Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferr...Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferrimagnetic ferritin(MFtn-Ce6)has been constructed to address the challenge of unexpected leakage that often occurs during small-molecule drug delivery.Introduction:PDT is one of the most promising approaches for tumor treatment,while a delivery system is typically required for hydrophobic photosensitizers.However,the nonspecific distribution and leakage of photosensitizers could lead to insufficient drug accumulation in tumor sites.Methods:An engineered ferritin was generated for site-specific conjugation of Ce6 to obtain a leaking-proof delivery system,and a ferrimagnetic core was biomineralized in the cavity of ferritin,resulting in a fluorescent ferrimagnetic ferritin nanoplatform(MFtn-Ce6).The distribution and tumor targeting of MFtn-Ce6 can be detected by magnetic resonance imaging(MRI)and fluorescence imaging(FLI).Results:MFtn-Ce6 showed effective dual-modality MRI and FLI.A prolonged in vivo circulation and increased tumor accumulation and retention of photosensitizer was observed.The time-dependent distribution of MFtn-Ce6 can be precisely tracked in real time to find the optimal time window for PDT treatment.The colocalization of ferritin and the iron oxide core confirms the high stability of the nanoplatform in vivo.The results showed that mice treated with MFtn-Ce6 exhibited marked tumor-suppressive activity after laser irradiation.Conclusion:The ferritin-based leaking-proof nanoplatform can be used for the efficient delivery of the photosensitizer to achieve an enhanced therapeutic effect.This method established a general approach for the dual-modality imagingguided tumor delivery of PDT agents.展开更多
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien...Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification.展开更多
This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An...This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true.展开更多
This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the correspo...This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question.展开更多
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ...Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times.展开更多
电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系...电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系统功能语法理论为指导,从语境、经验功能、人际功能着手解析电影《相助》片尾曲《The Living Proof》,以期丰富系统功能语法的研究内容,为电影歌词的分析提供新的视角,帮助观影者深度理解影片主题。展开更多
Environmental health incidents have occurred frequently in recent years;in China,however,litigation has not been effective in protecting the rights and interests of victims due to their heavy burden of proof.In order ...Environmental health incidents have occurred frequently in recent years;in China,however,litigation has not been effective in protecting the rights and interests of victims due to their heavy burden of proof.In order to mitigate the burden of proof for victims,the environmental judicature in China introduced the rule of inversion of burden of proof;this means that the victim only assumes the preliminary burden of proof,but in practice it has not been sufficient.Victims in environmental health litigation still face many difficulties in proving causality.Based on the statistical analysis of judicial big data,this paper demonstrates three dilemmas faced by victims.First,the preliminary burden of proof of causality has a high standard.Second,the victim's ability to produce evidence is low.Third,the casual relationship between pollution behaviors and health damage is difficult to identify.When examining the possible legal instruments,there are three aspects to the causes of these dilemmas:theory,judicial practice,and society.The theoretical aspect manifests as the differences between the rule of inversion of burden of proof and the presumption of causality;the practical aspect manifests as the lack of an identification system for personal injury;and the social aspect manifests as the victim's lack of economic,scientific,technological,and information resources,as well as the absence of assistance from government sectors and social organizations.Combining Chinese law with judicial practice,this paper proposes a solution to the dilemma of victims needing to prove causality in environmental health litigation.On the basis of clarifying the theoretical differences between the inversion of burden of proof and the presumption of causality,China should adhere to the rule of inversion of burden of proof,establish an identification system for personal injuries caused by environmental pollution,and use methods such as epidemiological causality,indirect counterevidence,and prima facie bewies.Furthermore,the full functions of the government and social organizations must be brought into play.This will not only help victims demonstrate causality,it can also help victims achieve equitable relief.展开更多
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ...The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.展开更多
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe...In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed.展开更多
The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ...The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ignition point, however, the shift of the content of Ce has much effect on ignition point. Increasing the Ce content, x from 0.15 to 0.25, the ignition point increases with increasing of Ce; however, x from 0.25 to 0.45, the ignition point decreases with increasing of Ce. By the addition of Ce of 0.25 %. the ignition point is raised by 43℃.展开更多
Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study...Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study Riemann function <img alt="" src="Edit_8fcdfff5-6b95-42a4-8f47-2cabe2723dfc.bmp" />, <img alt="" src="Edit_6ce3a4bd-4c68-49e5-aabe-dec3e904e282.bmp" />, <img alt="" src="Edit_29ea252e-a81e-4b21-a41c-09209c780bb2.bmp" /> by geometric analysis, which has the symmetry: v=0 if <i>β</i>=0, and basic expression <img alt="" src="Edit_bc7a883f-312d-44fd-bcdd-00f25c92f80a.bmp" />. We show that |u| is single peak in each root-interval <img alt="" src="Edit_d7ca54c7-4866-4419-a4bd-cbb808b365af.bmp" /> of <i>u</i> for fixed <em>β</em> ∈(0,1/2]. Using the slope u<sub>t</sub>, we prove that <i>v</i> has opposite signs at two end-points of I<sub>j</sub>. There surely exists an inner point such that , so {|u|,|v|/<em>β</em>} form a local peak-valley structure, and have positive lower bound <img alt="" src="Edit_bac1a5f6-673e-49b6-892c-5adff0141376.bmp" /> in I<sub>j</sub>. Because each <i>t</i> must lie in some I<sub>j</sub>, then ||<em>ξ</em>|| > 0 is valid for any <i>t</i> (<i>i.e.</i> RH is true). Using the positivity <img alt="" src="Edit_83c3d2cf-aa7e-4aba-89f5-0eb44659918a.bmp" /> of Lagarias (1999), we show the strict monotone <img alt="" src="Edit_87eb4e9e-bc7b-43e3-b316-5dcf0efaf0d5.bmp" /> for <i>β</i> > <i>β</i><sub>0</sub> ≥ 0 , and the peak-valley structure is equiva-lent to RH, which may be the geometric model expected by Bombieri (2000). This research follows Liuhui’s methodology: “Computing can detect the un-known and method”.</i>展开更多
The magnesium alloy is prone to burn during die-casting, which limits its applications severely, so the effect of adding rare earth (RE) on the ignition-proof of AZ91D Mg alloy is studied. The results indicate that ...The magnesium alloy is prone to burn during die-casting, which limits its applications severely, so the effect of adding rare earth (RE) on the ignition-proof of AZ91D Mg alloy is studied. The results indicate that the addition of mischmetal RE elements has a remarkable influence on the ignition-proof property of the magnesium alloy. It is found that the ignition temperature of the magnesium alloy can be greatly raised by adding a proper amount of RE. When the amount is 0.1wt%, the ignition temperature reaches 877℃ which is 206℃ higher than that of AZ91D without RE and the mechanical properties of the alloy are also improved, However, the amount of RE must be properly controlled because too much RE would induce grain coarsening and reduce the mechanical properties.展开更多
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ...Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme.展开更多
Theoretical analysis on ignition-proof of AZ91D alloy added with Ce was studied. The effect of Ce on burning temperature was investigated. The burning temperature increases with increasing Ce by insulation work at dif...Theoretical analysis on ignition-proof of AZ91D alloy added with Ce was studied. The effect of Ce on burning temperature was investigated. The burning temperature increases with increasing Ce by insulation work at different temperatures. The influence of Ce on maximum insulation work time was also studied. The maximum insulation work time increases with increasing Ce and decreases with the melting temperature. There is a tendency for Ce to concentrate on the surface of melti.ng AZ91D alloy. Ce will react with MgO and O2. The resultant will fill the cavity of MgO film to form multifilm. So the density of surface film of liquid Mg will increase to prevent burning.展开更多
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ...How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.展开更多
This study focused on the synergistic effect of alloying elements neodymium(Nd) and dysprosium(Dy) on the ignition-proof performance of AZ91D alloy. The ignition-proof mechanism of AZ91D-3 Nd-x Dy(x = 0.5, 1.0, 1.5, 2...This study focused on the synergistic effect of alloying elements neodymium(Nd) and dysprosium(Dy) on the ignition-proof performance of AZ91D alloy. The ignition-proof mechanism of AZ91D-3 Nd-x Dy(x = 0.5, 1.0, 1.5, 2.0 and 2.5 wt.%) alloy was discussed in depth through ignition-proof testing and microstructure observation. The results showed that the AZ91D-3 Nd-2 Dy alloy exhibited the highest ignition-point of 893 K, increased by 69 K as compared to the AZ91D alloy. The ignition-proof mechanism of Nd and Dy additions lay in three aspects:(1) the formation of denser oxide film consisting of Dy_2O_3 and MgO improves the oxidation resistance of the alloy,(2) the great reduction of the low melting-point phase β-Mg_(17)Al_(12), which leads to the decrease in the oxygen diffusion channels, and(3) the newly formed high melting-point phases(Al_2Nd and Al_2Dy), which block the oxygen diffusion channels and prevent the chemical reaction of Mg and oxygen.展开更多
基金This work was supported by the National Key R&D Program of China(2020YFA0710700 and 2017YFA0505400)the National Natural Science Foundation of China(52021002,21877103,22177109,and 32101121)+2 种基金Users with Excellence Program of Hefei Science Center CAS(2020HSC-UE016)the Fundamental Research Funds for the Central Universities(WK3450000007)Suzhou Scientific and Technological Project(SYG202017).
