In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth ...It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth optimization design method for an S-duct inlet is proposed.The upwind scheme is introduced to the aerodynamic adjoint equation to resolve the shock wave and flow separation.The multilevel fast multipole algorithm(MLFMA)is utilized for the stealth adjoint equation.A dorsal S-duct inlet of flying wing layout is optimized to improve the aerodynamic and stealth characteristics.Both the aerodynamic and stealth characteristics of the inlet are effectively improved.Finally,the optimization results are analyzed,and it shows that the main contradiction between aerodynamic characteristics and stealth characteristics is the centerline and crosssectional area.The S-duct is smoothed,and the cross-sectional area is increased to improve the aerodynamic characteristics,while it is completely opposite for the stealth design.The radar cross section(RCS)is reduced by phase cancelation for low frequency conditions.The method is suitable for the aerodynamic/stealth design of the aircraft airframe-inlet system.展开更多
By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different fr...By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different from the original equation under the background of hydrostatic equilibrium and adiabatic hypothesis.In the present research,three discrete equations for temperature in the NMRF boundary layer scheme are applied,namely the original(hereafter NMRF),the adjustment(hereafter NMRF-gocp),and the one in the YSU boundary-layer scheme(hereafter NMRF-TZ).The results show that the deviations of height,temperature,U and V wind in the boundary layer in the NMRF-gocp and NMRF-TZ experiments are smaller than those in the NMRF experiment and the deviations in the NMRF-gocp experiment are the smallest.The deviations of humidity are complex for the different forecasting lead time in the three experiments.Moreover,there are obvious diurnal variations of deviations from these variables,where the diurnal variations of deviations from height and temperature are similar and those from U and V wind are also similar.However,the diurnal variation of humidity is relatively complicated.The root means square errors of 2m temperature(T2m)and 10m speed(V10m)from the three experiments show that the error of NMRF-gocp is the smallest and that of NMRF is the biggest.There is also a diurnal variation of T2m and V10m,where T2m has double peaks and V10m has only one peak.Comparison of the discrete equations between NMRF and NMRF-gocp experiments shows that the deviation of temperature is likely to be caused by the calculation of vertical eddy diffusive coefficients of heating,which also leads to the deviations of other elements.展开更多
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec...Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography.展开更多
For the purpose of solving the engineering constrained discrete optimization problem, a novel discrete particle swarm optimization(DPSO) is proposed. The proposed novel DPSO is based on the idea of normal particle s...For the purpose of solving the engineering constrained discrete optimization problem, a novel discrete particle swarm optimization(DPSO) is proposed. The proposed novel DPSO is based on the idea of normal particle swarm optimization(PSO), but deals with the variables as discrete type, the discrete optimum solution is found through updating the location of discrete variable. To avoid long calculation time and improve the efficiency of algorithm, scheme of constraint level and huge value penalty are proposed to deal with the constraints, the stratagem of reproducing the new particles and best keeping model of particle are employed to increase the diversity of particles. The validity of the proposed DPSO is examined by benchmark numerical examples, the results show that the novel DPSO has great advantages over current algorithm. The optimum designs of the 100-1 500 mm bellows under 0.25 MPa are fulfilled by DPSO. Comparing the optimization results with the bellows in-service, optimization results by discrete penalty particle swarm optimization(DPPSO) and theory solution, the comparison result shows that the global discrete optima of bellows are obtained by proposed DPSO, and confirms that the proposed novel DPSO and schemes can be used to solve the engineering constrained discrete problem successfully.展开更多
Nonlinear Schrodinger equation (NSE) arises in many physical problems. It is a very important equation. A lot of works studied the wellposed, the existence of solution of NSE etc. And there are many works studied the ...Nonlinear Schrodinger equation (NSE) arises in many physical problems. It is a very important equation. A lot of works studied the wellposed, the existence of solution of NSE etc. And there are many works studied the numerical methods for it. Recently, since the development of infinite dimensional dynamic system the dynamical behavior of NSE has been investigated. The paper [1] studied the long time wellposedness, the existence of universal attractor and the estimate of Lyapunov exponent for NSE with weakly damped. At the same time it was need to study the large time new computational methods and to discuss its convergence error estimate, the existence of approximate attractors etc. In this pape we study the NSE with weakly damped (1.1). We assume,where 0【λ【2 is a constant. If we wish to construct the higher accuracy computational scheme, it will be difficult that staigh from the equation (1.1). Therefore we start with (1. 4) and use fully discrete Fourier spectral method with time difference to展开更多
