The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled qua...The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled quater- nion. The crosstalk of quarter-phase-shift-key signals caused by fiber nonlinearity in polarization multiplexing systems with 100 Cbps bit-rate is investigated and simulated. The results demonstrate that the crosstalk is like a rotated ghosting of input constellation. For the 50 km conventional fiber link, when the total power is less than 4roW, the crosstalk effect can be neglected; when the power is larger than 20roW, the crosstalk is very obvious. In addition, the crosstalk can not be detected according to the output eye diagram and state of polarization in Poincare sphere in the trunk fiber, making it difficult for the monitoring of optical trunk link.展开更多
In this study, the Bernstein collocation method has been expanded to Stancu collocation method for numerical solution of the charged particle motion for certain configurations of oscillating magnetic fields modelled b...In this study, the Bernstein collocation method has been expanded to Stancu collocation method for numerical solution of the charged particle motion for certain configurations of oscillating magnetic fields modelled by a class of linear integro-differential equations. As the method has been improved, the Stancu polynomials that are generalization of the Bernstein polynomials have been used. The method has been tested on a physical problem how the method can be applied. Moreover, numerical results of the method have been compared with the numerical results of the other methods to indicate the efficiency of the method.展开更多
Hessian matrices are square matrices consisting of all possible combinations of second partial derivatives of a scalar-valued initial function. As such, Hessian matrices may be treated as elementary matrix systems of ...Hessian matrices are square matrices consisting of all possible combinations of second partial derivatives of a scalar-valued initial function. As such, Hessian matrices may be treated as elementary matrix systems of linear second-order partial differential equations. This paper discusses the Hessian and its applications in optimization, and then proceeds to introduce and derive the notion of the Jaffa Transform, a new linear operator that directly maps a Hessian square matrix space to the initial corresponding scalar field in nth dimensional Euclidean space. The Jaffa Transform is examined, including the properties of the operator, the transform of notable matrices, and the existence of an inverse Jaffa Transform, which is, by definition, the Hessian matrix operator. The Laplace equation is then noted and investigated, particularly, the relation of the Laplace equation to Poisson’s equation, and the theoretical applications and correlations of harmonic functions to Hessian matrices. The paper concludes by introducing and explicating the Jaffa Theorem, a principle that declares the existence of harmonic Jaffa Transforms, which are, essentially, Jaffa Transform solutions to the Laplace partial differential equation.展开更多
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env...Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.展开更多
We consider a generalized form of the porous medium equation where the porosity ϕis a function of time t: ϕ=ϕ(x,t): ∂(ϕS)∂t−∇⋅(k(S)∇S)=Q(S).In many works, the porosity ϕis either assumed to be independent of (or to de...We consider a generalized form of the porous medium equation where the porosity ϕis a function of time t: ϕ=ϕ(x,t): ∂(ϕS)∂t−∇⋅(k(S)∇S)=Q(S).In many works, the porosity ϕis either assumed to be independent of (or to depend very little of) the time variable t. In this work, we want to study the case where it does depend on t(and xas well). For this purpose, we make a change of unknown function V=ϕSin order to obtain a saturation-like (advection-diffusion) equation. A priori estimates and regularity results are established for the new equation based in part on what is known from the saturation equation, when ϕis independent of the time t. These results are then extended to the full saturation equation with time-dependent porosity ϕ=ϕ(x,t). In this analysis, we make explicitly the dependence of the various constants in the estimates on the porosity ϕby the introduced transport vector w, through the change of unknown function. Also we do not assume zero-flux boundary, but we carry the analysis for the case Q≡0.展开更多
Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based...Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived.展开更多
In this study,new particle and energy balance equations have been developed to predict the electron temperature and density in locally bounded plasmas.Classical particle and energy balance equations assume that all pl...In this study,new particle and energy balance equations have been developed to predict the electron temperature and density in locally bounded plasmas.Classical particle and energy balance equations assume that all plasma within a reactor is completely confined only by the reactor walls.However,in industrial plasma reactors for semiconductor manufacturing,the plasma is partially confined by internal reactor structures.We predict the effect of the open boundary area(A′_(L,eff))and ion escape velocity(u_(i))on electron temperature and density by developing new particle and energy balance equations.Theoretically,we found a low ion escape velocity(u_(i)/u_(B)≈0.2)and high open boundary area(A′_(L,eff)/A_(T,eff)≈0.6)to result in an approximately 38%increase in electron density and an 8%decrease in electron temperature compared to values in a fully bounded reactor.Additionally,we suggest that the velocity of ions passing through the open boundary should exceedω_(pi)λ_(De)under the condition E^(2)_(0)?(Φ/λ_(De))^(2).展开更多