文摘Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferrimagnetic ferritin(MFtn-Ce6)has been constructed to address the challenge of unexpected leakage that often occurs during small-molecule drug delivery.Introduction:PDT is one of the most promising approaches for tumor treatment,while a delivery system is typically required for hydrophobic photosensitizers.However,the nonspecific distribution and leakage of photosensitizers could lead to insufficient drug accumulation in tumor sites.Methods:An engineered ferritin was generated for site-specific conjugation of Ce6 to obtain a leaking-proof delivery system,and a ferrimagnetic core was biomineralized in the cavity of ferritin,resulting in a fluorescent ferrimagnetic ferritin nanoplatform(MFtn-Ce6).The distribution and tumor targeting of MFtn-Ce6 can be detected by magnetic resonance imaging(MRI)and fluorescence imaging(FLI).Results:MFtn-Ce6 showed effective dual-modality MRI and FLI.A prolonged in vivo circulation and increased tumor accumulation and retention of photosensitizer was observed.The time-dependent distribution of MFtn-Ce6 can be precisely tracked in real time to find the optimal time window for PDT treatment.The colocalization of ferritin and the iron oxide core confirms the high stability of the nanoplatform in vivo.The results showed that mice treated with MFtn-Ce6 exhibited marked tumor-suppressive activity after laser irradiation.Conclusion:The ferritin-based leaking-proof nanoplatform can be used for the efficient delivery of the photosensitizer to achieve an enhanced therapeutic effect.This method established a general approach for the dual-modality imagingguided tumor delivery of PDT agents.
基金This work was supported by China’s National Natural Science Foundation(No.62072249,62072056).Jin Wang and Yongjun Ren received the grant and the URLs to sponsors’websites are https://www.nsfc.gov.cn/.This work was also funded by the Researchers Supporting Project No.(RSP-2021/102)King Saud University,Riyadh,Saudi Arabia.
文摘Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification.
文摘This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true.
基金by Dr Kemp from National Mathematics and Science College.
文摘This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question.
基金supported by the National High-Tech Research and Development Plan of China under Grant Nos.863-317-01- 04-99, 2009AA01Z122 (863)the Natural Science Foundation of Shenyang City of China under Grant No. F10-205-1-12
文摘Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times.
文摘电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系统功能语法理论为指导,从语境、经验功能、人际功能着手解析电影《相助》片尾曲《The Living Proof》,以期丰富系统功能语法的研究内容,为电影歌词的分析提供新的视角,帮助观影者深度理解影片主题。
文摘Environmental health incidents have occurred frequently in recent years;in China,however,litigation has not been effective in protecting the rights and interests of victims due to their heavy burden of proof.In order to mitigate the burden of proof for victims,the environmental judicature in China introduced the rule of inversion of burden of proof;this means that the victim only assumes the preliminary burden of proof,but in practice it has not been sufficient.Victims in environmental health litigation still face many difficulties in proving causality.Based on the statistical analysis of judicial big data,this paper demonstrates three dilemmas faced by victims.First,the preliminary burden of proof of causality has a high standard.Second,the victim's ability to produce evidence is low.Third,the casual relationship between pollution behaviors and health damage is difficult to identify.When examining the possible legal instruments,there are three aspects to the causes of these dilemmas:theory,judicial practice,and society.The theoretical aspect manifests as the differences between the rule of inversion of burden of proof and the presumption of causality;the practical aspect manifests as the lack of an identification system for personal injury;and the social aspect manifests as the victim's lack of economic,scientific,technological,and information resources,as well as the absence of assistance from government sectors and social organizations.Combining Chinese law with judicial practice,this paper proposes a solution to the dilemma of victims needing to prove causality in environmental health litigation.On the basis of clarifying the theoretical differences between the inversion of burden of proof and the presumption of causality,China should adhere to the rule of inversion of burden of proof,establish an identification system for personal injuries caused by environmental pollution,and use methods such as epidemiological causality,indirect counterevidence,and prima facie bewies.Furthermore,the full functions of the government and social organizations must be brought into play.This will not only help victims demonstrate causality,it can also help victims achieve equitable relief.
文摘The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.
文摘In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed.
文摘The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ignition point, however, the shift of the content of Ce has much effect on ignition point. Increasing the Ce content, x from 0.15 to 0.25, the ignition point increases with increasing of Ce; however, x from 0.25 to 0.45, the ignition point decreases with increasing of Ce. By the addition of Ce of 0.25 %. the ignition point is raised by 43℃.