This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized ...This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.展开更多
Efficient reconfigurable VLSI architecture for 1-D 5/3 and 9/7 wavelet transforms adopted in JPEG2000 proposal, based on lifting scheme is proposed. The embedded decimation technique based on fold and time multiplexin...Efficient reconfigurable VLSI architecture for 1-D 5/3 and 9/7 wavelet transforms adopted in JPEG2000 proposal, based on lifting scheme is proposed. The embedded decimation technique based on fold and time multiplexing, as well as embedded boundary data extension technique, is adopted to optimize the design of the architecture. These reduce significantly the required numbers of the multipliers, adders and registers, as well as the amount of accessing external memory, and lead to decrease efficiently the hardware cost and power consumption of the design. The architecture is designed to generate an output per clock cycle, and the detailed component and the approximation of the input signal are available alternately. Experimental simulation and comparison results are presented, which demonstrate that the proposed architecture has lower hardware complexity, thus it is adapted for embedded applications. The presented architecture is simple, regular and scalable, and well suited for VLSI implementation.展开更多
A 2D discrete mathematical model of a nine-point finite difference scheme is built to simulate tumor-induced angiogenesis. Nine motion directions of an individual endothelial cell and two parent vessels are extended i...A 2D discrete mathematical model of a nine-point finite difference scheme is built to simulate tumor-induced angiogenesis. Nine motion directions of an individual endothelial cell and two parent vessels are extended in the present model. The process of tumor-induced angiogenesis is performed by coupling random motility, chemotaxis, and haptotaxis of endothelial cell in different mechanical environments inside and outside the tumor. The results show that nearly realistic tumor microvascular networks with neoplastic pathophysiological characteristics can be generated from the present model. Moreover, the theoretical capillary networks generated in numerical simulations of the discrete model may provide useful information for further clinical research.展开更多
The authors announce a newly-proved theorem of theirs. This theorem is of principal significance to numerical computation of operator equations of the first kind.
In this paper, we construct a backward difference scheme for a class of SIR epidemic model with general incidence f . The step sizeτ used in our discretization is one. The dynamical properties are investigated (posit...In this paper, we construct a backward difference scheme for a class of SIR epidemic model with general incidence f . The step sizeτ used in our discretization is one. The dynamical properties are investigated (positivity and the boundedness of solution). By constructing the Lyapunov function, the general incidence function f must satisfy certain assumptions, under which, we establish the global stability of endemic equilibrium when R0 >1. The global stability of diseases-free equilibrium is also established when R0 ≤1. In addition we present numerical results of the continuous and discrete model of the different class according to the value of basic reproduction number R0.展开更多
Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have b...Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have been used to solve the advection diffusion equation. We use an explicit finite difference scheme for the advection diffusion equation and semi-discretization on the spatial variable for advection-diffusion equation yields a system of ordinary differential equations solved by Euler’s method. Numerical assessment has been executed with specified initial and boundary conditions, for which the exact solution is known. We compare the solutions of the advection diffusion equation as well as error analysis for both schemes.展开更多
This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-K...This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-Krasoviskii functional method is adopted to design a filter such that the filtering error system is stochastic finite-time stable (SFTS) and preserves a prescribed performance level according to the pre-defined event-triggered criteria. Based on stochastic differential equations theory, some sufficient conditions for the existence of H<sub>∞</sub> filter are obtained for the suggested system by employing linear matrix inequality technique. Finally, the desired H<sub>∞</sub> filter gain matrices can be expressed in an explicit form.展开更多
