期刊文献+
共找到118,972篇文章
< 1 2 250 >
每页显示 20 50 100
Quaternion Approach to Solve Coupled Nonlinear Schrdinger Equation and Crosstalk of Quarter-Phase-Shift-Key Signals in Polarization Multiplexing Systems
1
作者 刘岚岚 吴重庆 +2 位作者 尚超 王健 高凯强 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期78-82,共5页
The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled qua... The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled quater- nion. The crosstalk of quarter-phase-shift-key signals caused by fiber nonlinearity in polarization multiplexing systems with 100 Cbps bit-rate is investigated and simulated. The results demonstrate that the crosstalk is like a rotated ghosting of input constellation. For the 50 km conventional fiber link, when the total power is less than 4roW, the crosstalk effect can be neglected; when the power is larger than 20roW, the crosstalk is very obvious. In addition, the crosstalk can not be detected according to the output eye diagram and state of polarization in Poincare sphere in the trunk fiber, making it difficult for the monitoring of optical trunk link. 展开更多
关键词 In dinger equation and Crosstalk of Quarter-Phase-Shift-key Signals in Polarization Multiplexing Systems Quaternion Approach to Solve Coupled Nonlinear Schr
原文传递
An Extended Numerical Method by Stancu Polynomials for Solution of Integro-Differential Equations Arising in Oscillating Magnetic Fields
2
作者 Neşe İşler Acar 《Advances in Pure Mathematics》 2024年第10期785-796,共12页
In this study, the Bernstein collocation method has been expanded to Stancu collocation method for numerical solution of the charged particle motion for certain configurations of oscillating magnetic fields modelled b... In this study, the Bernstein collocation method has been expanded to Stancu collocation method for numerical solution of the charged particle motion for certain configurations of oscillating magnetic fields modelled by a class of linear integro-differential equations. As the method has been improved, the Stancu polynomials that are generalization of the Bernstein polynomials have been used. The method has been tested on a physical problem how the method can be applied. Moreover, numerical results of the method have been compared with the numerical results of the other methods to indicate the efficiency of the method. 展开更多
关键词 Stancu Polynomials Collocation Method Integro-Differential equations Linear equation Systems Matrix equations
下载PDF
The Jaffa Transform for Hessian Matrix Systems and the Laplace Equation
3
作者 Daniel A. Jaffa 《Journal of Applied Mathematics and Physics》 2024年第1期98-125,共28页
Hessian matrices are square matrices consisting of all possible combinations of second partial derivatives of a scalar-valued initial function. As such, Hessian matrices may be treated as elementary matrix systems of ... Hessian matrices are square matrices consisting of all possible combinations of second partial derivatives of a scalar-valued initial function. As such, Hessian matrices may be treated as elementary matrix systems of linear second-order partial differential equations. This paper discusses the Hessian and its applications in optimization, and then proceeds to introduce and derive the notion of the Jaffa Transform, a new linear operator that directly maps a Hessian square matrix space to the initial corresponding scalar field in nth dimensional Euclidean space. The Jaffa Transform is examined, including the properties of the operator, the transform of notable matrices, and the existence of an inverse Jaffa Transform, which is, by definition, the Hessian matrix operator. The Laplace equation is then noted and investigated, particularly, the relation of the Laplace equation to Poisson’s equation, and the theoretical applications and correlations of harmonic functions to Hessian matrices. The paper concludes by introducing and explicating the Jaffa Theorem, a principle that declares the existence of harmonic Jaffa Transforms, which are, essentially, Jaffa Transform solutions to the Laplace partial differential equation. 展开更多
关键词 Hessian Matrices Jacobian Matrices Laplace equation Linear Partial Differential equations Systems of Partial Differential equations Harmonic Functions Incompressible and Irrotational Fluid Mechanics
下载PDF
A new quantum key distribution resource allocation and routing optimization scheme
4
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
原文传递
A Formulation of the Porous Medium Equation with Time-Dependent Porosity: A Priori Estimates and Regularity Results
5
作者 Koffi B. Fadimba 《Applied Mathematics》 2024年第10期745-763,共19页
