Aviation spiral bevel gears are often generated by spiral generated modified(SGM) roll method.In this style,pinion tooth surface modified generation strategy has an important influence on the meshing and contact per...Aviation spiral bevel gears are often generated by spiral generated modified(SGM) roll method.In this style,pinion tooth surface modified generation strategy has an important influence on the meshing and contact performances.For the optimal contact pattern and transmission error function,local synthesis is applied to obtain the machine-tool settings of pinion.For digitized machine,four tooth surface generation styles of pinion are proposed.For every style,tooth contact analysis(TCA) is applied to obtain contact pattern and transmission error function.For the difference between TCA transmission error function and design objective curve,the degree of symmetry and agreement are defined and the corresponding sub-objective functions are established.Linear weighted combination method is applied to get an equivalent objective function to evaluate the shape of transmission error function.The computer programs for the process above are developed to analyze the meshing performances of the four pinion tooth surface generation styles for a pair of aviation spiral bevel gears with 38/43 teeth numbers.The four analytical results are compared with each other and show that the incomplete modified roll is optimal for this gear pair.This study is an expansion to generation strategy of spiral bevel gears,and offers new alternatives to computer numerical control(CNC) manufacture of spiral bevel gears.展开更多
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ...Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords.展开更多
As a new intelligent optimization method,brain storm optimization(BSO)algorithm has been widely concerned for its advantages in solving classical optimization problems.Recently,an evolutionary classification optimizat...As a new intelligent optimization method,brain storm optimization(BSO)algorithm has been widely concerned for its advantages in solving classical optimization problems.Recently,an evolutionary classification optimization model based on BSO algorithm has been proposed,which proves its effectiveness in solving the classification problem.However,BSO algorithm also has defects.For example,large-scale datasets make the structure of the model complex,which affects its classification performance.In addition,in the process of optimization,the information of the dominant solution cannot be well preserved in BSO,which leads to its limitations in classification performance.Moreover,its generation strategy is inefficient in solving a variety of complex practical problems.Therefore,we briefly introduce the optimization model structure by feature selection.Besides,this paper retains the brainstorming process of BSO algorithm,and embeds the new generation strategy into BSO algorithm.Through the three generation methods of global optimal,local optimal and nearest neighbor,we can better retain the information of the dominant solution and improve the search efficiency.To verify the performance of the proposed generation strategy in solving the classification problem,twelve datasets are used in experiment.Experimental results show that the new generation strategy can improve the performance of BSO algorithm in solving classification problems.展开更多
A database-based strategy of candidate generation was proposed for molecular design of new de-phenol extractants following the idea of finding new applications of existing commercial compounds. The strategy has the ad...A database-based strategy of candidate generation was proposed for molecular design of new de-phenol extractants following the idea of finding new applications of existing commercial compounds. The strategy has the advantage that the environmental, safety and health risks of candidate compounds are known and controllable. In this work, the Existing Commercial Compounds(ECC) database and special combined search strategy were developed as the base for the proposed CAMD method following such idea, and molecules for phenol extraction used in coking wastewater treatment were selected from the ECC database. The candidate solvents cover the following categories: ketones, esters, ethers, alcohols, anhydrides and benzene compounds, which are consistent with the de-phenol extractants commonly used in the industry or experiment. The compounds with higher partition coefficient and selectivity than widely used methyl isobutyl ketone(MIBK) are mainly ketones. 26 obtained molecules show higher partition coefficient and selectivity than MIBK, which are suggested to be further investigated by experiment. Furthermore, analysis of these potential molecules may present the effective functional groups as the initial group set to generate new molecular structures of de-phenol extractants. The results show that the proposed method enables us to efficiently generate chemicals with benefits of less time, less economical cost, and known environmental impact as well.展开更多
The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes.Particularly,a high-aspect-ratio flexible flying wing is pr...The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes.Particularly,a high-aspect-ratio flexible flying wing is prone to body freedomflutter(BFF),which is a result of coupling of the rigid body short-periodmodewith 1st wing bendingmode.Accurate prediction of the BFF characteristics is helpful to reflect the attitude changes of the vehicle intuitively and design the active flutter suppression control law.Instead of using the rigid body mode,this work simulates the rigid bodymotion of the model by using the six-degree-of-freedom(6DOF)equation.A dynamicmesh generation strategy particularly suitable for BFF simulation of free flying aircraft is developed.An accurate Computational Fluid Dynamics/Computational Structural Dynamics/six-degree-of-freedom equation(CFD/CSD/6DOF)-based BFF prediction method is proposed.Firstly,the time-domain CFD/CSD method is used to calculate the static equilibrium state of the model.Based on this state,the CFD/CSD/6DOF equation is solved in time domain to evaluate the structural response of themodel.Then combinedwith the variable stiffnessmethod,the critical flutter point of the model is obtained.This method is applied to the BFF calculation of a flyingwing model.The calculation results of the BFF characteristics of the model agree well with those fromthe modalmethod andNastran software.Finally,the method is used to analyze the influence factors of BFF.The analysis results show that the flutter speed can be improved by either releasing plunge constraint or moving the center ofmass forward or increasing the pitch inertia.展开更多