In this paper,a new efficient,and at the same time,very simple and general class of thermodynamically compatiblefinite volume schemes is introduced for the discretization of nonlinear,overdetermined,and thermodynamicall...In this paper,a new efficient,and at the same time,very simple and general class of thermodynamically compatiblefinite volume schemes is introduced for the discretization of nonlinear,overdetermined,and thermodynamically compatiblefirst-order hyperbolic systems.By construction,the proposed semi-discrete method satisfies an entropy inequality and is nonlinearly stable in the energy norm.A very peculiar feature of our approach is that entropy is discretized directly,while total energy conservation is achieved as a mere consequence of the thermodynamically compatible discretization.The new schemes can be applied to a very general class of nonlinear systems of hyperbolic PDEs,including both,conservative and non-conservative products,as well as potentially stiff algebraic relaxation source terms,provided that the underlying system is overdetermined and therefore satisfies an additional extra conservation law,such as the conservation of total energy density.The proposed family offinite volume schemes is based on the seminal work of Abgrall[1],where for thefirst time a completely general methodology for the design of thermodynamically compatible numerical methods for overdetermined hyperbolic PDE was presented.We apply our new approach to three particular thermodynamically compatible systems:the equations of ideal magnetohydrodynamics(MHD)with thermodynamically compatible generalized Lagrangian multiplier(GLM)divergence cleaning,the unifiedfirst-order hyperbolic model of continuum mechanics proposed by Godunov,Peshkov,and Romenski(GPR model)and thefirst-order hyperbolic model for turbulent shallow waterflows of Gavrilyuk et al.In addition to formal mathematical proofs of the properties of our newfinite volume schemes,we also present a large set of numerical results in order to show their potential,efficiency,and practical applicability.展开更多
Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new sig...Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature.展开更多
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ...Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.展开更多
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec...Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.展开更多
Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of...Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user. An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme. This decryption scheme allowsmultiple secret keys to he shared among a groupof users, and each user to ketp only one secretshadow. Different public keys can be used to encrypt documents. If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key, they can cooperate to decrypt the documents. It is proved that theproposed scheme has very strong security, unless the attackers can solve the discrete logarithmproblem and the square root problem.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
文摘It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth optimization design method for an S-duct inlet is proposed.The upwind scheme is introduced to the aerodynamic adjoint equation to resolve the shock wave and flow separation.The multilevel fast multipole algorithm(MLFMA)is utilized for the stealth adjoint equation.A dorsal S-duct inlet of flying wing layout is optimized to improve the aerodynamic and stealth characteristics.Both the aerodynamic and stealth characteristics of the inlet are effectively improved.Finally,the optimization results are analyzed,and it shows that the main contradiction between aerodynamic characteristics and stealth characteristics is the centerline and crosssectional area.The S-duct is smoothed,and the cross-sectional area is increased to improve the aerodynamic characteristics,while it is completely opposite for the stealth design.The radar cross section(RCS)is reduced by phase cancelation for low frequency conditions.The method is suitable for the aerodynamic/stealth design of the aircraft airframe-inlet system.
基金National Key R&D Program of China(2018YFC1506902)National Natural Science Foundation of China(42175105,U2142213)Special Fund of China Meteorological Administration for Innovation and Development(CXFZ2021Z006)。
文摘By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different from the original equation under the background of hydrostatic equilibrium and adiabatic hypothesis.In the present research,three discrete equations for temperature in the NMRF boundary layer scheme are applied,namely the original(hereafter NMRF),the adjustment(hereafter NMRF-gocp),and the one in the YSU boundary-layer scheme(hereafter NMRF-TZ).The results show that the deviations of height,temperature,U and V wind in the boundary layer in the NMRF-gocp and NMRF-TZ experiments are smaller than those in the NMRF experiment and the deviations in the NMRF-gocp experiment are the smallest.The deviations of humidity are complex for the different forecasting lead time in the three experiments.Moreover,there are obvious diurnal variations of deviations from these variables,where the diurnal variations of deviations from height and temperature are similar and those from U and V wind are also similar.However,the diurnal variation of humidity is relatively complicated.The root means square errors of 2m temperature(T2m)and 10m speed(V10m)from the three experiments show that the error of NMRF-gocp is the smallest and that of NMRF is the biggest.There is also a diurnal variation of T2m and V10m,where T2m has double peaks and V10m has only one peak.Comparison of the discrete equations between NMRF and NMRF-gocp experiments shows that the deviation of temperature is likely to be caused by the calculation of vertical eddy diffusive coefficients of heating,which also leads to the deviations of other elements.
