented in this paper can significantly enhance the refined aerodynamic test of wide-bodied aircraft.
基金the National Natural Science Foundation of China (No.60970119)the National Basic Research Program (973) of China (No.2007CB311201)
文摘To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment.
基金the Natural Science Foundation of Shaanxi Province (No.2010JQ8017)the China Postdoctoral Science Foundation (No.2011M501427)the Special Found for Basic Scientific Research of Central Colleges of Chang’an University(No.CHD2012JC047)
文摘A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.
基金Project (No. 2005AA145110) supported by the Hi-Tech Research and Development Program (863) of China
文摘A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot. In this paper we propose an iden- tity-based threshold signature (IBTHS) scheme from bilinear pairings. The signing phase of our scheme is non-interactive, meaning that the signing players do not need to talk to each other. We prove our scheme secure (i.e., unforgeable and robust) in the standard model (i.e., without random oracles). No earlier proposed IBTHS scheme achieved even one of the features of being non-interactive (in the signing phase) and secure in the standard model.