Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions...Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.展开更多
In order to minimize the harm caused by the instability of a planing craft, a motion prediction model is essential. This paper analyzed the feasibility of using an MGM(1,N) model in grey system theory to predict pla...In order to minimize the harm caused by the instability of a planing craft, a motion prediction model is essential. This paper analyzed the feasibility of using an MGM(1,N) model in grey system theory to predict planing craft motion and carried out the numerical simulation experiment. According to the characteristics of planing craft motion, a recurrence formula was proposed of the parameter matrix of an MGMfl,N) model. Using this formula, data can be updated in real-time without increasing computational complexity significantly. The results of numerical simulation show that using an MGM(1,N) model to predict planing motion is feasible and useful for prediction. So the method proposed in this study can reflect the planing craft motion mechanism successfully, and has rational and effective functions of forecasting and analyzing trends.展开更多
Arch is a typical complex structure comparing with beam and plate in bridge system. This paper investigates the damage characteristic combining the crack location with the crack intensity in arch. Initially, the first...Arch is a typical complex structure comparing with beam and plate in bridge system. This paper investigates the damage characteristic combining the crack location with the crack intensity in arch. Initially, the first four displacement modes of intact and different damaged arch are simulated and the displacement mode changes are obtained. Next, the wavelet transformation is applied to the displacement mode changes in arch and wavelet coefficients at damage loci are picked. Finally, the damage index including damage location and damage intensity in arch is provided and plotted. The results show that wavelet coefficient module maximum of mode changes can be the damage indicator and is influenced by damage location and damage intensity. The damage indicator is proportional to the damage intensity and present monotonic trend according to damage location which depend on the mode order. At the same time, the large modulus maximum corresponds to small damage combination of location and intensity in the first four modes.展开更多
A new concept of bend-mode inkjet nozzle with double PZT (lead zirconate titanate) actuators has been designed and fabricated in the present study. Then the pressure wave and fluid velocity at the nozzle exit have bee...A new concept of bend-mode inkjet nozzle with double PZT (lead zirconate titanate) actuators has been designed and fabricated in the present study. Then the pressure wave and fluid velocity at the nozzle exit have been investigated. The complex pressure behavior inside the channel was solved numerically based on the narrow channel acoustic theory. The two PZTs attached to a rectangular channel were actuated sequentially by setting the waveforms of each PZT to be center-aligned with various pulse widths. As a result, the double PZT actuation is superior to the single PZT actuation in view of strong momentum force and fast dissipation of residual pressure. The maximum fluid velocity at the nozzle exit is observed when the respective pulse widths equal to their optimum pulse widths. The numerical results are supported by the experimental results with the fabricated inkjet device by measuring the speed of meniscus just out of the nozzle.展开更多
By studying the algorithms of single pattern matching, five factors that have effect on time complexity of the algorithm are analyzed. The five factors are: sorting the characters of pattern string in an increasing o...By studying the algorithms of single pattern matching, five factors that have effect on time complexity of the algorithm are analyzed. The five factors are: sorting the characters of pattern string in an increasing order of using frequency, utilizing already-matched pattern suffix information, utilizing already-matched pattern prefix information, utilizing the position factor which is absorbed from quick search algorithm, and utilizing the continue-skip idea which is originally proposed by this paper. Combining all the five factors, a new single pattern matching algorithm is implemented. It's proven by the experiment that the efficiency of new algorithm is the best of all algorithms.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.11371290,No.61271174,No. 61301178)the Science and Technology Innovation Foundation of Xi'an(Grant No. CXY1352WL28)
文摘Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.
基金Supported by the Foundation of State Key Laboratory of Autonomous Underwater Vehicle, Harbin Engineering Universitythe Fundamental Research Funds for the Central Universities (HEUCFL20101113)
文摘In order to minimize the harm caused by the instability of a planing craft, a motion prediction model is essential. This paper analyzed the feasibility of using an MGM(1,N) model in grey system theory to predict planing craft motion and carried out the numerical simulation experiment. According to the characteristics of planing craft motion, a recurrence formula was proposed of the parameter matrix of an MGMfl,N) model. Using this formula, data can be updated in real-time without increasing computational complexity significantly. The results of numerical simulation show that using an MGM(1,N) model to predict planing motion is feasible and useful for prediction. So the method proposed in this study can reflect the planing craft motion mechanism successfully, and has rational and effective functions of forecasting and analyzing trends.
文摘Arch is a typical complex structure comparing with beam and plate in bridge system. This paper investigates the damage characteristic combining the crack location with the crack intensity in arch. Initially, the first four displacement modes of intact and different damaged arch are simulated and the displacement mode changes are obtained. Next, the wavelet transformation is applied to the displacement mode changes in arch and wavelet coefficients at damage loci are picked. Finally, the damage index including damage location and damage intensity in arch is provided and plotted. The results show that wavelet coefficient module maximum of mode changes can be the damage indicator and is influenced by damage location and damage intensity. The damage indicator is proportional to the damage intensity and present monotonic trend according to damage location which depend on the mode order. At the same time, the large modulus maximum corresponds to small damage combination of location and intensity in the first four modes.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education,Science and Technology(2010-0009054)
文摘A new concept of bend-mode inkjet nozzle with double PZT (lead zirconate titanate) actuators has been designed and fabricated in the present study. Then the pressure wave and fluid velocity at the nozzle exit have been investigated. The complex pressure behavior inside the channel was solved numerically based on the narrow channel acoustic theory. The two PZTs attached to a rectangular channel were actuated sequentially by setting the waveforms of each PZT to be center-aligned with various pulse widths. As a result, the double PZT actuation is superior to the single PZT actuation in view of strong momentum force and fast dissipation of residual pressure. The maximum fluid velocity at the nozzle exit is observed when the respective pulse widths equal to their optimum pulse widths. The numerical results are supported by the experimental results with the fabricated inkjet device by measuring the speed of meniscus just out of the nozzle.
基金the National Natural Science Foundation of China (Nos. 60502032 and 60672068)
文摘By studying the algorithms of single pattern matching, five factors that have effect on time complexity of the algorithm are analyzed. The five factors are: sorting the characters of pattern string in an increasing order of using frequency, utilizing already-matched pattern suffix information, utilizing already-matched pattern prefix information, utilizing the position factor which is absorbed from quick search algorithm, and utilizing the continue-skip idea which is originally proposed by this paper. Combining all the five factors, a new single pattern matching algorithm is implemented. It's proven by the experiment that the efficiency of new algorithm is the best of all algorithms.