期刊文献+
共找到90,839篇文章
< 1 2 250 >
每页显示 20 50 100
Construction scheme comparison with comprehensive evaluation of independent perspectives
1
作者 阎西康 王磊 CHEN Pei 《Journal of Chongqing University》 CAS 2013年第3期131-135,共5页
Considering both the characteristics of construction scheme evaluation and the lack of consideration of index proportionality after introducing comprehensive evaluation of independent perspectives into construction sc... Considering both the characteristics of construction scheme evaluation and the lack of consideration of index proportionality after introducing comprehensive evaluation of independent perspectives into construction scheme evaluation, a construction scheme evaluation model of independent perspectives was put forward through the study and optimization of comprehensive evaluation of independent perspectives. The feasibility and rationality of the optimized method were illustrated through a case study and the evaluation results were compared between the optimized method and non-optimized method. The optimized method has the practical value in construction scheme comparison. 展开更多
关键词 construction scheme evaluation model independent perspective comprehensive evaluation
下载PDF
Are the Methods of the Net Present Value Rate and Net Annual Value Rate the Effective Scheme Comparison Methods
2
作者 Guojie Zhao Gang Lu 《Chinese Business Review》 2005年第8期78-81,共4页
下载PDF
Analysis and Comparison of Slope-cutting Widening Schemes in Highway Reconstruction and Expansion Project Based on MIDAS Software
3
作者 Zhiqiang Qiu Yun Shi Lei Jiang 《Journal of Architectural Research and Development》 2024年第2期75-83,共9页
In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the m... In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the main contributor to the stability of the slope.Then,two widening schemes are proposed,which are the steep slope with strong support and the gentle slope with general support schemes.The static/slope module of MIDAS GTS finite element analysis software and the strength reduction method were used to compare the two schemes.The results show that the steep slope with a strong support scheme has obvious advantages in land requisition,environmental protection,and safety and is more suitable for reconstructing and expanding the highway slope. 展开更多
关键词 Highway reconstruction and expansion Slope excavation MIDAS GTS scheme selection
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
4
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Construction of a Computational Scheme for the Fuzzy HIV/AIDS Epidemic Model with a Nonlinear Saturated Incidence Rate
5
作者 Muhammad Shoaib Arif Kamaleldin Abodayeh Yasir Nawaz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1405-1425,共21页
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi... This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters. 展开更多
关键词 Epidemic model fuzzy rate parameters next generation matrix local stability proposed numerical scheme
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
6
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
Impacts of Water-Sediment Regulation Scheme on Chromophoric Dissolved Organic Matter in the Lower Yellow River
7
作者 LIU Xiao JIANG Xueyan +2 位作者 LIU Qian SUI Juanjuan ZOU Li 《Journal of Ocean University of China》 CAS CSCD 2024年第2期455-466,共12页
As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been c... As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment. 展开更多
关键词 chromophoric dissolved organic matter(CDOM) water-sediment regulation scheme(WSRS) Yellow River optical properties
下载PDF
Global Research Progress on Municipal Waste and Future Prospect Based on the Cross-national Comparisons
8
作者 ZHANG Yuxin LIU Xiaoqian +2 位作者 YAN Xiaoxia MA Sike MAO Weiyun 《Chinese Geographical Science》 SCIE CSCD 2024年第2期250-264,共15页