We consider a generalized form of the porous medium equation where the porosity ϕis a function of time t: ϕ=ϕ(x,t): ∂(ϕS)∂t−∇⋅(k(S)∇S)=Q(S).In many works, the porosity ϕis either assumed to be independent of (or to de... We consider a generalized form of the porous medium equation where the porosity ϕis a function of time t: ϕ=ϕ(x,t): ∂(ϕS)∂t−∇⋅(k(S)∇S)=Q(S).In many works, the porosity ϕis either assumed to be independent of (or to depend very little of) the time variable t. In this work, we want to study the case where it does depend on t(and xas well). For this purpose, we make a change of unknown function V=ϕSin order to obtain a saturation-like (advection-diffusion) equation. A priori estimates and regularity results are established for the new equation based in part on what is known from the saturation equation, when ϕis independent of the time t. These results are then extended to the full saturation equation with time-dependent porosity ϕ=ϕ(x,t). In this analysis, we make explicitly the dependence of the various constants in the estimates on the porosity ϕby the introduced transport vector w, through the change of unknown function. Also we do not assume zero-flux boundary, but we carry the analysis for the case Q≡0. 展开更多
关键词 Porous Medium equation POROSITY Saturation equation A Priori Estimates Regularity Results
下载PDF
Some Modified Equations of the Sine-Hilbert Type
6
作者 闫铃娟 刘亚杰 胡星标 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第4期1-6,共6页
Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based... Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived. 展开更多
关键词 BILINEAR equationS equation
原文传递
Theoretical study of particle and energy balance equations in locally bounded plasmas
7
作者 Hyun-Su JUN Yat Fung TSANG +1 位作者 Jae Ok YOO Navab SINGH 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第12期89-98,共10页
In this study,new particle and energy balance equations have been developed to predict the electron temperature and density in locally bounded plasmas.Classical particle and energy balance equations assume that all pl... In this study,new particle and energy balance equations have been developed to predict the electron temperature and density in locally bounded plasmas.Classical particle and energy balance equations assume that all plasma within a reactor is completely confined only by the reactor walls.However,in industrial plasma reactors for semiconductor manufacturing,the plasma is partially confined by internal reactor structures.We predict the effect of the open boundary area(A′_(L,eff))and ion escape velocity(u_(i))on electron temperature and density by developing new particle and energy balance equations.Theoretically,we found a low ion escape velocity(u_(i)/u_(B)≈0.2)and high open boundary area(A′_(L,eff)/A_(T,eff)≈0.6)to result in an approximately 38%increase in electron density and an 8%decrease in electron temperature compared to values in a fully bounded reactor.Additionally,we suggest that the velocity of ions passing through the open boundary should exceedω_(pi)λ_(De)under the condition E^(2)_(0)?(Φ/λ_(De))^(2). 展开更多
关键词 particle balance equation energy balance equation low temperature plasmas
下载PDF
Analytical solutions fractional order partial differential equations arising in fluid dynamics
8
作者 Sidheswar Behera Jasvinder Singh Pal Virdi 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2024年第3期458-468,共11页
This article describes the solution procedure of the fractional Pade-Ⅱ equation and generalized Zakharov equation(GSEs)using the sine-cosine method.Pade-Ⅱ is an important nonlinear wave equation modeling unidirectio... This article describes the solution procedure of the fractional Pade-Ⅱ equation and generalized Zakharov equation(GSEs)using the sine-cosine method.Pade-Ⅱ is an important nonlinear wave equation modeling unidirectional propagation of long-wave in dispersive media and GSEs are used to model the interaction between one-dimensional high,and low-frequency waves.Classes of trigonometric and hyperbolic function solutions in fractional calculus are discussed.Graphical simulations of the numerical solutions are flaunted by MATLAB. 展开更多
关键词 the sine-cosine method He's fractional derivative analytical solution fractional Pade-Ⅱequation fractional generalized Zakharov equation
下载PDF
Sparse-Grid Implementation of Fixed-Point Fast Sweeping WENO Schemes for Eikonal Equations
9
作者 Zachary M.Miksis Yong-Tao Zhang 《Communications on Applied Mathematics and Computation》 EI 2024年第1期3-29,共27页
Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of ... Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids. 展开更多
关键词 Fixed-point fast sweeping methods Weighted essentially non-oscillatory(WENO)schemes Sparse grids Static Hamilton-Jacobi(H-J)equations Eikonal equations
下载PDF
Pseudo S-Asymptotically(ω,c)-Periodic Solutions to Fractional Differential Equations of Sobolev Type
10
作者 MAO Hang-ning CHANG Yong-kui 《Chinese Quarterly Journal of Mathematics》 2024年第3期295-306,共12页
In this paper,we firstly recall some basic results on pseudo S-asymptotically(ω,c)-periodic functions and Sobolev type fractional differential equation.We secondly investigate some existence of pseudo S-asymptotical... In this paper,we firstly recall some basic results on pseudo S-asymptotically(ω,c)-periodic functions and Sobolev type fractional differential equation.We secondly investigate some existence of pseudo S-asymptotically(ω,c)-periodic solutions for a semilinear fractional differential equations of Sobolev type.We finally present a simple example. 展开更多
