In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s...In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests.展开更多
We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced tr...We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced transparency(CRIT) effect and the dipole-induced transparency(DIT) effect. It is found that the superposed transparency windows are consistently narrower than the CRIT and DIT transparency windows. Benefiting from the superposed transparency effect, the photonic Faraday rotation effect could be realized in the photonic molecule system, which is useful for entanglement generation and quantum information processing.展开更多
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an...With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be encrypted.In order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is designed.The algorithm first analyzes the medical image and distinguishes the color image from the gray image.For gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion algorithm.The color image is encrypted by cross-diffusion algorithm of double chaotic map.Security and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption time.It is suitable for medical image encryption of mobile devices with high real-time requirements.展开更多
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation...The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation approaches based on convolutional neural networks(CNNs)have achieved remarkable effectiveness.Here,we extend a retinal vessel segmentation model with low complexity and high performance based on U-Net,which is one of the most popular architectures.In view of the excellent work of depth-wise separable convolution,we introduce it to replace the standard convolutional layer.The complexity of the proposed model is reduced by decreasing the number of parameters and calculations required for themodel.To ensure performance while lowering redundant parameters,we integrate the pre-trained MobileNet V2 into the encoder.Then,a feature fusion residual module(FFRM)is designed to facilitate complementary strengths by enhancing the effective fusion between adjacent levels,which alleviates extraneous clutter introduced by direct fusion.Finally,we provide detailed comparisons between the proposed SepFE and U-Net in three retinal image mainstream datasets(DRIVE,STARE,and CHASEDB1).The results show that the number of SepFE parameters is only 3%of U-Net,the Flops are only 8%of U-Net,and better segmentation performance is obtained.The superiority of SepFE is further demonstrated through comparisons with other advanced methods.展开更多
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images.In this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face...The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images.In this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face swapping.The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint(cheek,mouth,eye,nose,etc.),which causes artifacts and makes the generated face silhouette non-realistic.To address this problem,a novel reinforced multi-aware attention module,referred to as RMAA,is proposed for handling facial fusion and expression occlusion flaws.The framework includes two stages.In the first stage,a novel attribute encoder is proposed to extract multiple levels of target face attributes and integrate identities and attributes when synthesizing swapped faces.In the second stage,a novel Stochastic Error Refinement(SRE)module is designed to solve the problem of facial occlusion,which is used to repair occlusion regions in a semi-supervised way without any post-processing.The proposed method is then compared with the current state-of-the-art methods.The obtained results demonstrate the qualitative and quantitative outperformance of the proposed method.More details are provided at the footnote link and at https://sites.google.com/view/fsa-net-official.展开更多
In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal mappings.Then we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients est...In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal mappings.Then we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Lipschitz characteristic and a linear measure distortion theorem of harmonic K-quasiconformal mappings.At last,we give some characterizations of the radial John disks with the help of pre-Schwarzian of harmonic mappings.展开更多
A lithium-sulfur(Li-S)system is an important candidate for future lithium-ion system due to its low cost and high specific theoretical capacity(1675 m Ah/g,2600 Wh/kg),which is greatly hindered by the poor conductivit...A lithium-sulfur(Li-S)system is an important candidate for future lithium-ion system due to its low cost and high specific theoretical capacity(1675 m Ah/g,2600 Wh/kg),which is greatly hindered by the poor conductivity of sulfur,large volume change and dissolution of lithium polysulfides.Two-dimensional(2D)materials with monolayers or few-layers usually have peculiar structures and physical/chemical properties,which can resolve the critical issues in Li-S batteries.Especially,the metal-based 2D nanomaterials,including ferrum,cobalt or other metal-based composites with various anions,can provide high conductivity,large surface area and abundant reaction sites for restraining the diffusion for lithium polysulfides.In this mini-review,we will present an overview of recent developments on metal-based 2D nanomaterials with various anions as the electrode materials for Li-S batteries.Since the main bottleneck for the Li-S system is the shuttle of polysulfides,emphasis is placed on the structure and components,physical/chemical interaction and interaction mechanisms of the 2D materials.Finally,the challenges and prospects of metal-based 2D nanomaterials for Li-S batteries are discussed and proposed.展开更多