文摘Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography.
基金supported by National Hi-tech Research and Development Program of China (Grant No. 2006aa042439)
文摘For the purpose of solving the engineering constrained discrete optimization problem, a novel discrete particle swarm optimization(DPSO) is proposed. The proposed novel DPSO is based on the idea of normal particle swarm optimization(PSO), but deals with the variables as discrete type, the discrete optimum solution is found through updating the location of discrete variable. To avoid long calculation time and improve the efficiency of algorithm, scheme of constraint level and huge value penalty are proposed to deal with the constraints, the stratagem of reproducing the new particles and best keeping model of particle are employed to increase the diversity of particles. The validity of the proposed DPSO is examined by benchmark numerical examples, the results show that the novel DPSO has great advantages over current algorithm. The optimum designs of the 100-1 500 mm bellows under 0.25 MPa are fulfilled by DPSO. Comparing the optimization results with the bellows in-service, optimization results by discrete penalty particle swarm optimization(DPPSO) and theory solution, the comparison result shows that the global discrete optima of bellows are obtained by proposed DPSO, and confirms that the proposed novel DPSO and schemes can be used to solve the engineering constrained discrete problem successfully.
文摘Nonlinear Schrodinger equation (NSE) arises in many physical problems. It is a very important equation. A lot of works studied the wellposed, the existence of solution of NSE etc. And there are many works studied the numerical methods for it. Recently, since the development of infinite dimensional dynamic system the dynamical behavior of NSE has been investigated. The paper [1] studied the long time wellposedness, the existence of universal attractor and the estimate of Lyapunov exponent for NSE with weakly damped. At the same time it was need to study the large time new computational methods and to discuss its convergence error estimate, the existence of approximate attractors etc. In this pape we study the NSE with weakly damped (1.1). We assume,where 0【λ【2 is a constant. If we wish to construct the higher accuracy computational scheme, it will be difficult that staigh from the equation (1.1). Therefore we start with (1. 4) and use fully discrete Fourier spectral method with time difference to
文摘This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.
文摘Efficient reconfigurable VLSI architecture for 1-D 5/3 and 9/7 wavelet transforms adopted in JPEG2000 proposal, based on lifting scheme is proposed. The embedded decimation technique based on fold and time multiplexing, as well as embedded boundary data extension technique, is adopted to optimize the design of the architecture. These reduce significantly the required numbers of the multipliers, adders and registers, as well as the amount of accessing external memory, and lead to decrease efficiently the hardware cost and power consumption of the design. The architecture is designed to generate an output per clock cycle, and the detailed component and the approximation of the input signal are available alternately. Experimental simulation and comparison results are presented, which demonstrate that the proposed architecture has lower hardware complexity, thus it is adapted for embedded applications. The presented architecture is simple, regular and scalable, and well suited for VLSI implementation.
基金supported by the National Natural Science Foundation of China (No. 10772051)the ScienceFoundation for the Excellent Youth Scholars of Higher Education of Shanghai (No. 571215)the Research Fund for the Doctoral Program of University of Shanghai for Science and Technology(No. 10D214)
文摘A 2D discrete mathematical model of a nine-point finite difference scheme is built to simulate tumor-induced angiogenesis. Nine motion directions of an individual endothelial cell and two parent vessels are extended in the present model. The process of tumor-induced angiogenesis is performed by coupling random motility, chemotaxis, and haptotaxis of endothelial cell in different mechanical environments inside and outside the tumor. The results show that nearly realistic tumor microvascular networks with neoplastic pathophysiological characteristics can be generated from the present model. Moreover, the theoretical capillary networks generated in numerical simulations of the discrete model may provide useful information for further clinical research.
