Logo

The 2nd INS-ZY Student Forum

Introduction

Most of the INS and Zhiyuan students major in different fields of natural sciences. We are now expecting to have the opportunity to communicate with you. This conference will allow graduate and undergraduate students to discuss intriguing topics. This conference covers computational neuroscience, the hydrodynamics of blood flow, computational math and cryptography. Speakers will introduce relevant background information and report their latest development. We hope you will have a glimpse of the beauty of the natural sciences through the four talks.

Date

2015-06-14


Venue

Room 601 Pao Yue-Kong Library

Schedule

Time Speaker Title Abstract
14:00-15:00 Songting Li Understanding the Brain with Mathematics How the brain works remains a big mystery. In the past few decades, mathematicians, physicists, and computer scientists have established a new field known as computational neuroscience to study the brain using mathematical and computational tools. In this talk, I will give a few examples to show how mathematics helps understand brain computation at multiple scales. In particular, I will introduce how math reveals the mechanisms from action potential generation to feature selection at single neuron level, and from coordinated locomotion to decision making at neuronal circuit level. In addition, I will introduce a recent progress in large scale brain simulation as part of the Human Brain Project proposed in Europe. This introductory talk aims to introduce the field of computational neuroscience, and to encourage the audiences, as future mathematicians and physicists, to join this young and sexy research field to explore the secrets of the brain.
15:00-15:30 Duty Du The formation of the blood pulse The blood pulse is a result of blood pulse wave propagation and reflection in arterial tree, which contains information of our body. This work is to explain the formation of the blood pulse based on the wave propagation in single vessel and reflection at bifurcation in arterial tree, and use this result to explain why some abnormal pulse phases appear in human body, such as wiry pulse in hypertension and slippery pulse in pregnancy.
16:00-16:30 Xinchun Li |^{1}-error estimates on the Hamiltonian-preserving scheme for the Liouville equation with piecewise constant potentials: a simple proof In this talk, I will introduce a Hamiltonian-preserving scheme for the Liouville equation with a piece- wise constant potential in one space dimension. l^{1}-error estimate on such a scheme was first established by Wen Xin and Shi Jin. In this paper, we provide a simple analysis on the l 1-error estimate for a class of bounded initial data.
16:30-17:00 Shuai Han Proofs of Retrievability Based on MRD Codes Proofs of Data Possession (PoDP) scheme is essential to data outsourcing. It provides an efficient audit to convince a client that his/ her file is available at the storage server, ready for retrieval when needed. An updated version of PoDP is Proofs of Retrievability (PoR), which proves the client’s file can be recovered by interactions with the storage server. We propose a PoR scheme based on Maximum Rank Distance (MRD)
 codes. The client file is encoded block-wise to generate homomorphic tags with help of an MRD code. In an audit, the storage provider is able to aggregate the blocks and tags into one block and one tag, due to the homomorphic property of tags. The algebraic structure of MRD codewords enables the aggregation to be operated over a binary field, which simplifies the computation of storage provider to be the most efficient XOR operation. With properties of MRD codes, we also prove an important security notion, namely soundness of PoR.