Due to the acceleration of urbanization,the municipal waste(MW)problem has transformed into a global challenge for urb-an sustainability.To elucidate historical trends,current focal points,and future directions in MW ... Due to the acceleration of urbanization,the municipal waste(MW)problem has transformed into a global challenge for urb-an sustainability.To elucidate historical trends,current focal points,and future directions in MW research,we conducted a bibliometric analysis and employed knowledge graph visualization to scrutinize a total of 34212 articles,which were published between 1991 and 2021 in the Web of Science(WoS)core database.The results indicated that current major research themes encompass waste classifica-tion and recycling,waste management and public behavior,waste disposal methods and technologies,as well as environmental impact and evaluation.There has been a shift in the research focus from the environmental impacts of waste incineration to sustainable manage-ment related issues.A comparison of research from six typical countries revealed the differences in research priorities and techniques advantages.Scholars from the USA and Britain initiated MW research earlier than other countries and investigated management issues in depth,such as public behavior and willingness to pay.Meanwhile,Japanese,German,and Swedish scholars conducted extensive studies on advanced waste treatment technologies,such as disposal and recycling,risk assessment,and waste-to-energy techniques.Chinese scholars placed particular emphasis on end-of-pipe treatments and their associated environmental impacts.Hotspots and poten-tial future frontiers were identified by burst detection analysis.Keywords with high value of burst index(BI)worldwide are food waste and circular economy.Chinese scholars have put great efforts on waste environmental impact and its recycling technologies,while we’re expecting to further investigating vulnerable population.Furthermore,this study contributes to bridging the regional gap of scientific research among different countries and fostering international collaboration. 展开更多
关键词 BIBLIOMETRICS municipal waste(MW) CiteSpace hotspot prediction burst index(BI) SUSTAINABILITY cross-national comparison Web of Science(WoS)
下载PDF
Crank-Nicolson Quasi-Compact Scheme for the Nonlinear Two-Sided Spatial Fractional Advection-Diffusion Equations
9
作者 Dechao Gao Zeshan Qiu +1 位作者 Lizan Wang Jianxin Li 《Journal of Applied Mathematics and Physics》 2024年第4期1089-1100,共12页
The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference oper... The higher-order numerical scheme of nonlinear advection-diffusion equations is studied in this article, where the space fractional derivatives are evaluated by using weighted and shifted Grünwald difference operators and combining the compact technique, in the time direction is discretized by the Crank-Nicolson method. Through the energy method, the stability and convergence of the numerical scheme in the sense of L<sub>2</sub>-norm are proved, and the convergence order is . Some examples are given to show that our numerical scheme is effective. 展开更多
关键词 Crank-Nicolson Quasi-Compact scheme Fractional Advection-Diffusion Equations NONLINEAR Stability and Convergence
下载PDF
NiMoO_(4)/ZnIn_(2)S_(4)S-scheme异质结的制备及光催化产氢性能增强机制 被引量:4
10
作者 李艳 李卓 刘恩周 《聊城大学学报(自然科学版)》 2023年第2期1-10,共10页
首先通过水热法制备得到NiMoO_(4)·x H_(2)O前驱体,再经高温煅烧得到NiMoO_(4)纳米棒,最后通过超声混合及溶剂蒸干处理将NiMoO_(4)与ZnIn_(2)S_(4)复合构建了NiMoO_(4)/ZnIn_(2)S_(4)S-scheme异质结光催化剂。研究结果表明,NiMoO_... 首先通过水热法制备得到NiMoO_(4)·x H_(2)O前驱体,再经高温煅烧得到NiMoO_(4)纳米棒,最后通过超声混合及溶剂蒸干处理将NiMoO_(4)与ZnIn_(2)S_(4)复合构建了NiMoO_(4)/ZnIn_(2)S_(4)S-scheme异质结光催化剂。研究结果表明,NiMoO_(4)质量分数为10.7%时,复合材料(10.7-NiMoO_(4)/ZnIn_(2)S_(4))具有较好的载流子分离效率,较低的界面电荷转移阻力和较大的电化学活性面积。在300 W氙灯照射下,其产氢速率可达29.04 mmol·g^(-1)·h^(-1),约为单体ZnIn_(2)S_(4)(5.58 mmol·g^(-1)·h^(-1))的5.20倍。自由基捕获实验及能带结构分析表明,NiMoO_(4)和ZnIn_(2)S_(4)之间形成了S-scheme电荷转移机制,不仅促进了载流子的分离与迁移,而且保留了较强的氧化还原能力。此外,NiMoO_(4)的引入提高了异质结的电化学活性面积,以上因素协同提高了体系的光催化析氢性能。 展开更多
关键词 NiMoO_(4) ZnIn_(2)S_(4) S-scheme异质结 光催化产氢
下载PDF
平“语”近人中课程思政元素comparison的应用及分析
11
作者 武悦 《海外英语》 2023年第13期85-87,共3页
文章的研究目的是理解平“语”近人中comparison(比喻)的用法,平“语”近人中课程思政的内容和其背后的真实含义具有重要的教育意义。文章以话语中课程思政元素的comparison主要例子作为研究对象,来探讨和研究平“语”近人话语中的关于c... 文章的研究目的是理解平“语”近人中comparison(比喻)的用法,平“语”近人中课程思政的内容和其背后的真实含义具有重要的教育意义。文章以话语中课程思政元素的comparison主要例子作为研究对象,来探讨和研究平“语”近人话语中的关于comparison的应用并且加以分析。 展开更多
关键词 平“语”近人 课程思政元素 comparison应用分析
下载PDF
Evaluation of the WDM6 scheme in the simulation of number concentrations and drop size distributions of warm-rain hydrometeors: comparisons with the observations and other schemes 被引量:1
12
作者 GUO Jiaxu LEI Hengchi +1 位作者 CHEN Di YANG Jiefan 《Atmospheric and Oceanic Science Letters》 CSCD 2019年第6期458-466,共9页
