In order to realize the sustainable development of society, building energy consumption has become a global concern.In buildings, occupants adaptive behaviors that means how to use the buildings have an very important influence on the building energy use.The researches of occupants adaptive behaviors have been carried out for more than 30 years in Europe, including England, Switzerland, Denmark and so on.In past 10 years, many Chinese scholars also started to study on this field.This paper reviewed the articles of occupants adaptive behaviors in china and summerized the current development situations then discussed the proper development direction in the future that can give some advises and references for the future study.
With the increased real-world deployment of quantum computers, there is a security need to be able to fingerprint and track their equipment. This work proposes that cryogenic equipment used in superconducting qubit quantum computers could leverage inexpensive SRAM-based PUFs as fingerprints. This work is the first to perform a security evaluation of SRAM PUFs under cryogenic conditions using liquid nitrogen to rapidly freeze the memories to temperatures approaching -195C (-320F or 77K). This work demonstrates that SRAM PUFs can become more stable under cryogenic conditions. As a result, a possible novel application of the SRAM PUFs is to identify and track quantum computer cryogenic hardware. Other means of fingerprinting quantum computer equipment are also possible, for example, based on the frequency of qubits. The ability to fingerprint quantum computers can be on one hand beneficial, to track the equipment, but on the other detrimental as attackers with access to the fingerprints could identify specific machines. Understanding the benefits and dangers of fingerprinting quantum computers, and securely deploying fingerprinting mechanisms is necessary to protect these emerging computing platforms.
The optimization of composite manufacturing process is an important means for improving mechanical properties of natural fiber composites. In this paper, ramie fiber fabrics were, respectively, modified by NaOH, KMnO 4 , and ammonium polyphosphate flame retardant, and then ramie fabric/epoxy resin composite laminates were prepared using vacuum-assisted resin infusion molding. In order to increase ramie fiber content in composite, vacuum pressure compaction and hot compaction with high pressure and temperature were, respectively, used to compress the fabric stack before molding. The effects of precompaction process on fiber compaction and mechanical properties of ramie fiber yarns and composites were studied. The comparison with the ramie fiber fabric without surface treatment was also done. It is found that surface-treated ramie fiber fabric has lower compressibility than the untreated one. Moreover, hot compaction with suitable conditions is effective in increasing fiber content and mechanical properties of all studied ramie fabric composites.
The ability for users to access quantum computers through the cloud has increased rapidly in recent years. Despite still being Noisy Intermediate-Scale Quantum (NISQ) machines, modern quantum computers are now being actively employed for research and by numerous startups. Quantum algorithms typically produce probabilistic results, necessitating repeated execution to produce the desired outcomes. In order for the execution to begin from the specified ground state each time and for the results of the prior execution not to interfere with the results of the subsequent execution, the reset mechanism must be performed between each iteration to effectively reset the qubits. However, due to noise and errors in quantum computers and specifically these reset mechanisms, a noisy reset operation may lead to systematic errors in the overall computation, as well as potential security and privacy vulnerabilities of information leakage. To counter this issue, we thoroughly examine the state leakage problem in quantum computing, and then propose a solution by employing the classical and quantum one-time pads before the reset mechanism to prevent the state leakage, which works by randomly applying simple gates for each execution of the circuit. In addition, this work explores conditions under which the classical one-time pad, which uses fewer resources, is sufficient to protect state leakage. Finally, we study the role of various errors in state leakage, by evaluating the degrees of leakage under different error levels of gate, measurement, and sampling errors. Our findings offer new perspectives on the design of reset mechanisms and secure quantum computing systems.
Anthropogenic activities can greatly affect the ecological environment. As an ecological protection area, it is necessary to scientifically evaluate the landscape ecological risk (LER) in the Dongjiangyuan region to provide scientific guidance for regional sustainable development. In this study, the LER was calculated, and the spatial and temporal characteristics of the LER from 1985 to 2020 were analysed using geospatial techniques. The results show that the proportion of low-risk and extremely low-risk areas increased from 87.65% to 94.26% during the 1985-2020 period. The extremely high-risk and high-risk areas had a decreasing trend, and the extremely high-risk areas were concentrated in areas with impervious surfaces and croplands. The rate of risk was negative, especially in south-eastern Xunwu County, southern Dingnan County and central Anyuan County, indicating that the ecological risk has been greatly improved. The LER centre gradually migrated to the geometric centre of the study area. However, the gravity centre of extremely high risk and high risk remained in Xunwu County. The spatial agglomeration of LER changed significantly, and the overall difference between cold areas and hot areas decreased. The hot spot areas in the Dongjiangyuan region are key areas for ecological governance in the future.
Researchers are today exploring models for cloud-based usage of quantum computers where multi-tenancy can be used to share quantum computer hard-ware among multiple users. Multi-tenancy has a promise of allowing better utilization of the quantum computer hardware, but also opens up the quantum computer to new types of security attacks. As this and other recent research shows, it is possible to perform a fault injection attack using crosstalk on quantum computers when a victim and attacker circuits are instantiated as co-tenants on the same quantum computer. To ensure such attacks do not happen, this paper proposes that new techniques should be developed to help catch malicious circuits before they are loaded onto quantum computer hardware. Following ideas from classical computers, a compile-time technique can be designed to scan quantum computer programs for mali-cious or suspicious code patterns before they are compiled into quantum circuits that run on a quantum computer. This paper presents ongoing work which demonstrates how crosstalk can affect Grover's algorithm, and then presents suggestions of how quantum programs could be analyzed to catch circuits that generate large amounts of crosstalk with malicious intent.
The rapidly growing interest in quantum computing also increases the importance of securing these computers from various physical attacks. Constantly increasing qubit counts and improvements to the fidelity of the quantum computers hold great promise for the ability of these computers to run novel algorithms with highly sensitive intellectual property. However, in today's cloud-based quantum computer setting, users lack physical control over the computers. Physical attacks, such as those perpetrated by malicious insiders in data centers, could be used to extract sensitive information about the circuits being executed on these computers. This work shows the first exploration and study of power-based side-channel attacks in quantum computers. The explored attacks could be used to recover information about the control pulses sent to these computers. By analyzing these control pulses, attackers can reverse-engineer the equivalent gate-level description of the circuits, and the algorithms being run, or data hard-coded into the circuits. This work introduces five new types of attacks, and evaluates them using control pulse information available from cloud-based quantum computers. This work demonstrates how and what circuits could be recovered, and then in turn how to defend from the newly demonstrated side-channel attacks on quantum computing systems.
We present the first architecture for a trusted execution environment for quantum computers. In the architecture, to protect the user's circuits, they are obfuscated with decoy control pulses added during circuit transpilation by the user. The decoy pulses are removed, i.e. attenuated, by the trusted hardware inside the superconducting quantum computer's fridge before they reach the qubits. This preliminary work demonstrates that protection from possibly malicious cloud providers is feasible with minimal hardware cost.