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan...The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks.展开更多
Building damage maps after disasters can help us to better manage the rescue operations.Researchers have used Light Detection and Ranging(LiDAR)data for extracting the building damage maps.For producing building damag...Building damage maps after disasters can help us to better manage the rescue operations.Researchers have used Light Detection and Ranging(LiDAR)data for extracting the building damage maps.For producing building damage maps from LiDAR data in a rapid manner,it is necessary to understand the effectiveness of features and classifiers.However,there is no comprehensive study on the performance of features and classifiers in identifying damaged areas.In this study,the effectiveness of three texture extraction methods and three fuzzy systems for producing the building damage maps was investigated.In the proposed method,at first,a pre-processing stage was utilized to apply essential processes on post-event LiDAR data.Second,textural features were extracted from the pre-processed LiDAR data.Third,fuzzy inference systems were generated to make a relation between the extracted textural features of buildings and their damage extents.The proposed method was tested across three areas over the 2010 Haiti earthquake.Three building damage maps with overall accuracies of 75.0%,78.1%and 61.4%were achieved.Based on outcomes,the fuzzy inference systems were stronger than random forest,bagging,boosting and support vector machine classifiers for detecting damaged buildings.展开更多
文摘Aviation spiral bevel gears are often generated by spiral generated modified(SGM) roll method.In this style,pinion tooth surface modified generation strategy has an important influence on the meshing and contact performances.For the optimal contact pattern and transmission error function,local synthesis is applied to obtain the machine-tool settings of pinion.For digitized machine,four tooth surface generation styles of pinion are proposed.For every style,tooth contact analysis(TCA) is applied to obtain contact pattern and transmission error function.For the difference between TCA transmission error function and design objective curve,the degree of symmetry and agreement are defined and the corresponding sub-objective functions are established.Linear weighted combination method is applied to get an equivalent objective function to evaluate the shape of transmission error function.The computer programs for the process above are developed to analyze the meshing performances of the four pinion tooth surface generation styles for a pair of aviation spiral bevel gears with 38/43 teeth numbers.The four analytical results are compared with each other and show that the incomplete modified roll is optimal for this gear pair.This study is an expansion to generation strategy of spiral bevel gears,and offers new alternatives to computer numerical control(CNC) manufacture of spiral bevel gears.
基金supported in part by the National Natural Science Foundation of China (No. 61803149 and No. 61977021)in part by the Technology Innovation Special Program of Hubei Province (No. 2020AEA008)in part by the Hubei Province Project of Key Research Institute of Humanities and Social Sciences at Universities (Research Center of Information Management for Performance Evaluation)
文摘Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords.
基金supported by the National Natural Science Foundation of China(61876089,61403206,61876185,61902281)the opening Project of Jiangsu Key Laboratory of Data Science and Smart Software(No.2019DS302)+2 种基金the Natural Science Foundation of Jiangsu Province(BK20141005)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(14KJB520025)the Engineering Research Center of Digital Forensics,Ministry of Education,and the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘As a new intelligent optimization method,brain storm optimization(BSO)algorithm has been widely concerned for its advantages in solving classical optimization problems.Recently,an evolutionary classification optimization model based on BSO algorithm has been proposed,which proves its effectiveness in solving the classification problem.However,BSO algorithm also has defects.For example,large-scale datasets make the structure of the model complex,which affects its classification performance.In addition,in the process of optimization,the information of the dominant solution cannot be well preserved in BSO,which leads to its limitations in classification performance.Moreover,its generation strategy is inefficient in solving a variety of complex practical problems.Therefore,we briefly introduce the optimization model structure by feature selection.Besides,this paper retains the brainstorming process of BSO algorithm,and embeds the new generation strategy into BSO algorithm.Through the three generation methods of global optimal,local optimal and nearest neighbor,we can better retain the information of the dominant solution and improve the search efficiency.To verify the performance of the proposed generation strategy in solving the classification problem,twelve datasets are used in experiment.Experimental results show that the new generation strategy can improve the performance of BSO algorithm in solving classification problems.