暖云粒子数浓度及粒子谱对微物理过程的模拟有着重要影响,不同于许多微物理方案,WDM6方案显示预报云滴数浓度。为评估其模拟效果,本文对比了WDM6方案与Thompson方案、Morrison方案在一次飞机观测试验中的模拟结果。结果表明:相比于观测... 暖云粒子数浓度及粒子谱对微物理过程的模拟有着重要影响,不同于许多微物理方案,WDM6方案显示预报云滴数浓度。为评估其模拟效果,本文对比了WDM6方案与Thompson方案、Morrison方案在一次飞机观测试验中的模拟结果。结果表明:相比于观测结果,WDM6方案模拟云(雨)滴数浓度偏小(大),云滴谱较宽,特别是对于层状云中上部的模拟偏差较大。尽管Thompson方案和Morrison方案将云滴数浓度设置为常数,但这两种方案的云滴数浓度及云滴谱却更接近于观测。对于WDM6方案初始云凝结核数目(CCN0)的敏感性试验表明,改变CCN0能够改进WDM6方案对于对流云的模拟,但对于层状云的模拟结果影响较小。 展开更多
关键词 WDM6 scheme暖云粒子数浓度 粒子谱 飞机观测 WDM6方案
下载PDF
Intercomparison of different physics schemes in the WRF model over the Asian summer monsoon region 被引量:2
13
作者 QUE Lin-Jing QUE Wei-Lun FENG Jin-Ming 《Atmospheric and Oceanic Science Letters》 CSCD 2016年第3期169-177,共9页
WRF模式对包含西太平洋、东印度洋和中国大陆的大区域气候模拟能力的提高对东亚夏季风气候的预测非常重要。本文的研究目的是找出合理的物理方案组合来模拟中国大陆、东印度洋和西太平洋这一特大区域的降水和温度。通过模拟2008年夏季... WRF模式对包含西太平洋、东印度洋和中国大陆的大区域气候模拟能力的提高对东亚夏季风气候的预测非常重要。本文的研究目的是找出合理的物理方案组合来模拟中国大陆、东印度洋和西太平洋这一特大区域的降水和温度。通过模拟2008年夏季气候并与观测进行对比分析,主要比较了Mellor–Yamada–Janjic(MYJ)和Yonsei University(YSU)边界层方案、WSM3和WSM5微物理过程方案、Betts–Miller–Janjic(BMJ)和Tiedtke积云参数化方案对这一区域的气候模拟结果。研究表明:各种物理方案的组合对于温度空间分布的模拟与观测类似;边界层方案的选择对降水影响较大,MYJ方案比YSU方案对降水的模拟效果要好;积云方案Tiedtke对雨带分布,特别是赤道辐合带(ITCZ)降水模拟更加合理。 展开更多
关键词 组WRF模式 降水 温度 边界层方案 微物理过程方案 积云参数化方案
下载PDF
A COMPARISON OF FOUR RECENT NUMERICAL SCHEMES GIViNG HIGH RESOLUTION OF SHOCK WAVE AND CONCENTRATED VORTEX
14
作者 黄敦 杨淳 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1994年第9期797-804,共8页
ACOMPARISONOFFOURRECENTNUMERICALSCHEMESGIViNGHIGHRESOLUTIONOFSHOCKWAVEANDCONCENTRATEDVORTEXHuangDun(黄敦)(Depa... ACOMPARISONOFFOURRECENTNUMERICALSCHEMESGIViNGHIGHRESOLUTIONOFSHOCKWAVEANDCONCENTRATEDVORTEXHuangDun(黄敦)(Depart.ofMath.PekingU... 展开更多
关键词 HIGH RESOLUTION schemeS shock WAVE reflection diffraction sharpcorner VORTEX generation
下载PDF
Lagrangian model of zooplankton dispersion:numerical schemes comparisons and parameter sensitivity tests 被引量:1
15
作者 丘仲锋 Andrea M.DOGLIOLI +1 位作者 何宜军 Francois CARLOTTI 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2011年第2期438-445,共8页
This paper presents two comparisons or tests for a Lagrangian model of zooplankton dispersion:numerical schemes and time steps.Firstly,we compared three numerical schemes using idealized circulations.Results show that... This paper presents two comparisons or tests for a Lagrangian model of zooplankton dispersion:numerical schemes and time steps.Firstly,we compared three numerical schemes using idealized circulations.Results show that the precisions of the advanced Adams-Bashfold-Moulton(ABM) method and the Runge-Kutta(RK) method were in the same order and both were much higher than that of the Euler method.Furthermore,the advanced ABM method is more efficient than the RK method in computational memory requirements and time consumption.We therefore chose the advanced ABM method as the Lagrangian particle-tracking algorithm.Secondly,we performed a sensitivity test for time steps,using outputs of the hydrodynamic model,Symphonie.Results show that the time step choices depend on the fluid response time that is related to the spatial resolution of velocity fields.The method introduced by Oliveira et al.in 2002 is suitable for choosing time steps of Lagrangian particle-tracking models,at least when only considering advection. 展开更多
关键词 拉格朗日模型 数值方法 浮游动物 敏感性试验 分散 时间消耗 粒子追踪 水动力模型
原文传递
Detecting Ethereum Ponzi Schemes Through Opcode Context Analysis and Oversampling-Based AdaBoost Algorithm 被引量:1
16
作者 Mengxiao Wang Jing Huang 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1023-1042,共20页
Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbase... Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbased methods are believed to be promising for detecting ethereum Ponzi schemes.However,there are still some flaws in current research,e.g.,insufficient feature extraction of Ponzi scheme smart contracts,without considering class imbalance.In addition,there is room for improvement in detection precision.Aiming at the above problems,this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting(AdaBoost)algorithm.Firstly,this paper uses the n-gram algorithm to extract more comprehensive contract opcode features and combine them with contract account features,which helps to improve the feature extraction effect.Meanwhile,adaptive synthetic sampling(ADASYN)is introduced to deal with class imbalanced data,and integrated with the Adaboost classifier.Finally,this paper uses the improved AdaBoost classifier for the identification of Ponzi scheme contracts.Experimentally,this paper tests our model in real-world smart contracts and compares it with representative methods in the aspect of F1-score and precision.Moreover,this article compares and discusses the state of art methods with our method in four aspects:data acquisition,data preprocessing,feature extraction,and classifier design.Both experiment and discussion validate the effectiveness of our model. 展开更多