关键词 Pseudo S-asymptotically(ω c)-periodic functions Evolution equations Sobolev type Fractional differential equations Existence and uniqueness
下载PDF
Analysis of Modeling the Influence of Electromagnetic Fields Radiated by Industrial Static Converters and Impacts on Operators Using Maxwell’s Equations
11
作者 Anthony Bassesuka Sandoka Nzao Tuka Biaba Samuel Garcia +2 位作者 Obed Bitala Arsène Kasereka Kibwana Emmanuel Ndaye Kibuayi 《Open Journal of Applied Sciences》 2024年第8期2320-2350,共31页
The study of Electromagnetic Compatibility is essential to ensure the harmonious operation of electronic equipment in a shared environment. The basic principles of Electromagnetic Compatibility focus on the ability of... The study of Electromagnetic Compatibility is essential to ensure the harmonious operation of electronic equipment in a shared environment. The basic principles of Electromagnetic Compatibility focus on the ability of devices to withstand electromagnetic disturbances and not produce disturbances that could affect other systems. Imperceptible in most work situations, electromagnetic fields can, beyond certain thresholds, have effects on human health. The objective of the present article is focused on the modeling analysis of the influence of geometric parameters of industrial static converters radiated electromagnetic fields using Maxwell’s equations. To do this we used the analytical formalism for calculating the electromagnetic field emitted by a filiform conductor, to model the electromagnetic radiation of this device in the spatio-temporal domain. The interactions of electromagnetic waves with human bodies are complex and depend on several factors linked to the characteristics of the incident wave. To model these interactions, we implemented the physical laws of electromagnetic wave propagation based on Maxwell’s and bio-heat equations to obtain consistent results. These obtained models allowed us to evaluate the spatial profile of induced current and temperature of biological tissue during exposure to electromagnetic waves generated by this system. The simulation 2D results obtained from computer tools show that the temperature variation and current induced by the electromagnetic field can have a very significant influence on the life of biological tissue. The paper provides a comprehensive analysis using advanced mathematical models to evaluate the influence of electromagnetic fields. The findings have direct implications for workplace safety, potentially influencing standards and regulations concerning electromagnetic exposure in industrial settings. 展开更多
关键词 MODELING Electromagnetic Field Power Converters Geometric Parameters Biological Tissue Maxwell equation Bio-Heat equation Thermal Model
下载PDF
Derivation of a Revised Tsiolkovsky Rocket Equation That Predicts Combustion Oscillations
12
作者 Zaki Harari 《Advances in Aerospace Science and Technology》 2024年第1期10-27,共18页
Our study identifies a subtle deviation from Newton’s third law in the derivation of the ideal rocket equation, also known as the Tsiolkovsky Rocket Equation (TRE). TRE can be derived using a 1D elastic collision mod... Our study identifies a subtle deviation from Newton’s third law in the derivation of the ideal rocket equation, also known as the Tsiolkovsky Rocket Equation (TRE). TRE can be derived using a 1D elastic collision model of the momentum exchange between the differential propellant mass element (dm) and the rocket final mass (m1), in which dm initially travels forward to collide with m1 and rebounds to exit through the exhaust nozzle with a velocity that is known as the effective exhaust velocity ve. We observe that such a model does not explain how dm was able to acquire its initial forward velocity without the support of a reactive mass traveling in the opposite direction. We show instead that the initial kinetic energy of dm is generated from dm itself by a process of self-combustion and expansion. In our ideal rocket with a single particle dm confined inside a hollow tube with one closed end, we show that the process of self-combustion and expansion of dm will result in a pair of differential particles each with a mass dm/2, and each traveling away from one another along the tube axis, from the center of combustion. These two identical particles represent the active and reactive sub-components of dm, co-generated in compliance with Newton’s third law of equal action and reaction. Building on this model, we derive a linear momentum ODE of the system, the solution of which yields what we call the Revised Tsiolkovsky Rocket Equation (RTRE). We show that RTRE has a mathematical form that is similar to TRE, with the exception of the effective exhaust velocity (ve) term. The ve term in TRE is replaced in RTRE by the average of two distinct exhaust velocities that we refer to as fast-jet, vx<sub>1</sub>, and slow-jet, vx<sub>2</sub>. These two velocities correspond, respectively, to