This article describes the solution procedure of the fractional Pade-Ⅱ equation and generalized Zakharov equation(GSEs)using the sine-cosine method.Pade-Ⅱ is an important nonlinear wave equation modeling unidirectio...This article describes the solution procedure of the fractional Pade-Ⅱ equation and generalized Zakharov equation(GSEs)using the sine-cosine method.Pade-Ⅱ is an important nonlinear wave equation modeling unidirectional propagation of long-wave in dispersive media and GSEs are used to model the interaction between one-dimensional high,and low-frequency waves.Classes of trigonometric and hyperbolic function solutions in fractional calculus are discussed.Graphical simulations of the numerical solutions are flaunted by MATLAB.展开更多
Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of ...Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.展开更多
In this paper,we firstly recall some basic results on pseudo S-asymptotically(ω,c)-periodic functions and Sobolev type fractional differential equation.We secondly investigate some existence of pseudo S-asymptotical...In this paper,we firstly recall some basic results on pseudo S-asymptotically(ω,c)-periodic functions and Sobolev type fractional differential equation.We secondly investigate some existence of pseudo S-asymptotically(ω,c)-periodic solutions for a semilinear fractional differential equations of Sobolev type.We finally present a simple example.展开更多
The study of Electromagnetic Compatibility is essential to ensure the harmonious operation of electronic equipment in a shared environment. The basic principles of Electromagnetic Compatibility focus on the ability of...The study of Electromagnetic Compatibility is essential to ensure the harmonious operation of electronic equipment in a shared environment. The basic principles of Electromagnetic Compatibility focus on the ability of devices to withstand electromagnetic disturbances and not produce disturbances that could affect other systems. Imperceptible in most work situations, electromagnetic fields can, beyond certain thresholds, have effects on human health. The objective of the present article is focused on the modeling analysis of the influence of geometric parameters of industrial static converters radiated electromagnetic fields using Maxwell’s equations. To do this we used the analytical formalism for calculating the electromagnetic field emitted by a filiform conductor, to model the electromagnetic radiation of this device in the spatio-temporal domain. The interactions of electromagnetic waves with human bodies are complex and depend on several factors linked to the characteristics of the incident wave. To model these interactions, we implemented the physical laws of electromagnetic wave propagation based on Maxwell’s and bio-heat equations to obtain consistent results. These obtained models allowed us to evaluate the spatial profile of induced current and temperature of biological tissue during exposure to electromagnetic waves generated by this system. The simulation 2D results obtained from computer tools show that the temperature variation and current induced by the electromagnetic field can have a very significant influence on the life of biological tissue. The paper provides a comprehensive analysis using advanced mathematical models to evaluate the influence of electromagnetic fields. The findings have direct implications for workplace safety, potentially influencing standards and regulations concerning electromagnetic exposure in industrial settings.展开更多
Our study identifies a subtle deviation from Newton’s third law in the derivation of the ideal rocket equation, also known as the Tsiolkovsky Rocket Equation (TRE). TRE can be derived using a 1D elastic collision mod...Our study identifies a subtle deviation from Newton’s third law in the derivation of the ideal rocket equation, also known as the Tsiolkovsky Rocket Equation (TRE). TRE can be derived using a 1D elastic collision model of the momentum exchange between the differential propellant mass element (dm) and the rocket final mass (m1), in which dm initially travels forward to collide with m1 and rebounds to exit through the exhaust nozzle with a velocity that is known as the effective exhaust velocity ve. We observe that such a model does not explain how dm was able to acquire its initial forward velocity without the support of a reactive mass traveling in the opposite direction. We show instead that the initial kinetic energy of dm is generated from dm itself by a process of self-combustion and expansion. In our ideal rocket with a single particle dm confined inside a hollow tube with one closed end, we show that the process of self-combustion and expansion of dm will result in a pair of differential particles each with a mass dm/2, and each traveling away from one another along the tube axis, from the center of combustion. These