- Cryptography and Data Security
- Cryptographic Implementations and Security
- Higher Education and Teaching Methods
- Privacy-Preserving Technologies in Data
- Synthesis and Properties of Aromatic Compounds
- Second Language Learning and Teaching
- EFL/ESL Teaching and Learning
- Geometric and Algebraic Topology
- Cloud Data Security Solutions
- Polynomial and algebraic computation
- Innovative Educational Techniques
- Inflammatory Biomarkers in Disease Prognosis
- Science Education and Pedagogy
- Rough Sets and Fuzzy Logic
- Complexity and Algorithms in Graphs
- Geology and Paleoclimatology Research
- Advanced Computational Techniques and Applications
- Educational Technology and Pedagogy
- Ideological and Political Education
- Environmental Changes in China
- Delphi Technique in Research
- Ferrocene Chemistry and Applications
- Stochastic Gradient Optimization Techniques
- Cloud Computing and Remote Desktop Technologies
- Learning Styles and Cognitive Differences
Shaanxi University of Science and Technology
2018-2024
Shaanxi Normal University
2003-2024
Chinese Academy of Sciences
2018-2019
Institute of Information Engineering
2018
Shenyang Jianzhu University
2018
Hunan University
2018
Leshan Normal University
2017
Jiamusi University
2007
Synthesis of buckybowls have stayed highly challenging due to the large structural strain caused by curved π surface. In this paper, we report synthesis and properties two trichalcogenasupersumanenes which three chalcogen (sulfur or selenium) atoms methylene groups bridge at bay regions hexa-peri-hexabenzocoronene. These are synthesized quickly in steps using an Aldol cyclotrimerization, a Scholl oxidative cyclization, Stille type reaction. X-ray crystallography analysis reveals that they...
An N-fold Darboux transformation with multi-parameters for the famous Belov—Chaltikian lattice is derived aid of gauge between corresponding discrete 3 × matrix spectra. By using and reduction technique, new multi-soliton solutions lattice, which are proved to be solitary features, given in exponential form.
An improved signature model of multivariate polynomial public key cryptosystem to resist the recovery attack is presented in this paper. Two pairs keys are added design new authentication conditionals for keys, and then verification not only verify original external information but also exact internal kernel information. It requires both corresponding private node produce an accurate signature, so that a forged by cannot pass without key. To illustrate this, classic HFE (Hidden Fields...
Leakage of private information has become a threat to the security computing systems. It common requirement that cryptography scheme should withstand various leakage attacks, even continuous attacks. However, in current constructions on (continuous) leakage-resilient identity-based encryption (CLR-IBE) scheme, parameter is fixed value. Aiming solve these problems, this study, authors show how construct CLR-IBE and adaptive chosen-ciphertext attacks proposed construction can be proved...
251 senior middle school (Grade 11) students were tested on the Chinese Group Embedded Figures Test and Dynamic Problems Test. A 2 (cognitive style) × (sex) analysis of variance indicated a nonsignificant effect with respect to cognitive style in solving easier Dynamics problems but main significant complex problems. Multiple comparisons (post hoc t tests) that is factor among boys not girls. The difference between Field-independent Field-dependent may be former more easily form clear map...
Science teachers play a crucial role in the science education system, significantly influencing development of students. However, existing research highlights issues such as wide age span and uneven quality among teachers, which undermines effectiveness education. In addition, can be ambiguously defined, leading to confusion about their responsibilities. To better understand current situation future trend on China overseas, this study compares analyses total 30 documents Chinese or English....
Learning sciences competence refers to a necessary professional for educators, which is manifested in their deep understanding of learning knowledge, positive attitudes, and scientific thinking skills conducting teaching practice research. It paramount importance doctoral students education develop the field sciences. This will enhance abilities teach conduct research, guide educational research toward greater sustainability. In order address shortcomings current assessment instruments, we...
Among post-quantum alternatives, latticebased cryptography is the most promising one, due to its simple operations, reduction from aver-age-case worstcase hardness, and supporting of rich functionalities. Ring signature enables a user sign anonymously on behalf an adaptively chosen group, has multiple applications in anonymous e-voting, authentication, whistle blowing etc. However, lattice-based ring schemes were constructed random oracle model lattice basis delegation they suffer large...
Effectively carrying out practice teaching based on the cultivation of innovative and entrepreneurial ability is helpful to concretize abstract theoretical knowledge, also great value stimulate students' interest in learning improve their comprehensive ability. At present, embedded system closely related development many emerging industries. Therefore, order ensure effect system, it necessary strengthen analysis
The method of document metrology and content analysis are applied in preschool education informatization research.The study shows that, from the publication age distribution, authors backgrounds, publishing institutions research content, overall level is going up but not enough depth.High-level research-group, typical model instruction to urge needed.
Cloud computing provides a new, attractive paradigm for the effective sharing of storage and resources among global consumers. More more enterprises have begun to enter field cloud storing data in facilitate users. However, many cases, users may be concerned about privacy, trust, integrity. It is challenging provide services without sacrificing these security requirements. In this paper, scheme reliable, secure, privacy protection based on general access structure introduced. The proposed...
In essence, the English teaching process in colleges and universities is a learning of foreign language culture.Teachers just use this to penetrate humanistic education into integrate with it, so as help students improve their quality.Given this, paper first gives statement onto internal relations between & spiritual education.Based on special historical background China at present, discusses new requirements times for Chinese universities.Moreover, an analysis made relevant causes...
Since the original signature model did not account for possible threat of forging attack, majority existing multivariate polynomial public key based schemes are at risk signatures by equivalent attacks. In this research, an enhanced model, Triple Unlocking Mechanism (TUM), is provided to resist all possibility that generated keys. The additional keys in sake enhancing security verifying internal unit information scheme after three designed unlocking operations. As a result, can only be user...
The application-oriented development of local institutions has become a trend. Business English, with its “compound and cross-disciplinary” characteristics the economy have put forward higher requirements for business English teachers in institutions. This paper surveys analyzes current situation bottleneck China, puts path from four aspects. It aims to provide reference construction teaching faculty discipline.