文摘The authors announce a newly-proved theorem of theirs. This theorem is of principal significance to numerical computation of operator equations of the first kind.
文摘In this paper, we construct a backward difference scheme for a class of SIR epidemic model with general incidence f . The step sizeτ used in our discretization is one. The dynamical properties are investigated (positivity and the boundedness of solution). By constructing the Lyapunov function, the general incidence function f must satisfy certain assumptions, under which, we establish the global stability of endemic equilibrium when R0 >1. The global stability of diseases-free equilibrium is also established when R0 ≤1. In addition we present numerical results of the continuous and discrete model of the different class according to the value of basic reproduction number R0.
文摘Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have been used to solve the advection diffusion equation. We use an explicit finite difference scheme for the advection diffusion equation and semi-discretization on the spatial variable for advection-diffusion equation yields a system of ordinary differential equations solved by Euler’s method. Numerical assessment has been executed with specified initial and boundary conditions, for which the exact solution is known. We compare the solutions of the advection diffusion equation as well as error analysis for both schemes.
文摘This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-Krasoviskii functional method is adopted to design a filter such that the filtering error system is stochastic finite-time stable (SFTS) and preserves a prescribed performance level according to the pre-defined event-triggered criteria. Based on stochastic differential equations theory, some sufficient conditions for the existence of H<sub>∞</sub> filter are obtained for the suggested system by employing linear matrix inequality technique. Finally, the desired H<sub>∞</sub> filter gain matrices can be expressed in an explicit form.
文摘In this paper,a new efficient,and at the same time,very simple and general class of thermodynamically compatiblefinite volume schemes is introduced for the discretization of nonlinear,overdetermined,and thermodynamically compatiblefirst-order hyperbolic systems.By construction,the proposed semi-discrete method satisfies an entropy inequality and is nonlinearly stable in the energy norm.A very peculiar feature of our approach is that entropy is discretized directly,while total energy conservation is achieved as a mere consequence of the thermodynamically compatible discretization.The new schemes can be applied to a very general class of nonlinear systems of hyperbolic PDEs,including both,conservative and non-conservative products,as well as potentially stiff algebraic relaxation source terms,provided that the underlying system is overdetermined and therefore satisfies an additional extra conservation law,such as the conservation of total energy density.The proposed family offinite volume schemes is based on the seminal work of Abgrall[1],where for thefirst time a completely general methodology for the design of thermodynamically compatible numerical methods for overdetermined hyperbolic PDE was presented.We apply our new approach to three particular thermodynamically compatible systems:the equations of ideal magnetohydrodynamics(MHD)with thermodynamically compatible generalized Lagrangian multiplier(GLM)divergence cleaning,the unifiedfirst-order hyperbolic model of continuum mechanics proposed by Godunov,Peshkov,and Romenski(GPR model)and thefirst-order hyperbolic model for turbulent shallow waterflows of Gavrilyuk et al.In addition to formal mathematical proofs of the properties of our newfinite volume schemes,we also present a large set of numerical results in order to show their potential,efficiency,and practical applicability.
文摘Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature.
基金Supported by the 973 State Key Project of China (No.G1999035803)the National Natural Science Foundation of China (No.69931010).
文摘Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.
基金Supported by the 973 Project of China(G19990358?04)
文摘Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.
文摘Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user. An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme. This decryption scheme allowsmultiple secret keys to he shared among a groupof users, and each user to ketp only one secretshadow. Different public keys can be used to encrypt documents. If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key, they can cooperate to decrypt the documents. It is proved that theproposed scheme has very strong security, unless the attackers can solve the discrete logarithmproblem and the square root problem.