the velocities of the detonation pressure wave that is vectored directly towards the exhaust nozzle, and the retonation wave that is initially vectored in the direction of rocket propagation, but subsequently becomes reflected from the thrust surface of the combustion chamber to exit through the exhaust nozzle with a time lag behind the detonation wave. The detonation-retonation phenomenon is supported by experimental evidence in the published literature. Finally, we use a convolution model to simulate the composite exhaust pressure wave, highlighting the frequency spectrum of the pressure perturbations that are generated by the mutual interference between the fast-jet and slow-jet components. Our analysis offers insights into the origin of combustion oscillations in rocket engines, with possible extensions beyond rocket engineering into other fields of combustion engineering. 展开更多
关键词 Tsiolkovsky Rocket equation Ideal Rocket equation Rocket Propulsion Newton’s Third Law Combustion Oscillations Combustion Instability
下载PDF
Dynamics and Exact Solutions of (1 + 1)-Dimensional Generalized Boussinesq Equation with Time-Space Dispersion Term
13
作者 Dahe Feng Jibin Li Jianjun Jiao 《Journal of Applied Mathematics and Physics》 2024年第8期2723-2737,共15页
We study exact solutions to (1 + 1)-dimensional generalized Boussinesq equation with time-space dispersion term by making use of improved sub-equation method, and analyse the dynamical behavior and exact solutions of ... We study exact solutions to (1 + 1)-dimensional generalized Boussinesq equation with time-space dispersion term by making use of improved sub-equation method, and analyse the dynamical behavior and exact solutions of the sub-equation after constructing the nonlinear transformation and constraint conditions. Accordingly, we obtain twenty families of exact solutions such as analytical and singular solitons and singular periodic waves. In addition, we discuss the impact of system parameters on wave propagation. 展开更多
关键词 Generalized Boussinesq equation Improved Sub-equation Method BIFURCATION Soliton Solution Periodic Solution
下载PDF
The Regularity of Solutions to Mixed Boundary Value Problems of Second-Order Elliptic Equations with Small Angles
14
作者 Mingyu Wu 《Journal of Applied Mathematics and Physics》 2024年第4期1043-1049,共7页
This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of suff... This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of sufficient regularity of boundary conditions and coefficients, as long as the angle is sufficiently small, the regularity of the solution to the mixed boundary value problem of the second-order elliptic equation can reach any order. 展开更多
关键词 Mixed Boundary Value Problems for Elliptic equations Small-Angle Boundary Value Problems Regularity of Solutions to Elliptic equations
下载PDF
A practical guideline for univariate meta-analytic structural equation modelling
15
作者 Zhen-Wei Dai Qiu-Chen Yuan 《Medical Data Mining》 2024年第4期28-33,共6页
Background:Meta-analysis is a quantitative approach that systematically integrates results from previous research to draw conclusions.Structural equation modelling is a statistical method that integrates factor analys... Background:Meta-analysis is a quantitative approach that systematically integrates results from previous research to draw conclusions.Structural equation modelling is a statistical method that integrates factor analysis and path analysis.Meta-analytic structural equation modeling(MASEM)combines meta-analysis and structural equation modeling.It allows researchers to explain relationships among a group of variables across multiple studies.Methods:We used a simulated dataset to conduct a univariate MASEM analysis,using Comprehensive Meta Analysis 3.3,Analysis of Moment Structures 24.0 software.Results:Despite the lack of concise literature on the methodology,our study provided a practical step-by-step guide on univariate MASEM.Conclusion:Researchers can employ MASEM analysis in applicable fields based on the description,principles,and practices expressed in this study and our previous publications mentioned in this study. 展开更多
关键词 META-ANALYSIS structural equation modelling meta-analytic structural equation modelling STATISTICS
下载PDF
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
16
作者 周淳 赵燕美 +11 位作者 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期192-201,共10页
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance... The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks. 展开更多
关键词 quantum key distribution satellite-to-ground beam wandering
原文传递
Reference-frame-independent quantum key distribution with two-way classical communication
17
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
原文传递
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
18
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
原文传递
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
19
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
20
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部