Very recently,experimental evidence showed that the hydrogen is retained in dithiol-terminated single-molecule junction under the widely adopted preparation conditions,which is in contrast to the accepted view[Nat.Che...Very recently,experimental evidence showed that the hydrogen is retained in dithiol-terminated single-molecule junction under the widely adopted preparation conditions,which is in contrast to the accepted view[Nat.Chem.11351(2019)].However,the hydrogen is generally assumed to be lost in the previous physical models of single-molecule junctions.Whether the retention of the hydrogen at the gold-sulfur interface exerts a significant effect on the theoretical prediction of spin transport properties is an open question.Therefore,here in this paper we carry out a comparative study of spin transport in M-tetraphenylporphyrin-based(M=V,Cr,Mn,Fe,and Co;M-TPP)single-molecule junction through Au-SR and Au-S(H)R bondings.The results show that the hydrogen at the gold-sulfur interface may dramatically affect the spin-filtering efficiency of M-TPP-based single-molecule junction,depending on the type of transition metal ions embedded into porphyrin ring.Moreover,we find that for the Co-TPP-based molecular junction,the hydrogen at the gold-sulfur interface has no obvious effect on transmission at the Fermi level,but it has a significant effect on the spin-dependent transmission dip induced by the quantum interference on the occupied side.Thus the fate of hydrogen should be concerned in the physical model according to the actual preparation condition,which is important for our fundamental understanding of spin transport in the single-molecule junctions.Our work also provides guidance in how to experimentally identify the nature of gold-sulfur interface in the single-molecule junction with spin-polarized transport.展开更多
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatoria...Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatorial optimization problem,which is widely applied in communication networks,multimodal transportation networks,and data compression.Some approximation algorithms and heuristics algorithms have been proposed for the problem.Firefly algorithm is a new meta-heuristic algorithm.Because of its simplicity and easy implementation,it has been successfully applied in various fields.However,the basic firefly algorithm is not suitable for discrete problems.To this end,a novel discrete firefly algorithm for the MLST problem is proposed in this paper.A binary operation method to update firefly positions and a local feasible handling method are introduced,which correct unfeasible solutions,eliminate redundant labels,and make the algorithm more suitable for discrete problems.Computational results show that the algorithm has good performance.The algorithm can be extended to solve other discrete optimization problems.展开更多
In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In th...In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In this paper, we propose new circuit structures for PRINCE components by sharing and simplifying logic circuits, to achieve the goal of using a smaller number of logic gates to obtain the same result. Based on the new circuit structures of components and the best sharing among components,we propose three new hardware architectures for PRINCE. The architectures are simulated and synthesized on different programmable gate array devices. The results on Virtex-6 show that compared with existing architectures, the resource consumption of the unrolled, low-cost, and two-cycle architectures is reduced by 73, 119, and 380 slices, respectively. The low-cost architecture costs only 137 slices. The unrolled architecture costs 409 slices and has a throughput of 5.34 Gb/s. To our knowledge, for the hardware implementation of PRINCE, the new low-cost architecture sets new area records, and the new unrolled architecture sets new throughput records. Therefore, the newly proposed architectures are more resource-efficient and suitable for lightweight,latency-critical applications.展开更多
IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ...IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.展开更多
In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data...In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data processing consists of 28 rounds.The round function of SCENERY consists of 84×4 S-boxes in parallel and a 32× 32 binary matrix,and we can implement SCENERY with some basic logic instructions.The hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology,and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles 0118-bit microcontrollers and 364 clock cycles on 64-bit processors.Compared with other encryption algorithms,the performance of SCENERY is well balanced for both hardware and software.By the security analyses,SCENERY can achieve enough security margin against known attacks,such as differential cryptanalysis,linear cryptanalysis,impossible differential cryptanalysis and related-key attacks.展开更多