文摘Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study Riemann function <img alt="" src="Edit_8fcdfff5-6b95-42a4-8f47-2cabe2723dfc.bmp" />, <img alt="" src="Edit_6ce3a4bd-4c68-49e5-aabe-dec3e904e282.bmp" />, <img alt="" src="Edit_29ea252e-a81e-4b21-a41c-09209c780bb2.bmp" /> by geometric analysis, which has the symmetry: v=0 if <i>β</i>=0, and basic expression <img alt="" src="Edit_bc7a883f-312d-44fd-bcdd-00f25c92f80a.bmp" />. We show that |u| is single peak in each root-interval <img alt="" src="Edit_d7ca54c7-4866-4419-a4bd-cbb808b365af.bmp" /> of <i>u</i> for fixed <em>β</em> ∈(0,1/2]. Using the slope u<sub>t</sub>, we prove that <i>v</i> has opposite signs at two end-points of I<sub>j</sub>. There surely exists an inner point such that , so {|u|,|v|/<em>β</em>} form a local peak-valley structure, and have positive lower bound <img alt="" src="Edit_bac1a5f6-673e-49b6-892c-5adff0141376.bmp" /> in I<sub>j</sub>. Because each <i>t</i> must lie in some I<sub>j</sub>, then ||<em>ξ</em>|| > 0 is valid for any <i>t</i> (<i>i.e.</i> RH is true). Using the positivity <img alt="" src="Edit_83c3d2cf-aa7e-4aba-89f5-0eb44659918a.bmp" /> of Lagarias (1999), we show the strict monotone <img alt="" src="Edit_87eb4e9e-bc7b-43e3-b316-5dcf0efaf0d5.bmp" /> for <i>β</i> > <i>β</i><sub>0</sub> ≥ 0 , and the peak-valley structure is equiva-lent to RH, which may be the geometric model expected by Bombieri (2000). This research follows Liuhui’s methodology: “Computing can detect the un-known and method”.</i>
文摘The magnesium alloy is prone to burn during die-casting, which limits its applications severely, so the effect of adding rare earth (RE) on the ignition-proof of AZ91D Mg alloy is studied. The results indicate that the addition of mischmetal RE elements has a remarkable influence on the ignition-proof property of the magnesium alloy. It is found that the ignition temperature of the magnesium alloy can be greatly raised by adding a proper amount of RE. When the amount is 0.1wt%, the ignition temperature reaches 877℃ which is 206℃ higher than that of AZ91D without RE and the mechanical properties of the alloy are also improved, However, the amount of RE must be properly controlled because too much RE would induce grain coarsening and reduce the mechanical properties.
基金National High Technical Research and Development Program of China(863 program)under Grant No. 2007AA01Z471
文摘Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme.
文摘Theoretical analysis on ignition-proof of AZ91D alloy added with Ce was studied. The effect of Ce on burning temperature was investigated. The burning temperature increases with increasing Ce by insulation work at different temperatures. The influence of Ce on maximum insulation work time was also studied. The maximum insulation work time increases with increasing Ce and decreases with the melting temperature. There is a tendency for Ce to concentrate on the surface of melti.ng AZ91D alloy. Ce will react with MgO and O2. The resultant will fill the cavity of MgO film to form multifilm. So the density of surface film of liquid Mg will increase to prevent burning.
基金partially supported by the Fundamental Research Funds for the Central Universities of China under Grant No.2015JBM034the China Scholarship Council Funds under File No.201407095023
文摘How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.
文摘This study focused on the synergistic effect of alloying elements neodymium(Nd) and dysprosium(Dy) on the ignition-proof performance of AZ91D alloy. The ignition-proof mechanism of AZ91D-3 Nd-x Dy(x = 0.5, 1.0, 1.5, 2.0 and 2.5 wt.%) alloy was discussed in depth through ignition-proof testing and microstructure observation. The results showed that the AZ91D-3 Nd-2 Dy alloy exhibited the highest ignition-point of 893 K, increased by 69 K as compared to the AZ91D alloy. The ignition-proof mechanism of Nd and Dy additions lay in three aspects:(1) the formation of denser oxide film consisting of Dy_2O_3 and MgO improves the oxidation resistance of the alloy,(2) the great reduction of the low melting-point phase β-Mg_(17)Al_(12), which leads to the decrease in the oxygen diffusion channels, and(3) the newly formed high melting-point phases(Al_2Nd and Al_2Dy), which block the oxygen diffusion channels and prevent the chemical reaction of Mg and oxygen.