The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce t...The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.展开更多
In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interact...In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.展开更多
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P...Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.展开更多
The hybrid genetic algorithm is utilized to facilitate model parameter estimation.The tri-dimensional compression tests of soil are performed to supply experimental data for identifying nonlinear constitutive model of...The hybrid genetic algorithm is utilized to facilitate model parameter estimation.The tri-dimensional compression tests of soil are performed to supply experimental data for identifying nonlinear constitutive model of soil.In order to save computing time during parameter inversion,a new procedure to compute the calculated strains is presented by multi-linear simplification approach instead of finite element method(FEM).The real-coded hybrid genetic algorithm is developed by combining normal genetic algorithm with gradient-based optimization algorithm.The numerical and experimental results for conditioned soil are compared.The forecast strains based on identified nonlinear constitutive model of soil agree well with observed ones.The effectiveness and accuracy of proposed parameter estimation approach are validated.展开更多
A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line construc...A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication.展开更多
An integral connection exists among the mine production planning, the mined material destination, and the ultimate pit limit (UPL) in the mining engineering economy. This relation is reinforced by real information a...An integral connection exists among the mine production planning, the mined material destination, and the ultimate pit limit (UPL) in the mining engineering economy. This relation is reinforced by real information and the benefits it engenders in the mining economy. Hence, it is important to create optimizing algorithms to reduce the errors of economic calculations. In this work, a logical mathematical algorithm that considers the important designing parameters and the mining economy is proposed. This algorithm creates an optimizing repetitive process among different designing constituents and directs them into the maximum amount of the mine economical parameters. This process will produce the highest amount of ores and the highest degree of safety. The modeling produces a new relation between the concept of the cutoff grade, mine designing, and mine planning, and it provides the maximum benefit by calculating the destination of the ores. The proposed algorithm is evaluated in a real case study. The results show that the net present value of the mine production is increased by 3% compared to previous methods of production design and UPL.展开更多
The Circle algorithm was proposed for large datasets.The idea of the algorithm is to find a set of vertices that are close to each other and far from other vertices.This algorithm makes use of the connection between c...The Circle algorithm was proposed for large datasets.The idea of the algorithm is to find a set of vertices that are close to each other and far from other vertices.This algorithm makes use of the connection between clustering aggregation and the problem of correlation clustering.The best deterministic approximation algorithm was provided for the variation of the correlation of clustering problem,and showed how sampling can be used to scale the algorithms for large datasets.An extensive empirical evaluation was given for the usefulness of the problem and the solutions.The results show that this method achieves more than 50% reduction in the running time without sacrificing the quality of the clustering.展开更多
This study aims to predict ground surface settlement due to shallow tunneling and introduce the most affecting parameters on this phenomenon.Based on data collected from Shanghai LRT Line 2 project undertaken by TBM-E...This study aims to predict ground surface settlement due to shallow tunneling and introduce the most affecting parameters on this phenomenon.Based on data collected from Shanghai LRT Line 2 project undertaken by TBM-EPB method,this research has considered the tunnel's geometric,strength,and operational factors as the dependent variables.At first,multiple regression(MR) method was used to propose equations based on various parameters.The results indicated the dependency of surface settlement on many parameters so that the interactions among different parameters make it impossible to use MR method as it leads to equations of poor accuracy.As such,adaptive neuro-fuzzy inference system(ANFIS),was used to evaluate its capabilities in terms of predicting surface settlement.Among generated ANFIS models,the model with all input parameters considered produced the best prediction,so as its associated R^2 in the test phase was obtained to be 0.957.The equations and models in which operational factors were taken into consideration gave better prediction results indicating larger relative effect of such factors.For sensitivity analysis of ANFIS model,cosine amplitude method(CAM) was employed; among other dependent variables,fill factor of grouting(n) and grouting pressure(P) were identified as the most affecting parameters.展开更多
The similarity computations for fuzzy membership function pairs were carried out.Fuzzy number related knowledge was introduced,and conventional similarity was compared with distance based similarity measure.The useful...The similarity computations for fuzzy membership function pairs were carried out.Fuzzy number related knowledge was introduced,and conventional similarity was compared with distance based similarity measure.The usefulness of the proposed similarity measure was verified.The results show that the proposed similarity measure could be applied to ordinary fuzzy membership functions,though it was not easy to design.Through conventional results on the calculation of similarity for fuzzy membership pair,fuzzy membership-crisp pair and crisp-crisp pair were carried out.The proposed distance based similarity measure represented rational performance with the heuristic point of view.Furthermore,troublesome in fuzzy number based similarity measure for abnormal universe of discourse case was discussed.Finally,the similarity measure computation for various membership function pairs was discussed with other conventional results.展开更多
基金National Natural Science Foundation of China(12161013)Research Projects of Guizhou University of Commerce in 2024。
文摘The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.