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have inv...There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have investigated the impact of the different models on attack results and the exact relationship between power consumption traces and intermediate values.Based on the convolutional neural network and the autoencoder,this paper proposes a Template Analysis Pre-trained DL Classification model named TAPDC which contains three sub-networks.The TAPDC model detects the periodicity of power trace,relating power to the intermediate values and mining the deeper features by the multi-layer convolutional net.We implement the TAPDC model and compare it with two classical models in a fair experiment.The evaluative results show that the TAPDC model with autoencoder and deep convolution feature extraction structure in SCA can more effectively extract information from power consumption trace.Also,Using the classifier layer,this model links power information to the probability of intermediate value.It completes the conversion from power trace to intermediate values and greatly improves the efficiency of the power attack.展开更多
Purpose-Isometric feature mapping(Isomap)is a very popular manifold learning method and is widely used in dimensionality reduction and data visualization.The most time-consuming step in Isomap is to compute the shorte...Purpose-Isometric feature mapping(Isomap)is a very popular manifold learning method and is widely used in dimensionality reduction and data visualization.The most time-consuming step in Isomap is to compute the shortest paths between all pairs of data points based on a neighbourhood graph.The classical Isomap(C-Isomap)is very slow,due to the use of Floyd’s algorithm to compute the shortest paths.The purpose of this paper is to speed up Isomap.Design/methodology/approach-Through theoretical analysis,it is found that the neighbourhood graph in Isomap is sparse.In this case,the Dijkstra’s algorithm with Fibonacci heap(Fib-Dij)is faster than Floyd’s algorithm.In this paper,an improved Isomap method based on Fib-Dij is proposed.By using Fib-Dij to replace Floyd’s algorithm,an improved Isomap method is presented in this paper.Findings-Using the S-curve,the Swiss-roll,the Frey face database,the mixed national institute of standards and technology database of handwritten digits and a face image database,the performance of the proposed method is compared with C-Isomap,showing the consistency with C-Isomap and marked improvements in terms of the high speed.Simulations also demonstrate that Fib-Dij reduces the computation time of the shortest paths from O(N3)to O(N2lgN).Research limitations/implications-Due to the limitations of the computer,the sizes of the data sets in this paper are all smaller than 3,000.Therefore,researchers are encouraged to test the proposed algorithm on larger data sets.Originality/value-The new method based on Fib-Dij can greatly improve the speed of Isomap.展开更多
基金funded by Hunan Provincial Natural Science Foundation of China with Grant Numbers(2022JJ50016,2023JJ50096)Innovation Platform Open Fund of Hengyang Normal University Grant 2021HSKFJJ039Hengyang Science and Technology Plan Guiding Project with Number 202222025902.
文摘In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11547258,11647129 and 11405052the Hunan Provincial Natural Science Foundation of China under Grant Nos 2018JJ3006,2017JJ3005 and 2016JJ3006+4 种基金the Scientific Research Fund of Hunan Provincial Education Department under Grant Nos 16B036 and 15A028the Science and Technology Plan Project of Hunan Province under Grant No 2016TP1020the Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University under Grant No IIPA18K08the Open Fund Project of the Hunan Provincial Applied Basic Research Base of Optoelectronic Information Technology under Grant No GD18K04the Open Fund Project of the Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of the Ministry of Education under Grant Nos QSQC1704 and QSQC1706
文摘We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced transparency(CRIT) effect and the dipole-induced transparency(DIT) effect. It is found that the superposed transparency windows are consistently narrower than the CRIT and DIT transparency windows. Benefiting from the superposed transparency effect, the photonic Faraday rotation effect could be realized in the photonic molecule system, which is useful for entanglement generation and quantum information processing.
基金This work is partly supported by the Scientific Research Fund of Hunan Provincial Education Department(19B082)the Science and Technology Development Center of the Ministry of Education-New Generation Information Technology Innovation Project(2018A02020)+4 种基金the research supported by Science Foundation of Hengyang Normal University(19QD12)the Science and Technology Innovation Program of Hunan Province(2016TP1020)the Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469)the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001)the Subject Group Construction Project of Hengyang Normal University(18XKQ02).
文摘With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be encrypted.In order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is designed.The algorithm first analyzes the medical image and distinguishes the color image from the gray image.For gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion algorithm.The color image is encrypted by cross-diffusion algorithm of double chaotic map.Security and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption time.It is suitable for medical image encryption of mobile devices with high real-time requirements.
