This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o...This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.展开更多
Flammable gas leakage in a semi-enclosed scenario can lead to catastrophic consequences,such as vapor cloud explosions.To reduce casualties and environmental damage,predicting the consequences based on the initial con...Flammable gas leakage in a semi-enclosed scenario can lead to catastrophic consequences,such as vapor cloud explosions.To reduce casualties and environmental damage,predicting the consequences based on the initial concentration time series monitored by sensors is of paramount importance.This paper proposes a consequence prediction model based on deep learning using variable-length concentration time series.Incomplete concentration values are padded and then passed through a masking layer,enabling the network to focus exclusively on valid data.The temporal correlations are extracted using a long short-term memory(LSTM)network,and the final prediction results are obtained by passing these features into a feedforward neural network(FNN).Computational fluid dynamics(CFD)software was used to simulate the leakage of hydrogen-mixed natural gas.Experiments were carried out for nine distinct prediction targets,derived from combinations of the mass and centroid coordinates of vapor clouds formed by various gases.These prediction targets were modeled using both fixed-length and variable-length input sequences.The high accuracy of the experimental results validates the effectiveness of the proposed method.展开更多
The integrated systems of unmanned surface vehicles(USVs) and remotely operated vehicles(ROVs) have been extensively applied in marine exploration and seabed coverage. However, the simultaneous navigation of USV-ROV s...The integrated systems of unmanned surface vehicles(USVs) and remotely operated vehicles(ROVs) have been extensively applied in marine exploration and seabed coverage. However, the simultaneous navigation of USV-ROV systems is frequently limited by strong disturbances induced by waves or currents. This paper develops a novel rigidflexible coupling multibody dynamic model that incorporates disturbances of variable-length marine cables with geometrically nonlinear motion. A hybrid Lagrangian-Eulerian absolute nodal coordinate formulation(ANCF) element is developed to accurately model subsea cables which undergo significant overall motion, substantial deformation,and mass flow during the deployment of underwater equipment. Furthermore, the governing equations of the coupled USV-umbilical-ROV system are derived, considering wave-induced forces and current disturbances. A numerical solver based on the Newmark-beta method is proposed, along with an adaptive meshing technique near the release point. After validating three experimental cases, the cable disturbances at both the USV and ROV ends—caused by ocean currents, heave motion, and simultaneous navigation—are comprehensively compared and evaluated. Finally,it is demonstrated that a PD controller with disturbance compensation can enhance the simultaneous navigation performance of USV-ROV systems.展开更多
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an...The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.展开更多
As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM c...As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.展开更多
The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out t...The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.展开更多
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A...Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.展开更多
Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspe...Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.展开更多
As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study a...As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.展开更多
In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to ex...In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.展开更多
The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supporte...The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.展开更多
Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the...Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the choice of them. This paper is firstly to make a contrastive analysis of honorific and depreciatory address forms in Chinese, English and Japanese, then explore the different basic values in Chinese, American and Japanese culture and discuss their influences on honorific and depreciatory address forms in the hope of a better understanding of their pragmatic and cultural differences and an avoidance of miscommunication in intercultural interactions.展开更多
As one of the most frequently used language forms in people's daily communication,the address form carries many different social semantic meanings. This paper aims to compare western and eastern cultures through a...As one of the most frequently used language forms in people's daily communication,the address form carries many different social semantic meanings. This paper aims to compare western and eastern cultures through a tentative study of address forms in American English and Chinese. By finding their similarities and differences it will explore the deep structures of each culture.展开更多
John Kennedy's first inaugural address is one of the widely appreciated speeches worldwide. It is famous not only for calling up the American people to well serve the country, but also for its extraordinary lingui...John Kennedy's first inaugural address is one of the widely appreciated speeches worldwide. It is famous not only for calling up the American people to well serve the country, but also for its extraordinary linguistic power to arouse the listeners' emotions, which lies to a great extent in the marvelous employment of the cohesive and coherent devices in the process of its delivery. Cohesion and coherence are two elementary and significant concepts in the theoretical system of discourse analysis. There-fore, they play an important role in the structuring, arrangement, interpretation and analysis of a discourse. In this sense, it is significant to analyze the cohesive and coherent features of John Kennedy's first inaugural address in order to obtain a penetrating comprehension of the speech in many aspects. A detailed analysis on the cohesive and coherent features of the speech has been conducted in this paper. In the aspect of cohesion in the address, the devices employed fall into two categories: structural cohesion and non-structural cohesion. Structural cohesive devices used in the discourse are mainly grammatical cohesion and lexical cohesion like repetition, ellipsis, conjunction, etc. Non-structural methods adopted in the speech are transitivity, mood and modality, thematic progression, parallel structure and so on. In the aspect of coherence, five levels of coherent methods have been employed, namely, lexical level, syntax level, semantic level, phonological level and social semiotic level. The neat intermingling of the cohesive and coherent methods function cooperatively and lead to the smooth going of the text.展开更多
WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Ad...WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。展开更多
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T...As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain.展开更多
文摘This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.
