The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderate...The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.展开更多
The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (ba...The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (backs) mounted points. Recently, this technique has gained widespread acceptance in underground metalliferous mines in Western Australia. The error propagation of the “wall stations” technique in relation to classical traversing was analyzed and compared, and an optimal survey procedure and configuration for this technique was derived.展开更多
The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations ...The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.展开更多
The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To ...The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.展开更多
This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is us...This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm.Second,in the scrambling process,the image is initially confused by Josephus scrambling,and then the image is further confused by Arnold map.Finally,generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image.In addition,the information of the plaintext image is used to generate keys used in the algorithm,which increases the ability of resisting plaintext attack.Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images,and is resistant to common types of attacks.In addition,this scheme performs well in the experiments of robustness,which shows that the scheme can solve the problem of image damage in telemedicine.It has a positive significance for the future research.展开更多
文摘The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.
文摘The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (backs) mounted points. Recently, this technique has gained widespread acceptance in underground metalliferous mines in Western Australia. The error propagation of the “wall stations” technique in relation to classical traversing was analyzed and compared, and an optimal survey procedure and configuration for this technique was derived.
基金TraversingNAT/firewallTeachingandResearchAwardProgramforOutstandingYoungTeachersinHighEducationInstitutionsofMOE ,China (No .2 0 0 0 6 5 )
文摘The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.
文摘The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.
基金the National Natural Science Foundation of China(No.61402051)the Natural Science Basic Research Plan in Shaanxi Province of China(No.2016JM6076)。
文摘This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm.Second,in the scrambling process,the image is initially confused by Josephus scrambling,and then the image is further confused by Arnold map.Finally,generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image.In addition,the information of the plaintext image is used to generate keys used in the algorithm,which increases the ability of resisting plaintext attack.Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images,and is resistant to common types of attacks.In addition,this scheme performs well in the experiments of robustness,which shows that the scheme can solve the problem of image damage in telemedicine.It has a positive significance for the future research.