Considering both the characteristics of construction scheme evaluation and the lack of consideration of index proportionality after introducing comprehensive evaluation of independent perspectives into construction sc...Considering both the characteristics of construction scheme evaluation and the lack of consideration of index proportionality after introducing comprehensive evaluation of independent perspectives into construction scheme evaluation, a construction scheme evaluation model of independent perspectives was put forward through the study and optimization of comprehensive evaluation of independent perspectives. The feasibility and rationality of the optimized method were illustrated through a case study and the evaluation results were compared between the optimized method and non-optimized method. The optimized method has the practical value in construction scheme comparison.展开更多
In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the m...In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the main contributor to the stability of the slope.Then,two widening schemes are proposed,which are the steep slope with strong support and the gentle slope with general support schemes.The static/slope module of MIDAS GTS finite element analysis software and the strength reduction method were used to compare the two schemes.The results show that the steep slope with a strong support scheme has obvious advantages in land requisition,environmental protection,and safety and is more suitable for reconstructing and expanding the highway slope.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been c...As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.展开更多
Due to the acceleration of urbanization,the municipal waste(MW)problem has transformed into a global challenge for urb-an sustainability.To elucidate historical trends,current focal points,and future directions in MW ...Due to the acceleration of urbanization,the municipal waste(MW)problem has transformed into a global challenge for urb-an sustainability.To elucidate historical trends,current focal points,and future directions in MW research,we conducted a bibliometric analysis and employed knowledge graph visualization to scrutinize a total of 34212 articles,which were published between 1991 and 2021 in the Web of Science(WoS)core database.The results indicated that current major research themes encompass waste classifica-tion and recycling,waste management and public behavior,waste disposal methods and technologies,as well as environmental impact and evaluation.There has been a shift in the research focus from the environmental impacts of waste incineration to sustainable manage-ment related issues.A comparison of research from six typical countries revealed the differences in research priorities and techniques advantages.Scholars from the USA and Britain initiated MW research earlier than other countries and investigated management issues in depth,such as public behavior and willingness to pay.Meanwhile,Japanese,German,and Swedish scholars conducted extensive studies on advanced waste treatment technologies,such as disposal and recycling,risk assessment,and waste-to-energy techniques.Chinese scholars placed particular emphasis on end-of-pipe treatments and their associated environmental impacts.Hotspots and poten-tial future frontiers were identified by burst detection analysis.Keywords with high value of burst index(BI)worldwide are food waste and circular economy.Chinese scholars have put great efforts on waste environmental impact and its recycling technologies,while we’re expecting to further investigating vulnerable population.Furthermore,this study contributes to bridging the regional gap of scientific research among different countries and fostering international collaboration.展开更多
The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference oper...The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference operators and combining the compact technique, in the time direction is discretized by the Crank-Nicolson method. Through the energy method, the stability and convergence of the numerical scheme in the sense of L<sub>2</sub>-norm are proved, and the convergence order is . Some examples are given to show that our numerical scheme is effective.展开更多
This paper presents two comparisons or tests for a Lagrangian model of zooplankton dispersion:numerical schemes and time steps.Firstly,we compared three numerical schemes using idealized circulations.Results show that...This paper presents two comparisons or tests for a Lagrangian model of zooplankton dispersion:numerical schemes and time steps.Firstly,we compared three numerical schemes using idealized circulations.Results show that the precisions of the advanced Adams-Bashfold-Moulton(ABM) method and the Runge-Kutta(RK) method were in the same order and both were much higher than that of the Euler method.Furthermore,the advanced ABM method is more efficient than the RK method in computational memory requirements and time consumption.We therefore chose the advanced ABM method as the Lagrangian particle-tracking algorithm.Secondly,we performed a sensitivity test for time steps,using outputs of the hydrodynamic model,Symphonie.Results show that the time step choices depend on the fluid response time that is related to the spatial resolution of velocity fields.The method introduced by Oliveira et al.in 2002 is suitable for choosing time steps of Lagrangian particle-tracking models,at least when only considering advection.展开更多
Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbase...Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbased methods are believed to be promising for detecting ethereum Ponzi schemes.However,there are still some flaws in current research,e.g.,insufficient feature extraction of Ponzi scheme smart contracts,without considering class imbalance.In addition,there is room for improvement in detection precision.Aiming at the above problems,this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting(AdaBoost)algorithm.Firstly,this paper uses the n-gram algorithm to extract more comprehensive contract opcode features and combine them with contract account features,which helps to improve the feature extraction effect.Meanwhile,adaptive synthetic sampling(ADASYN)is introduced to deal with class imbalanced data,and integrated with the Adaboost classifier.Finally,this paper uses the improved AdaBoost classifier for the identification of Ponzi scheme contracts.Experimentally,this paper tests our model in real-world smart contracts and compares it with representative methods in the aspect of F1-score and precision.Moreover,this article compares and discusses the state of art methods with our method in four aspects:data acquisition,data preprocessing,feature extraction,and classifier design.Both experiment and discussion validate the effectiveness of our model.展开更多
Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves abov...Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves above a plane bed. These turbulence algorithms include six empirical eddy viscosity schemes and one standard two-equation k-ε model. In particular, different combinations of typical empirical formulas for the eddy viscosity profile and for the wave friction factor are examined. Numerical results are compared with four laboratory data sets, consisting of one wave boundary layer hydrodynamics experiment and three sediment suspension experiments under linear waves and the Stokes second-order waves. It is shown that predictions of near-bed sediment suspension are very sensitive to the choices of the empirical formulas in turbulence schemes. Simple empirical turbulence schemes are possible to perform equally well as the two-equation k-ε model. Among the empirical schemes, the turbulence scheme, combining the exponential formula for eddy viscosity and Swart formula for wave friction factor, is the most accurate. It maintains the simplicity and yields identically good predictions as the k-ε model does in terms of the wave-averaged sediment concentration.展开更多
The Counting Bloom Filter(CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set.This paper evaluates the performance of mul...The Counting Bloom Filter(CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set.This paper evaluates the performance of multiplicity queries of three simple CBF schemes-the Na?ve Counting Bloom Filter(NCBF), the Space-Code Bloom Filter(SCBF) and the d-left Counting Bloom Filter(dlCBF)-using metrics of space complexity and counting error under both uniform and zipfian multiplicity distributions.We compare their counting error under same space complexity, and their space complexity when similar counting errors are achieved respectively.Our results show that dlCBF is the best while SCBF is the worst in terms of both space-efficiency and accuracy.Furthermore, the performance gap between dlCBF and the others has a trend of being enlarged with the increment of space occupation or counting accuracy.展开更多
Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encode...Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encoded by using conjugate coding or orthogonal states,and all users are quantum participants.In this paper,a novel semi-quantum private comparison scheme is proposed,which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols,these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis fj0i;j1ig,and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further,analysis results show that this scheme can avoid outside and participant attacks and its’qubit efficiency is better than the other two protocols mentioned in the paper.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
文摘Considering both the characteristics of construction scheme evaluation and the lack of consideration of index proportionality after introducing comprehensive evaluation of independent perspectives into construction scheme evaluation, a construction scheme evaluation model of independent perspectives was put forward through the study and optimization of comprehensive evaluation of independent perspectives. The feasibility and rationality of the optimized method were illustrated through a case study and the evaluation results were compared between the optimized method and non-optimized method. The optimized method has the practical value in construction scheme comparison.
文摘In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the main contributor to the stability of the slope.Then,two widening schemes are proposed,which are the steep slope with strong support and the gentle slope with general support schemes.The static/slope module of MIDAS GTS finite element analysis software and the strength reduction method were used to compare the two schemes.The results show that the steep slope with a strong support scheme has obvious advantages in land requisition,environmental protection,and safety and is more suitable for reconstructing and expanding the highway slope.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported by the National Natural Science Foundation of China(Nos.41876077,41376085).
文摘As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.
基金Under the auspices of the General Program of National Natural Science Foundation of China(No.42271112)General Research Project of Beijing Municipal Commission of Education Science(No.KM202011417008)。
文摘Due to the acceleration of urbanization,the municipal waste(MW)problem has transformed into a global challenge for urb-an sustainability.To elucidate historical trends,current focal points,and future directions in MW research,we conducted a bibliometric analysis and employed knowledge graph visualization to scrutinize a total of 34212 articles,which were published between 1991 and 2021 in the Web of Science(WoS)core database.The results indicated that current major research themes encompass waste classifica-tion and recycling,waste management and public behavior,waste disposal methods and technologies,as well as environmental impact and evaluation.There has been a shift in the research focus from the environmental impacts of waste incineration to sustainable manage-ment related issues.A comparison of research from six typical countries revealed the differences in research priorities and techniques advantages.Scholars from the USA and Britain initiated MW research earlier than other countries and investigated management issues in depth,such as public behavior and willingness to pay.Meanwhile,Japanese,German,and Swedish scholars conducted extensive studies on advanced waste treatment technologies,such as disposal and recycling,risk assessment,and waste-to-energy techniques.Chinese scholars placed particular emphasis on end-of-pipe treatments and their associated environmental impacts.Hotspots and poten-tial future frontiers were identified by burst detection analysis.Keywords with high value of burst index(BI)worldwide are food waste and circular economy.Chinese scholars have put great efforts on waste environmental impact and its recycling technologies,while we’re expecting to further investigating vulnerable population.Furthermore,this study contributes to bridging the regional gap of scientific research among different countries and fostering international collaboration.
文摘The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference operators and combining the compact technique, in the time direction is discretized by the Crank-Nicolson method. Through the energy method, the stability and convergence of the numerical scheme in the sense of L<sub>2</sub>-norm are proved, and the convergence order is . Some examples are given to show that our numerical scheme is effective.