two identical particles represent the active and reactive sub-components of dm, co-generated in compliance with Newton’s third law of equal action and reaction. Building on this model, we derive a linear momentum ODE of the system, the solution of which yields what we call the Revised Tsiolkovsky Rocket Equation (RTRE). We show that RTRE has a mathematical form that is similar to TRE, with the exception of the effective exhaust velocity (ve) term. The ve term in TRE is replaced in RTRE by the average of two distinct exhaust velocities that we refer to as fast-jet, vx<sub>1</sub>, and slow-jet, vx<sub>2</sub>. These two velocities correspond, respectively, to the velocities of the detonation pressure wave that is vectored directly towards the exhaust nozzle, and the retonation wave that is initially vectored in the direction of rocket propagation, but subsequently becomes reflected from the thrust surface of the combustion chamber to exit through the exhaust nozzle with a time lag behind the detonation wave. The detonation-retonation phenomenon is supported by experimental evidence in the published literature. Finally, we use a convolution model to simulate the composite exhaust pressure wave, highlighting the frequency spectrum of the pressure perturbations that are generated by the mutual interference between the fast-jet and slow-jet components. Our analysis offers insights into the origin of combustion oscillations in rocket engines, with possible extensions beyond rocket engineering into other fields of combustion engineering.展开更多
We study exact solutions to (1 + 1)-dimensional generalized Boussinesq equation with time-space dispersion term by making use of improved sub-equation method, and analyse the dynamical behavior and exact solutions of ...We study exact solutions to (1 + 1)-dimensional generalized Boussinesq equation with time-space dispersion term by making use of improved sub-equation method, and analyse the dynamical behavior and exact solutions of the sub-equation after constructing the nonlinear transformation and constraint conditions. Accordingly, we obtain twenty families of exact solutions such as analytical and singular solitons and singular periodic waves. In addition, we discuss the impact of system parameters on wave propagation.展开更多
This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of suff...This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of sufficient regularity of boundary conditions and coefficients, as long as the angle is sufficiently small, the regularity of the solution to the mixed boundary value problem of the second-order elliptic equation can reach any order.展开更多
Background:Meta-analysis is a quantitative approach that systematically integrates results from previous research to draw conclusions.Structural equation modelling is a statistical method that integrates factor analys...Background:Meta-analysis is a quantitative approach that systematically integrates results from previous research to draw conclusions.Structural equation modelling is a statistical method that integrates factor analysis and path analysis.Meta-analytic structural equation modeling(MASEM)combines meta-analysis and structural equation modeling.It allows researchers to explain relationships among a group of variables across multiple studies.Methods:We used a simulated dataset to conduct a univariate MASEM analysis,using Comprehensive Meta Analysis 3.3,Analysis of Moment Structures 24.0 software.Results:Despite the lack of concise literature on the methodology,our study provided a practical step-by-step guide on univariate MASEM.Conclusion:Researchers can employ MASEM analysis in applicable fields based on the description,principles,and practices expressed in this study and our previous publications mentioned in this study.展开更多
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi...Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No 61275075the Beijing Natural Science Foundation under Grant Nos 4132035 and 4144080
文摘The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled quater- nion. The crosstalk of quarter-phase-shift-key signals caused by fiber nonlinearity in polarization multiplexing systems with 100 Cbps bit-rate is investigated and simulated. The results demonstrate that the crosstalk is like a rotated ghosting of input constellation. For the 50 km conventional fiber link, when the total power is less than 4roW, the crosstalk effect can be neglected; when the power is larger than 20roW, the crosstalk is very obvious. In addition, the crosstalk can not be detected according to the output eye diagram and state of polarization in Poincare sphere in the trunk fiber, making it difficult for the monitoring of optical trunk link.
文摘In this study, the Bernstein collocation method has been expanded to Stancu collocation method for numerical solution of the charged particle motion for certain configurations of oscillating magnetic fields modelled by a class of linear integro-differential equations. As the method has been improved, the Stancu polynomials that are generalization of the Bernstein polynomials have been used. The method has been tested on a physical problem how the method can be applied. Moreover, numerical results of the method have been compared with the numerical results of the other methods to indicate the efficiency of the method.