文摘In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.
基金National Natural Science Foundation of China(62472397)Innovation Program for Quantum Science and Technology(2021ZD0302902)。
文摘Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.
基金Project(2007CB714006) supported by the National Basic Research Program of China Project(90815023) supported by the National Natural Science Foundation of China
文摘The hybrid genetic algorithm is utilized to facilitate model parameter estimation.The tri-dimensional compression tests of soil are performed to supply experimental data for identifying nonlinear constitutive model of soil.In order to save computing time during parameter inversion,a new procedure to compute the calculated strains is presented by multi-linear simplification approach instead of finite element method(FEM).The real-coded hybrid genetic algorithm is developed by combining normal genetic algorithm with gradient-based optimization algorithm.The numerical and experimental results for conditioned soil are compared.The forecast strains based on identified nonlinear constitutive model of soil agree well with observed ones.The effectiveness and accuracy of proposed parameter estimation approach are validated.
文摘A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication.
文摘An integral connection exists among the mine production planning, the mined material destination, and the ultimate pit limit (UPL) in the mining engineering economy. This relation is reinforced by real information and the benefits it engenders in the mining economy. Hence, it is important to create optimizing algorithms to reduce the errors of economic calculations. In this work, a logical mathematical algorithm that considers the important designing parameters and the mining economy is proposed. This algorithm creates an optimizing repetitive process among different designing constituents and directs them into the maximum amount of the mine economical parameters. This process will produce the highest amount of ores and the highest degree of safety. The modeling produces a new relation between the concept of the cutoff grade, mine designing, and mine planning, and it provides the maximum benefit by calculating the destination of the ores. The proposed algorithm is evaluated in a real case study. The results show that the net present value of the mine production is increased by 3% compared to previous methods of production design and UPL.
基金Projects(60873265,60903222) supported by the National Natural Science Foundation of China Project(IRT0661) supported by the Program for Changjiang Scholars and Innovative Research Team in University of China
文摘The Circle algorithm was proposed for large datasets.The idea of the algorithm is to find a set of vertices that are close to each other and far from other vertices.This algorithm makes use of the connection between clustering aggregation and the problem of correlation clustering.The best deterministic approximation algorithm was provided for the variation of the correlation of clustering problem,and showed how sampling can be used to scale the algorithms for large datasets.An extensive empirical evaluation was given for the usefulness of the problem and the solutions.The results show that this method achieves more than 50% reduction in the running time without sacrificing the quality of the clustering.
文摘This study aims to predict ground surface settlement due to shallow tunneling and introduce the most affecting parameters on this phenomenon.Based on data collected from Shanghai LRT Line 2 project undertaken by TBM-EPB method,this research has considered the tunnel's geometric,strength,and operational factors as the dependent variables.At first,multiple regression(MR) method was used to propose equations based on various parameters.The results indicated the dependency of surface settlement on many parameters so that the interactions among different parameters make it impossible to use MR method as it leads to equations of poor accuracy.As such,adaptive neuro-fuzzy inference system(ANFIS),was used to evaluate its capabilities in terms of predicting surface settlement.Among generated ANFIS models,the model with all input parameters considered produced the best prediction,so as its associated R^2 in the test phase was obtained to be 0.957.The equations and models in which operational factors were taken into consideration gave better prediction results indicating larger relative effect of such factors.For sensitivity analysis of ANFIS model,cosine amplitude method(CAM) was employed; among other dependent variables,fill factor of grouting(n) and grouting pressure(P) were identified as the most affecting parameters.
基金Project(2010-0020163) supported by Priority Research Centers Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education,Science and Technology
文摘The similarity computations for fuzzy membership function pairs were carried out.Fuzzy number related knowledge was introduced,and conventional similarity was compared with distance based similarity measure.The usefulness of the proposed similarity measure was verified.The results show that the proposed similarity measure could be applied to ordinary fuzzy membership functions,though it was not easy to design.Through conventional results on the calculation of similarity for fuzzy membership pair,fuzzy membership-crisp pair and crisp-crisp pair were carried out.The proposed distance based similarity measure represented rational performance with the heuristic point of view.Furthermore,troublesome in fuzzy number based similarity measure for abnormal universe of discourse case was discussed.Finally,the similarity measure computation for various membership function pairs was discussed with other conventional results.