基金sponsored by the National Natural Science Foundation of China [grant number 41530427 and41875172]supported by the demonstration project of artificial precipitation enhancement and hail suppression operation technology at the eastern side of Taihang Mountains [Grant No.hbrywcsy-2017-2]
基金funded by the National Natural Science Foundation of China[General Project,grant number 41275108]the Strategic Priority Research Program of the Chinese Academy of Sciences[grant number XDA11010404]
基金Supported by the Project Lagrangian Zooplankton Computation and Experiment (CNRS Programme EC2CO)the National Natural Science Fundation of China (Nos. 40821004,40706059)
文摘This paper presents two comparisons or tests for a Lagrangian model of zooplankton dispersion:numerical schemes and time steps.Firstly,we compared three numerical schemes using idealized circulations.Results show that the precisions of the advanced Adams-Bashfold-Moulton(ABM) method and the Runge-Kutta(RK) method were in the same order and both were much higher than that of the Euler method.Furthermore,the advanced ABM method is more efficient than the RK method in computational memory requirements and time consumption.We therefore chose the advanced ABM method as the Lagrangian particle-tracking algorithm.Secondly,we performed a sensitivity test for time steps,using outputs of the hydrodynamic model,Symphonie.Results show that the time step choices depend on the fluid response time that is related to the spatial resolution of velocity fields.The method introduced by Oliveira et al.in 2002 is suitable for choosing time steps of Lagrangian particle-tracking models,at least when only considering advection.
基金This work was supported by National Key R&D Program of China(Grant Numbers 2020YFB1005900,2022YFB3305802).
文摘Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbased methods are believed to be promising for detecting ethereum Ponzi schemes.However,there are still some flaws in current research,e.g.,insufficient feature extraction of Ponzi scheme smart contracts,without considering class imbalance.In addition,there is room for improvement in detection precision.Aiming at the above problems,this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting(AdaBoost)algorithm.Firstly,this paper uses the n-gram algorithm to extract more comprehensive contract opcode features and combine them with contract account features,which helps to improve the feature extraction effect.Meanwhile,adaptive synthetic sampling(ADASYN)is introduced to deal with class imbalanced data,and integrated with the Adaboost classifier.Finally,this paper uses the improved AdaBoost classifier for the identification of Ponzi scheme contracts.Experimentally,this paper tests our model in real-world smart contracts and compares it with representative methods in the aspect of F1-score and precision.Moreover,this article compares and discusses the state of art methods with our method in four aspects:data acquisition,data preprocessing,feature extraction,and classifier design.Both experiment and discussion validate the effectiveness of our model.
基金supported by the National Key Basic Research Development Program of China (973 Program, Grant No.2010CB429002)the National Natural Science Foundation of China (Grant No. 50979033)+1 种基金the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions, the Special Research Funding of State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering (Grant No. 2009585812)Scotland-China Higher Education Research Partnership for PhD Studies (Grant No. [2010]6044)
文摘Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves above a plane bed. These turbulence algorithms include six empirical eddy viscosity schemes and one standard two-equation k-ε model. In particular, different combinations of typical empirical formulas for the eddy viscosity profile and for the wave friction factor are examined. Numerical results are compared with four laboratory data sets, consisting of one wave boundary layer hydrodynamics experiment and three sediment suspension experiments under linear waves and the Stokes second-order waves. It is shown that predictions of near-bed sediment suspension are very sensitive to the choices of the empirical formulas in turbulence schemes. Simple empirical turbulence schemes are possible to perform equally well as the two-equation k-ε model. Among the empirical schemes, the turbulence scheme, combining the exponential formula for eddy viscosity and Swart formula for wave friction factor, is the most accurate. It maintains the simplicity and yields identically good predictions as the k-ε model does in terms of the wave-averaged sediment concentration.
基金Supported by the National Grand Fundamental Research 973 Program of China (No.2007CB307100, No.2007CB 307102)
文摘The Counting Bloom Filter(CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set.This paper evaluates the performance of multiplicity queries of three simple CBF schemes-the Na?ve Counting Bloom Filter(NCBF), the Space-Code Bloom Filter(SCBF) and the d-left Counting Bloom Filter(dlCBF)-using metrics of space complexity and counting error under both uniform and zipfian multiplicity distributions.We compare their counting error under same space complexity, and their space complexity when similar counting errors are achieved respectively.Our results show that dlCBF is the best while SCBF is the worst in terms of both space-efficiency and accuracy.Furthermore, the performance gap between dlCBF and the others has a trend of being enlarged with the increment of space occupation or counting accuracy.
基金the National Natural Science Foundation of China(Grant Nos.61402058,61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encoded by using conjugate coding or orthogonal states,and all users are quantum participants.In this paper,a novel semi-quantum private comparison scheme is proposed,which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols,these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis fj0i;j1ig,and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further,analysis results show that this scheme can avoid outside and participant attacks and its’qubit efficiency is better than the other two protocols mentioned in the paper.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.