文摘Hessian matrices are square matrices consisting of all possible combinations of second partial derivatives of a scalar-valued initial function. As such, Hessian matrices may be treated as elementary matrix systems of linear second-order partial differential equations. This paper discusses the Hessian and its applications in optimization, and then proceeds to introduce and derive the notion of the Jaffa Transform, a new linear operator that directly maps a Hessian square matrix space to the initial corresponding scalar field in nth dimensional Euclidean space. The Jaffa Transform is examined, including the properties of the operator, the transform of notable matrices, and the existence of an inverse Jaffa Transform, which is, by definition, the Hessian matrix operator. The Laplace equation is then noted and investigated, particularly, the relation of the Laplace equation to Poisson’s equation, and the theoretical applications and correlations of harmonic functions to Hessian matrices. The paper concludes by introducing and explicating the Jaffa Theorem, a principle that declares the existence of harmonic Jaffa Transforms, which are, essentially, Jaffa Transform solutions to the Laplace partial differential equation.
基金Project supported by the Natural Science Foundation of Jilin Province of China(Grant No.20210101417JC).
文摘Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
文摘We consider a generalized form of the porous medium equation where the porosity ϕis a function of time t: ϕ=ϕ(x,t): ∂(ϕS)∂t−∇⋅(k(S)∇S)=Q(S).In many works, the porosity ϕis either assumed to be independent of (or to depend very little of) the time variable t. In this work, we want to study the case where it does depend on t(and xas well). For this purpose, we make a change of unknown function V=ϕSin order to obtain a saturation-like (advection-diffusion) equation. A priori estimates and regularity results are established for the new equation based in part on what is known from the saturation equation, when ϕis independent of the time t. These results are then extended to the full saturation equation with time-dependent porosity ϕ=ϕ(x,t). In this analysis, we make explicitly the dependence of the various constants in the estimates on the porosity ϕby the introduced transport vector w, through the change of unknown function. Also we do not assume zero-flux boundary, but we carry the analysis for the case Q≡0.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11931017 and 12071447)。
文摘Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived.
文摘In this study,new particle and energy balance equations have been developed to predict the electron temperature and density in locally bounded plasmas.Classical particle and energy balance equations assume that all plasma within a reactor is completely confined only by the reactor walls.However,in industrial plasma reactors for semiconductor manufacturing,the plasma is partially confined by internal reactor structures.We predict the effect of the open boundary area(A′_(L,eff))and ion escape velocity(u_(i))on electron temperature and density by developing new particle and energy balance equations.Theoretically,we found a low ion escape velocity(u_(i)/u_(B)≈0.2)and high open boundary area(A′_(L,eff)/A_(T,eff)≈0.6)to result in an approximately 38%increase in electron density and an 8%decrease in electron temperature compared to values in a fully bounded reactor.Additionally,we suggest that the velocity of ions passing through the open boundary should exceedω_(pi)λ_(De)under the condition E^(2)_(0)?(Φ/λ_(De))^(2).
文摘This article describes the solution procedure of the fractional Pade-Ⅱ equation and generalized Zakharov equation(GSEs)using the sine-cosine method.Pade-Ⅱ is an important nonlinear wave equation modeling unidirectional propagation of long-wave in dispersive media and GSEs are used to model the interaction between one-dimensional high,and low-frequency waves.Classes of trigonometric and hyperbolic function solutions in fractional calculus are discussed.Graphical simulations of the numerical solutions are flaunted by MATLAB.
文摘Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.
基金supported by NSF of Shaanxi Province(Grant No.2023-JC-YB-011).
文摘In this paper,we firstly recall some basic results on pseudo S-asymptotically(ω,c)-periodic functions and Sobolev type fractional differential equation.We secondly investigate some existence of pseudo S-asymptotically(ω,c)-periodic solutions for a semilinear fractional differential equations of Sobolev type.We finally present a simple example.
文摘The study of Electromagnetic Compatibility is essential to ensure the harmonious operation of electronic equipment in a shared environment. The basic principles of Electromagnetic Compatibility focus on the ability of devices to withstand electromagnetic disturbances and not produce disturbances that could affect other systems. Imperceptible in most work situations, electromagnetic fields can, beyond certain thresholds, have effects on human health. The objective of the present article is focused on the modeling analysis of the influence of geometric parameters of industrial static converters radiated electromagnetic fields using Maxwell’s equations. To do this we used the analytical formalism for calculating the electromagnetic field emitted by a filiform conductor, to model the electromagnetic radiation of this device in the spatio-temporal domain. The interactions of electromagnetic waves with human bodies are complex and depend on several factors linked to the characteristics of the incident wave. To model these interactions, we implemented the physical laws of electromagnetic wave propagation based on Maxwell’s and bio-heat equations to obtain consistent results. These obtained models allowed us to evaluate the spatial profile of induced current and temperature of biological tissue during exposure to electromagnetic waves generated by this system. The simulation 2D results obtained from computer tools show that the temperature variation and current induced by the electromagnetic field can have a very significant influence on the life of biological tissue. The paper provides a comprehensive analysis using advanced mathematical models to evaluate the influence of electromagnetic fields. The findings have direct implications for workplace safety, potentially influencing standards and regulations concerning electromagnetic exposure in industrial settings.