基金supported by the Hunan Provincial Natural Science Foundation of China(2021JJ50074)the Scientific Research Fund of Hunan Provincial Education Department(19B082)+6 种基金the Science and Technology Development Center of the Ministry of Education-New Generation Information Technology Innovation Project(2018A02020)the Science Foundation of Hengyang Normal University(19QD12)the Science and Technology Plan Project of Hunan Province(2016TP1020)the Subject Group Construction Project of Hengyang Normal University(18XKQ02)theApplication Oriented SpecialDisciplines,Double First ClassUniversity Project of Hunan Province(Xiangjiaotong[2018]469)the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001)the First Class Undergraduate Major in Hunan Province Internet of Things Major(Xiangjiaotong[2020]248,No.288).
文摘The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation approaches based on convolutional neural networks(CNNs)have achieved remarkable effectiveness.Here,we extend a retinal vessel segmentation model with low complexity and high performance based on U-Net,which is one of the most popular architectures.In view of the excellent work of depth-wise separable convolution,we introduce it to replace the standard convolutional layer.The complexity of the proposed model is reduced by decreasing the number of parameters and calculations required for themodel.To ensure performance while lowering redundant parameters,we integrate the pre-trained MobileNet V2 into the encoder.Then,a feature fusion residual module(FFRM)is designed to facilitate complementary strengths by enhancing the effective fusion between adjacent levels,which alleviates extraneous clutter introduced by direct fusion.Finally,we provide detailed comparisons between the proposed SepFE and U-Net in three retinal image mainstream datasets(DRIVE,STARE,and CHASEDB1).The results show that the number of SepFE parameters is only 3%of U-Net,the Flops are only 8%of U-Net,and better segmentation performance is obtained.The superiority of SepFE is further demonstrated through comparisons with other advanced methods.
基金supported by the National Natural Science Foundation of China(No.61772179)the Hunan Provincial Natural Science Foundation of China(No.2020JJ4152,No.2022JJ50016)+2 种基金the science and technology innovation Program of Hunan Province(No.2016TP1020)the Scientific Research Fund of Hunan Provincial Education Department(No.21B0649)the Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469).
文摘The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images.In this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face swapping.The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint(cheek,mouth,eye,nose,etc.),which causes artifacts and makes the generated face silhouette non-realistic.To address this problem,a novel reinforced multi-aware attention module,referred to as RMAA,is proposed for handling facial fusion and expression occlusion flaws.The framework includes two stages.In the first stage,a novel attribute encoder is proposed to extract multiple levels of target face attributes and integrate identities and attributes when synthesizing swapped faces.In the second stage,a novel Stochastic Error Refinement(SRE)module is designed to solve the problem of facial occlusion,which is used to repair occlusion regions in a semi-supervised way without any post-processing.The proposed method is then compared with the current state-of-the-art methods.The obtained results demonstrate the qualitative and quantitative outperformance of the proposed method.More details are provided at the footnote link and at https://sites.google.com/view/fsa-net-official.
基金National Natural Science Foundation of China(Grant No.12071116)the Key Projects of Hunan Provincial Department of Education(Grant No.21A0429)+3 种基金the Discipline Special Research Projects of Hengyang Normal University(Grant No.XKZX21002)the Science and Technology Plan Project of Hunan Province(Grant No.2016TP1020)the Application-Oriented Characterized Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469)Mathematical Research Impact Centric Support(MATRICS)of the Department of Science and Technology(DST),India(MTR/2017/000367).
文摘In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal mappings.Then we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Lipschitz characteristic and a linear measure distortion theorem of harmonic K-quasiconformal mappings.At last,we give some characterizations of the radial John disks with the help of pre-Schwarzian of harmonic mappings.
基金supported by National Natural Science Foundation of China(No.52172197)the Joint Funds of the National Natural Science Foundation of China(No.U1865207)+5 种基金Science and Technology Innovation Platform(No.2018RS3070)Hundred Youth Talents Programs of Hunan ProvincePhD Start-up Foundation of Hengyang Normal University(No.19QD10)Scientific Research Fund of Hunan Provincial Education Department(No.20A062)the support from Hunan joint international laboratory of advanced materials and technology for clean energy(No.2020CB1007)the Science and Technology Innovation Program of Hunan Province(No.2016TP1020)。
文摘A lithium-sulfur(Li-S)system is an important candidate for future lithium-ion system due to its low cost and high specific theoretical capacity(1675 m Ah/g,2600 Wh/kg),which is greatly hindered by the poor conductivity of sulfur,large volume change and dissolution of lithium polysulfides.Two-dimensional(2D)materials with monolayers or few-layers usually have peculiar structures and physical/chemical properties,which can resolve the critical issues in Li-S batteries.Especially,the metal-based 2D nanomaterials,including ferrum,cobalt or other metal-based composites with various anions,can provide high conductivity,large surface area and abundant reaction sites for restraining the diffusion for lithium polysulfides.In this mini-review,we will present an overview of recent developments on metal-based 2D nanomaterials with various anions as the electrode materials for Li-S batteries.Since the main bottleneck for the Li-S system is the shuttle of polysulfides,emphasis is placed on the structure and components,physical/chemical interaction and interaction mechanisms of the 2D materials.Finally,the challenges and prospects of metal-based 2D nanomaterials for Li-S batteries are discussed and proposed.