关键词 Blockchain smart Ponzi scheme N-GRAM OVERSAMPLING ensemble learning
下载PDF
Comparison of Turbulence Schemes for Prediction of Wave-Induced Near-Bed Sediment Suspension Above A Plane Bed 被引量:1
17
作者 张弛 郑金海 +3 位作者 王义刚 张勐韬 郑东生 张继生 《China Ocean Engineering》 SCIE EI 2011年第3期395-412,共18页
Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves abov... Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves above a plane bed. These turbulence algorithms include six empirical eddy viscosity schemes and one standard two-equation k-ε model. In particular, different combinations of typical empirical formulas for the eddy viscosity profile and for the wave friction factor are examined. Numerical results are compared with four laboratory data sets, consisting of one wave boundary layer hydrodynamics experiment and three sediment suspension experiments under linear waves and the Stokes second-order waves. It is shown that predictions of near-bed sediment suspension are very sensitive to the choices of the empirical formulas in turbulence schemes. Simple empirical turbulence schemes are possible to perform equally well as the two-equation k-ε model. Among the empirical schemes, the turbulence scheme, combining the exponential formula for eddy viscosity and Swart formula for wave friction factor, is the most accurate. It maintains the simplicity and yields identically good predictions as the k-ε model does in terms of the wave-averaged sediment concentration. 展开更多
关键词 悬浮床 预测 平面 波浪 对流扩散模型 湍流 底泥 诱导
下载PDF
PERFORMANCE EVALUATION AND COMPARISON OF THREE COUNTING BLOOM FILTER SCHEMES 被引量:1
18
作者 Zhang Jin Wu Jiang-xing Lan Julong Liu Jianqiang 《Journal of Electronics(China)》 2009年第3期332-340,共9页
The Counting Bloom Filter(CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set.This paper evaluates the performance of mul... The Counting Bloom Filter(CBF) is a kind of space-efficient data structure that extends a Bloom filter so as to allow approximate multiplicity queries on a dynamic multi-set.This paper evaluates the performance of multiplicity queries of three simple CBF schemes-the Na?ve Counting Bloom Filter(NCBF), the Space-Code Bloom Filter(SCBF) and the d-left Counting Bloom Filter(dlCBF)-using metrics of space complexity and counting error under both uniform and zipfian multiplicity distributions.We compare their counting error under same space complexity, and their space complexity when similar counting errors are achieved respectively.Our results show that dlCBF is the best while SCBF is the worst in terms of both space-efficiency and accuracy.Furthermore, the performance gap between dlCBF and the others has a trend of being enlarged with the increment of space occupation or counting accuracy. 展开更多
关键词 性能评价 过滤器 计数 空间复杂性 空间数据 多重查询 多重数分布 数据结构
下载PDF
A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States
19
作者 Yuhua Sun Lili Yan +2 位作者 Zhibin Sun Shibin Zhang Jiazhong Lu 《Computers, Materials & Continua》 SCIE EI 2021年第3期2385-2395,共11页
Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encode... Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encoded by using conjugate coding or orthogonal states,and all users are quantum participants.In this paper,a novel semi-quantum private comparison scheme is proposed,which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols,these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis fj0i;j1ig,and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further,analysis results show that this scheme can avoid outside and participant attacks and its’qubit efficiency is better than the other two protocols mentioned in the paper. 展开更多
关键词 CRYPTOGRAPHY Bell entangled states a semi-honest TP security analysis semi-quantum private comparison
下载PDF
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States
20
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 Quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部