文摘Our study identifies a subtle deviation from Newton’s third law in the derivation of the ideal rocket equation, also known as the Tsiolkovsky Rocket Equation (TRE). TRE can be derived using a 1D elastic collision model of the momentum exchange between the differential propellant mass element (dm) and the rocket final mass (m1), in which dm initially travels forward to collide with m1 and rebounds to exit through the exhaust nozzle with a velocity that is known as the effective exhaust velocity ve. We observe that such a model does not explain how dm was able to acquire its initial forward velocity without the support of a reactive mass traveling in the opposite direction. We show instead that the initial kinetic energy of dm is generated from dm itself by a process of self-combustion and expansion. In our ideal rocket with a single particle dm confined inside a hollow tube with one closed end, we show that the process of self-combustion and expansion of dm will result in a pair of differential particles each with a mass dm/2, and each traveling away from one another along the tube axis, from the center of combustion. These two identical particles represent the active and reactive sub-components of dm, co-generated in compliance with Newton’s third law of equal action and reaction. Building on this model, we derive a linear momentum ODE of the system, the solution of which yields what we call the Revised Tsiolkovsky Rocket Equation (RTRE). We show that RTRE has a mathematical form that is similar to TRE, with the exception of the effective exhaust velocity (ve) term. The ve term in TRE is replaced in RTRE by the average of two distinct exhaust velocities that we refer to as fast-jet, vx<sub>1</sub>, and slow-jet, vx<sub>2</sub>. These two velocities correspond, respectively, to the velocities of the detonation pressure wave that is vectored directly towards the exhaust nozzle, and the retonation wave that is initially vectored in the direction of rocket propagation, but subsequently becomes reflected from the thrust surface of the combustion chamber to exit through the exhaust nozzle with a time lag behind the detonation wave. The detonation-retonation phenomenon is supported by experimental evidence in the published literature. Finally, we use a convolution model to simulate the composite exhaust pressure wave, highlighting the frequency spectrum of the pressure perturbations that are generated by the mutual interference between the fast-jet and slow-jet components. Our analysis offers insights into the origin of combustion oscillations in rocket engines, with possible extensions beyond rocket engineering into other fields of combustion engineering.
文摘We study exact solutions to (1 + 1)-dimensional generalized Boussinesq equation with time-space dispersion term by making use of improved sub-equation method, and analyse the dynamical behavior and exact solutions of the sub-equation after constructing the nonlinear transformation and constraint conditions. Accordingly, we obtain twenty families of exact solutions such as analytical and singular solitons and singular periodic waves. In addition, we discuss the impact of system parameters on wave propagation.
文摘This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of sufficient regularity of boundary conditions and coefficients, as long as the angle is sufficiently small, the regularity of the solution to the mixed boundary value problem of the second-order elliptic equation can reach any order.
文摘Background:Meta-analysis is a quantitative approach that systematically integrates results from previous research to draw conclusions.Structural equation modelling is a statistical method that integrates factor analysis and path analysis.Meta-analytic structural equation modeling(MASEM)combines meta-analysis and structural equation modeling.It allows researchers to explain relationships among a group of variables across multiple studies.Methods:We used a simulated dataset to conduct a univariate MASEM analysis,using Comprehensive Meta Analysis 3.3,Analysis of Moment Structures 24.0 software.Results:Despite the lack of concise literature on the methodology,our study provided a practical step-by-step guide on univariate MASEM.Conclusion:Researchers can employ MASEM analysis in applicable fields based on the description,principles,and practices expressed in this study and our previous publications mentioned in this study.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12074194,12104240,and 62101285)the Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key Research and Development Program(Grant No.BE2022071)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20192001 and BK20210582).
文摘Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.