基金the National Natural Science Foundation of China(Grant Nos.11674092,11804093,and 61764005)the Natural Science Foundation of Hunan Province,China(Grant No.2019JJ40006)+2 种基金the Scientific Research Fund of the Education Department of Hunan Province,China(Grant No.18B368)the Science and Technology Development Plan Project of Hengyang City,China(Grant No.2018KJ121)the Science and Technology Plan Project of Hunan Province,China(Grant No.2016TP1020).
文摘Very recently,experimental evidence showed that the hydrogen is retained in dithiol-terminated single-molecule junction under the widely adopted preparation conditions,which is in contrast to the accepted view[Nat.Chem.11351(2019)].However,the hydrogen is generally assumed to be lost in the previous physical models of single-molecule junctions.Whether the retention of the hydrogen at the gold-sulfur interface exerts a significant effect on the theoretical prediction of spin transport properties is an open question.Therefore,here in this paper we carry out a comparative study of spin transport in M-tetraphenylporphyrin-based(M=V,Cr,Mn,Fe,and Co;M-TPP)single-molecule junction through Au-SR and Au-S(H)R bondings.The results show that the hydrogen at the gold-sulfur interface may dramatically affect the spin-filtering efficiency of M-TPP-based single-molecule junction,depending on the type of transition metal ions embedded into porphyrin ring.Moreover,we find that for the Co-TPP-based molecular junction,the hydrogen at the gold-sulfur interface has no obvious effect on transmission at the Fermi level,but it has a significant effect on the spin-dependent transmission dip induced by the quantum interference on the occupied side.Thus the fate of hydrogen should be concerned in the physical model according to the actual preparation condition,which is important for our fundamental understanding of spin transport in the single-molecule junctions.Our work also provides guidance in how to experimentally identify the nature of gold-sulfur interface in the single-molecule junction with spin-polarized transport.
基金This work is supported by the National Natural Science Foundation of China under Grant 61772179the Hunan Provincial Natural Science Foundation of China under Grant 2019JJ40005+3 种基金the Science and Technology Plan Project of Hunan Province under Grant 2016TP1020the Double First-Class University Project of Hunan Province under Grant Xiangjiaotong[2018]469the Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University under Grant IIPA19K02the Science Foundation of Hengyang Normal University under Grant 19QD13.
文摘Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatorial optimization problem,which is widely applied in communication networks,multimodal transportation networks,and data compression.Some approximation algorithms and heuristics algorithms have been proposed for the problem.Firefly algorithm is a new meta-heuristic algorithm.Because of its simplicity and easy implementation,it has been successfully applied in various fields.However,the basic firefly algorithm is not suitable for discrete problems.To this end,a novel discrete firefly algorithm for the MLST problem is proposed in this paper.A binary operation method to update firefly positions and a local feasible handling method are introduced,which correct unfeasible solutions,eliminate redundant labels,and make the algorithm more suitable for discrete problems.Computational results show that the algorithm has good performance.The algorithm can be extended to solve other discrete optimization problems.
