An approach to sequence planning for on-orbit assembly of large space truss structures in a multirobot environment is presented. A hierarchical representation of large space truss structures at the structural volume e...An approach to sequence planning for on-orbit assembly of large space truss structures in a multirobot environment is presented. A hierarchical representation of large space truss structures at the structural volume element level and strut level is adopted. The representation of connectivity matrix and directed graph is respectively presented at the strut level and SVE level. The multirobot environment that consists of autonomous space robots and struts is supposed. Then the multirobot serial assembly strategy,assembly states,assembly tasks and assembly sequences are described. The assembly sequence planning algorithms at the strut level and SVE level are respectively discussed. The results of the simulations show that this approach is feasible and efficient. Two extensions of this approach include more accurate assessment of the efficiency representation and improvements in planning algorithm. In the future,the assembly sequence planning of more large space truss structures and complex multirobot environments and assembly tasks will be considered.展开更多
The paper investigated the equivalent continuum modeling of beam-like repetitive truss structures considering the flexibility of joints,which models the contact between the truss member and joint by spring-damper with...The paper investigated the equivalent continuum modeling of beam-like repetitive truss structures considering the flexibility of joints,which models the contact between the truss member and joint by spring-damper with six directional stiffnesses and dampings.Firstly,a two-node hybrid joint-beam element was derived for modeling the truss member with flexible end joints,and a condensed model for the repeating element with flexible joints was obtained.Then,the energy equivalence method was adopted to equivalently model the truss structure with flexible joints and material damping as a spatial viscoelastic anisotropic beam model.Afterwards,the equations of motion for the equivalent beam model were derived and solved analytically in the frequency domain.In the numerical studies,the correctness of the presented method was verified by comparisons of the natural frequencies and frequency responses evaluated by the equivalent beam model with the results of the finite element method model.展开更多
Large steel space structures,when exposed to a harsh corrosive environment,are inevitably subjected to atmospheric corrosion and stress corrosion cracking.This paper proposes a framework for assessing the corrosion da...Large steel space structures,when exposed to a harsh corrosive environment,are inevitably subjected to atmospheric corrosion and stress corrosion cracking.This paper proposes a framework for assessing the corrosion damage of large steel space structures subjected to both stress corrosion cracking and atmospheric corrosion.The empirical model for estimating atmospheric corrosion based on measured information is briefly introduced.The proposed framework is applied to a real large steel space structure built in the southern coastal area in China to assess its corrosion damage and investigate the effects of atmospheric corrosion on stress corrosion cracking.Based on the results,the conceptual design of the corrosion monitoring system of large steel space structures is finally conducted as the first step for a real corrosion monitoring system.展开更多
With the concept of security-spot market or security market with measurable space of agents, which was first given by Zhang (1998, 2000), we continue to discuss the existence of equilibrium in such large economies. ...With the concept of security-spot market or security market with measurable space of agents, which was first given by Zhang (1998, 2000), we continue to discuss the existence of equilibrium in such large economies. Under common conditions, we have claimed the existence of equilibrium in incomplete security-spot market with a continuum of traders. Because of the development from complete market to incomplete market, we have not only generalized Aumann's results in 1966, but also achieved a breakthrough on researching methods.展开更多
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed...With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.展开更多
文摘An approach to sequence planning for on-orbit assembly of large space truss structures in a multirobot environment is presented. A hierarchical representation of large space truss structures at the structural volume element level and strut level is adopted. The representation of connectivity matrix and directed graph is respectively presented at the strut level and SVE level. The multirobot environment that consists of autonomous space robots and struts is supposed. Then the multirobot serial assembly strategy,assembly states,assembly tasks and assembly sequences are described. The assembly sequence planning algorithms at the strut level and SVE level are respectively discussed. The results of the simulations show that this approach is feasible and efficient. Two extensions of this approach include more accurate assessment of the efficiency representation and improvements in planning algorithm. In the future,the assembly sequence planning of more large space truss structures and complex multirobot environments and assembly tasks will be considered.
基金This work was supported by the National Natural Science Foundation of China(Grants 11702146,11732006 and 11827801)the Equipment Pre-research Foundation(Grant 6140210010202).
文摘The paper investigated the equivalent continuum modeling of beam-like repetitive truss structures considering the flexibility of joints,which models the contact between the truss member and joint by spring-damper with six directional stiffnesses and dampings.Firstly,a two-node hybrid joint-beam element was derived for modeling the truss member with flexible end joints,and a condensed model for the repeating element with flexible joints was obtained.Then,the energy equivalence method was adopted to equivalently model the truss structure with flexible joints and material damping as a spatial viscoelastic anisotropic beam model.Afterwards,the equations of motion for the equivalent beam model were derived and solved analytically in the frequency domain.In the numerical studies,the correctness of the presented method was verified by comparisons of the natural frequencies and frequency responses evaluated by the equivalent beam model with the results of the finite element method model.
基金support from the Hong Kong Polytechnic University through its Niche Area Project in Performance-Based Structural Health Monitoring and the Fundamental Research Funds for the Central University of China(2010-II-019).
文摘Large steel space structures,when exposed to a harsh corrosive environment,are inevitably subjected to atmospheric corrosion and stress corrosion cracking.This paper proposes a framework for assessing the corrosion damage of large steel space structures subjected to both stress corrosion cracking and atmospheric corrosion.The empirical model for estimating atmospheric corrosion based on measured information is briefly introduced.The proposed framework is applied to a real large steel space structure built in the southern coastal area in China to assess its corrosion damage and investigate the effects of atmospheric corrosion on stress corrosion cracking.Based on the results,the conceptual design of the corrosion monitoring system of large steel space structures is finally conducted as the first step for a real corrosion monitoring system.
基金The research is supported by Funding Project for Academic Human Resources Development in Institutions of Higher Learning Under the Jourisdiction of Beijing Municipality.
文摘With the concept of security-spot market or security market with measurable space of agents, which was first given by Zhang (1998, 2000), we continue to discuss the existence of equilibrium in such large economies. Under common conditions, we have claimed the existence of equilibrium in incomplete security-spot market with a continuum of traders. Because of the development from complete market to incomplete market, we have not only generalized Aumann's results in 1966, but also achieved a breakthrough on researching methods.
基金the National Natural Science Foundation of China(Grant Numbers 622724786210245062102451).
文摘With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.