基金Supported by the National Natural Science Foundation of China(Grant No.2156112001)National Basic Science Data Sharing Service Project(DKA2017-12-02-05)
文摘A database-based strategy of candidate generation was proposed for molecular design of new de-phenol extractants following the idea of finding new applications of existing commercial compounds. The strategy has the advantage that the environmental, safety and health risks of candidate compounds are known and controllable. In this work, the Existing Commercial Compounds(ECC) database and special combined search strategy were developed as the base for the proposed CAMD method following such idea, and molecules for phenol extraction used in coking wastewater treatment were selected from the ECC database. The candidate solvents cover the following categories: ketones, esters, ethers, alcohols, anhydrides and benzene compounds, which are consistent with the de-phenol extractants commonly used in the industry or experiment. The compounds with higher partition coefficient and selectivity than widely used methyl isobutyl ketone(MIBK) are mainly ketones. 26 obtained molecules show higher partition coefficient and selectivity than MIBK, which are suggested to be further investigated by experiment. Furthermore, analysis of these potential molecules may present the effective functional groups as the initial group set to generate new molecular structures of de-phenol extractants. The results show that the proposed method enables us to efficiently generate chemicals with benefits of less time, less economical cost, and known environmental impact as well.
基金This work was supported by the National Natural Science Foundation of China(No.11872212)and a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes.Particularly,a high-aspect-ratio flexible flying wing is prone to body freedomflutter(BFF),which is a result of coupling of the rigid body short-periodmodewith 1st wing bendingmode.Accurate prediction of the BFF characteristics is helpful to reflect the attitude changes of the vehicle intuitively and design the active flutter suppression control law.Instead of using the rigid body mode,this work simulates the rigid bodymotion of the model by using the six-degree-of-freedom(6DOF)equation.A dynamicmesh generation strategy particularly suitable for BFF simulation of free flying aircraft is developed.An accurate Computational Fluid Dynamics/Computational Structural Dynamics/six-degree-of-freedom equation(CFD/CSD/6DOF)-based BFF prediction method is proposed.Firstly,the time-domain CFD/CSD method is used to calculate the static equilibrium state of the model.Based on this state,the CFD/CSD/6DOF equation is solved in time domain to evaluate the structural response of themodel.Then combinedwith the variable stiffnessmethod,the critical flutter point of the model is obtained.This method is applied to the BFF calculation of a flyingwing model.The calculation results of the BFF characteristics of the model agree well with those fromthe modalmethod andNastran software.Finally,the method is used to analyze the influence factors of BFF.The analysis results show that the flutter speed can be improved by either releasing plunge constraint or moving the center ofmass forward or increasing the pitch inertia.
基金supported by the National Natural Science Foundation of China(62231020)the Youth Innovation Team of Shaanxi Universities。
文摘The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks.
文摘Building damage maps after disasters can help us to better manage the rescue operations.Researchers have used Light Detection and Ranging(LiDAR)data for extracting the building damage maps.For producing building damage maps from LiDAR data in a rapid manner,it is necessary to understand the effectiveness of features and classifiers.However,there is no comprehensive study on the performance of features and classifiers in identifying damaged areas.In this study,the effectiveness of three texture extraction methods and three fuzzy systems for producing the building damage maps was investigated.In the proposed method,at first,a pre-processing stage was utilized to apply essential processes on post-event LiDAR data.Second,textural features were extracted from the pre-processed LiDAR data.Third,fuzzy inference systems were generated to make a relation between the extracted textural features of buildings and their damage extents.The proposed method was tested across three areas over the 2010 Haiti earthquake.Three building damage maps with overall accuracies of 75.0%,78.1%and 61.4%were achieved.Based on outcomes,the fuzzy inference systems were stronger than random forest,bagging,boosting and support vector machine classifiers for detecting damaged buildings.