基金Project supported by the Scientific Research Fund of Hunan Provincial Education Department,China (Nos. 19A072 and 20C0268)the Science and Technology Innovation Program of Hunan Province,China (No. 2016TP1020)+2 种基金the Application-Oriented Special Disciplines,Double First-Class University Project of Hunan Province,China (No. Xiangjiaotong [2018] 469)the Scienceof Hengyang Normal University,China (No. 18D23)the Postgraduate Scientific Research Innovation Project of Hunan Province,China (No. CX20190980)。
文摘In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In this paper, we propose new circuit structures for PRINCE components by sharing and simplifying logic circuits, to achieve the goal of using a smaller number of logic gates to obtain the same result. Based on the new circuit structures of components and the best sharing among components,we propose three new hardware architectures for PRINCE. The architectures are simulated and synthesized on different programmable gate array devices. The results on Virtex-6 show that compared with existing architectures, the resource consumption of the unrolled, low-cost, and two-cycle architectures is reduced by 73, 119, and 380 slices, respectively. The low-cost architecture costs only 137 slices. The unrolled architecture costs 409 slices and has a throughput of 5.34 Gb/s. To our knowledge, for the hardware implementation of PRINCE, the new low-cost architecture sets new area records, and the new unrolled architecture sets new throughput records. Therefore, the newly proposed architectures are more resource-efficient and suitable for lightweight,latency-critical applications.
文摘IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.
基金This research was supported by the Scientific Research Fund of Hunan Provincial Education Department(19A072)Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469)the Science and Technology Plan Project of Hunan Province(2016TP1020).
文摘In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data processing consists of 28 rounds.The round function of SCENERY consists of 84×4 S-boxes in parallel and a 32× 32 binary matrix,and we can implement SCENERY with some basic logic instructions.The hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology,and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles 0118-bit microcontrollers and 364 clock cycles on 64-bit processors.Compared with other encryption algorithms,the performance of SCENERY is well balanced for both hardware and software.By the security analyses,SCENERY can achieve enough security margin against known attacks,such as differential cryptanalysis,linear cryptanalysis,impossible differential cryptanalysis and related-key attacks.
基金This research was supported by the National Natural Science Foundation of China(Grant No.61572174)Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001)+4 种基金Hunan Provincial Natural Science Foundation of China(2019JJ60004)the Scientific Research Fund of Hunan Provincial Education Department with(19A072)Subject group construction project of Hengyang Normal University(18XKQ02)Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469)the Science and Technology Plan Project of Hunan Province(2016TP1020).
文摘There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have investigated the impact of the different models on attack results and the exact relationship between power consumption traces and intermediate values.Based on the convolutional neural network and the autoencoder,this paper proposes a Template Analysis Pre-trained DL Classification model named TAPDC which contains three sub-networks.The TAPDC model detects the periodicity of power trace,relating power to the intermediate values and mining the deeper features by the multi-layer convolutional net.We implement the TAPDC model and compare it with two classical models in a fair experiment.The evaluative results show that the TAPDC model with autoencoder and deep convolution feature extraction structure in SCA can more effectively extract information from power consumption trace.Also,Using the classifier layer,this model links power information to the probability of intermediate value.It completes the conversion from power trace to intermediate values and greatly improves the efficiency of the power attack.
基金supported by the National Natural Science Foundation of China under Grant Nos 91220301,61273314 and 61175064.
文摘Purpose-Isometric feature mapping(Isomap)is a very popular manifold learning method and is widely used in dimensionality reduction and data visualization.The most time-consuming step in Isomap is to compute the shortest paths between all pairs of data points based on a neighbourhood graph.The classical Isomap(C-Isomap)is very slow,due to the use of Floyd’s algorithm to compute the shortest paths.The purpose of this paper is to speed up Isomap.Design/methodology/approach-Through theoretical analysis,it is found that the neighbourhood graph in Isomap is sparse.In this case,the Dijkstra’s algorithm with Fibonacci heap(Fib-Dij)is faster than Floyd’s algorithm.In this paper,an improved Isomap method based on Fib-Dij is proposed.By using Fib-Dij to replace Floyd’s algorithm,an improved Isomap method is presented in this paper.Findings-Using the S-curve,the Swiss-roll,the Frey face database,the mixed national institute of standards and technology database of handwritten digits and a face image database,the performance of the proposed method is compared with C-Isomap,showing the consistency with C-Isomap and marked improvements in terms of the high speed.Simulations also demonstrate that Fib-Dij reduces the computation time of the shortest paths from O(N3)to O(N2lgN).Research limitations/implications-Due to the limitations of the computer,the sizes of the data sets in this paper are all smaller than 3,000.Therefore,researchers are encouraged to test the proposed algorithm on larger data sets.Originality/value-The new method based on Fib-Dij can greatly improve the speed of Isomap.