基金supported by the National Key Research and Development Program of China(2022YFB3305900)National Natural Science Foundation of China(62373153,62173147)+1 种基金the Programme of Introducing Talents of Discipline to Universities(the 111 Project)under Grant B17017Fundamental Research Funds for the Central Universities(222202517006)。
文摘Flammable gas leakage in a semi-enclosed scenario can lead to catastrophic consequences,such as vapor cloud explosions.To reduce casualties and environmental damage,predicting the consequences based on the initial concentration time series monitored by sensors is of paramount importance.This paper proposes a consequence prediction model based on deep learning using variable-length concentration time series.Incomplete concentration values are padded and then passed through a masking layer,enabling the network to focus exclusively on valid data.The temporal correlations are extracted using a long short-term memory(LSTM)network,and the final prediction results are obtained by passing these features into a feedforward neural network(FNN).Computational fluid dynamics(CFD)software was used to simulate the leakage of hydrogen-mixed natural gas.Experiments were carried out for nine distinct prediction targets,derived from combinations of the mass and centroid coordinates of vapor clouds formed by various gases.These prediction targets were modeled using both fixed-length and variable-length input sequences.The high accuracy of the experimental results validates the effectiveness of the proposed method.
基金financially supported in part by the General Program of the National Natural Science Foundation of China (Grant No.12272221)the State Key Laboratory of Ocean Engineering (Shanghai Jiao Tong University)(Grant No. GKZD010087)。
文摘The integrated systems of unmanned surface vehicles(USVs) and remotely operated vehicles(ROVs) have been extensively applied in marine exploration and seabed coverage. However, the simultaneous navigation of USV-ROV systems is frequently limited by strong disturbances induced by waves or currents. This paper develops a novel rigidflexible coupling multibody dynamic model that incorporates disturbances of variable-length marine cables with geometrically nonlinear motion. A hybrid Lagrangian-Eulerian absolute nodal coordinate formulation(ANCF) element is developed to accurately model subsea cables which undergo significant overall motion, substantial deformation,and mass flow during the deployment of underwater equipment. Furthermore, the governing equations of the coupled USV-umbilical-ROV system are derived, considering wave-induced forces and current disturbances. A numerical solver based on the Newmark-beta method is proposed, along with an adaptive meshing technique near the release point. After validating three experimental cases, the cable disturbances at both the USV and ROV ends—caused by ocean currents, heave motion, and simultaneous navigation—are comprehensively compared and evaluated. Finally,it is demonstrated that a PD controller with disturbance compensation can enhance the simultaneous navigation performance of USV-ROV systems.
基金supported by the National Key Research and Development Program of China(Project No.2022YFB3104300).
文摘The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.
基金supported by the National Key Research&Development Projects of China(Grant No.2022YFA1204100)National Natural Science Foundation of China(Grant No.62488201)+1 种基金CAS Project for Young Scientists in Basic Research(YSBR-003)the Innovation Program of Quantum Science and Technology(2021ZD0302700)。
文摘As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.
文摘The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.
文摘Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.
文摘Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.
文摘As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.
文摘In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.
文摘The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.
文摘Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the choice of them. This paper is firstly to make a contrastive analysis of honorific and depreciatory address forms in Chinese, English and Japanese, then explore the different basic values in Chinese, American and Japanese culture and discuss their influences on honorific and depreciatory address forms in the hope of a better understanding of their pragmatic and cultural differences and an avoidance of miscommunication in intercultural interactions.
文摘As one of the most frequently used language forms in people's daily communication,the address form carries many different social semantic meanings. This paper aims to compare western and eastern cultures through a tentative study of address forms in American English and Chinese. By finding their similarities and differences it will explore the deep structures of each culture.
文摘John Kennedy's first inaugural address is one of the widely appreciated speeches worldwide. It is famous not only for calling up the American people to well serve the country, but also for its extraordinary linguistic power to arouse the listeners' emotions, which lies to a great extent in the marvelous employment of the cohesive and coherent devices in the process of its delivery. Cohesion and coherence are two elementary and significant concepts in the theoretical system of discourse analysis. There-fore, they play an important role in the structuring, arrangement, interpretation and analysis of a discourse. In this sense, it is significant to analyze the cohesive and coherent features of John Kennedy's first inaugural address in order to obtain a penetrating comprehension of the speech in many aspects. A detailed analysis on the cohesive and coherent features of the speech has been conducted in this paper. In the aspect of cohesion in the address, the devices employed fall into two categories: structural cohesion and non-structural cohesion. Structural cohesive devices used in the discourse are mainly grammatical cohesion and lexical cohesion like repetition, ellipsis, conjunction, etc. Non-structural methods adopted in the speech are transitivity, mood and modality, thematic progression, parallel structure and so on. In the aspect of coherence, five levels of coherent methods have been employed, namely, lexical level, syntax level, semantic level, phonological level and social semiotic level. The neat intermingling of the cohesive and coherent methods function cooperatively and lead to the smooth going of the text.
文摘WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。
基金This work is sponsored by the Natural Science Foundation of Heilongjiang Province of China under Grant No.LC2016024Natural Science Foundation of the Jiangsu Higher Education Institutions Grant No.17KJB520044Six Talent Peaks Project in Jiangsu Province No.XYDXX-108.
文摘As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain.