A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be...A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.展开更多
In allusion to the limitations of the traditional attitude measurement system consisting of a three-axis magnetic sensor and two accelerometers on high-spinning projectile, a new scheme comprised of two magnetic senso...In allusion to the limitations of the traditional attitude measurement system consisting of a three-axis magnetic sensor and two accelerometers on high-spinning projectile, a new scheme comprised of two magnetic sensors and two accelerometers installed in a particular way is given. The configuration of the sensors is described. The calculation method and the mathematical model of the projectile attitude based on the sensor configuration are discussed. The basic calculation method including the Magsonde Window, the proof of the ratios of maximums and minimums and the calculation of the attitude angles are analyzed in theory. Finally, the system is simulated under the given conditions. The simulation result indicates that the estimated attitude angles are in agreement with the true attitude angles.展开更多
This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first ...This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre...展开更多
Digital factory technology is an advanced manufacturing technology served as to establish a bridge between the process of product development and manufacturing.In terms of application for digital factory technology in...Digital factory technology is an advanced manufacturing technology served as to establish a bridge between the process of product development and manufacturing.In terms of application for digital factory technology in machining,especially in machining of a complicated part such as a cylinder body part,a concept of digital process planning and its framework are proposed.Its components including machining domain knowledge model,machining knowledge base,machining resource base and process planning system are studied.A machining knowledge model in tree form and an object-driven knowledge reasoning mechanism are used for machining knowledge base.The process planning system is a user interface that leads a planner to finish the planning process.A case about a cylinder head part is given to demonstrate how the platform works.The framework of digital process planning is the foundation of some intelligent CAPP systems and helps to production line planning.展开更多
The non-linear finite element software ABAQUS was used to simulate the dynamic response of a marine supercharged boiler when subjected to impact loading. Shock resistance was analyzed by the time-domain simulation met...The non-linear finite element software ABAQUS was used to simulate the dynamic response of a marine supercharged boiler when subjected to impact loading. Shock resistance was analyzed by the time-domain simulation method. After exhaustive simulations,the effect of air pressure induced by different working conditions on the shock response of a supercharged boiler was reviewed,leading to conclusions about the variability of structural response with different loading parameters. In order to simulate the real impulsive environments of supercharged boilers,the integration of equipment and ship structure was then primarily used to analyze shock response. These distinctly different equipment shock test methods,run under equivalent work conditions,were compared and the causes of discrepancy were analyzed. The main purpose of this paper is to present references for the anti-shock design of marine supercharged boilers.展开更多
A series of char samples were derived from pyrolysis of two typical low-rank coals in China (Shengli lig- nite and Shenmu bituminous coal) at low, medium and fast heating rates, respectively, to the same pyrol- ysis...A series of char samples were derived from pyrolysis of two typical low-rank coals in China (Shengli lig- nite and Shenmu bituminous coal) at low, medium and fast heating rates, respectively, to the same pyrol- ysis temperature 750℃. Then these chars were characterized by means of thermogravimetric analysis and Fourier transform infrared spectrometer with the aim to investigate the influence of heating rate in pyrolysis process on gasification reactivity and surface chemistry of them. Besides, a homogeneous model was used to quantitatively analyze the activation energy of gasification reaction. The results reveal that Shengli lignite and its derived chars behave higher gasification reactivity and have less content of oxygen functional groups than Shenmu coal and chars. Meanwhile, chars derived from Shengli lignite at 50℃/min and Shenmu coal at 200℃/min have the greatest gasification reactivity, respectively. The oxygen functional groups in Shengli lignite are easily thermo-decomposed, and they are less affected by the heating rate, while that in Shenmu coal have a significant change with the variation of heating rate. In addition, there is no good correlation between the change of oxygen functional groups and that of the gasification reactivity of the derived chars from pyrolysis at different heating rates.展开更多
The spallation of the concrete slabs or walls resulting from contact detonation constitutes risk to the personnel and equipment inside the structures because of the high speed concrete fragments even though the overal...The spallation of the concrete slabs or walls resulting from contact detonation constitutes risk to the personnel and equipment inside the structures because of the high speed concrete fragments even though the overall structures or structural members are not destroyed completely. Correctly predicting the damage caused by any potential contact detonation can lead to better fortification design to withstand the blast Ioadings. It is therefore of great significance to study the mechanism involved in the spallation of concrete slabs and walls. Existing studies on this topic often employ simplified material models and 1D wave analysis, which cannot reproduce the realistic response in the spallation process. Numerical simulations are therefore carried out under different contact blast Ioadings in the free air using LS-DYNA. Sophisticated concrete and reinforcing bar material models are adopted, taking into account the strain rate effect on both tension and compression. The erosion technique is used to model the fracture and failure of materials under tensile stress. Full processes of the deformation and dynamic damage of reinforced concrete (RC) slabs and plain concrete slabs are thus observed realistically. It is noted that with the increase of quantity of explosive, the dimensions of damage crater increase and the slabs experience four different damage patterns, namely explosive crater, spalling, perforation, and punching. Comparison between the simulation results of plain concrete slabs and those of RC slabs show that reinforcing bars can enhance the integrity and shearing resistance of the slabs to a certain extent, and meanwhile attenuate the ejection velocity and decrease the size of the concrete fragments. Therefore, optimizing reinforcement arrangement can improve the anti-spallation capability of the slabs and walls to a certain extent.展开更多
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in...In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em...Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.展开更多
A digital predistorted class-F power amplifier (PA) using Cree GaN HEMT CGH40010 operating at 2. 12 GHz is presented to obtain high efficiency and excellent linearity for wideband code-division multiple access ( WC...A digital predistorted class-F power amplifier (PA) using Cree GaN HEMT CGH40010 operating at 2. 12 GHz is presented to obtain high efficiency and excellent linearity for wideband code-division multiple access ( WCDMA ) applications. Measurement results with the continuous wave (CW) signals indicate that the designed class-F PA achieves a peak power-added efficiency (PAE) of 75. 2% with an output power of 39.4 dBm. The adjacent channel power ratio (ACPR) of the designed PA after digital predistortion (DPD) decreases from -28. 3 and -27. 5 dBc to -51.9 and -54. 0 dBc, respectively, for a 4-carrier 20 MHz WCDMA signal with 7. 1 dB peak to average power ratio (PAPR). The drain efficiency (DE) of the PA is 37. 8% at an average output power of 33. 3 dBm. The designed power amplifier can be aoolied in the WCDMA system.展开更多
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat...Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.展开更多
To reduce mechanical vibrations induced by big errors compensation, a new software compensation method based on an improved digital differential analyzer (DDA) interpolator for static and quasi-static errors of machin...To reduce mechanical vibrations induced by big errors compensation, a new software compensation method based on an improved digital differential analyzer (DDA) interpolator for static and quasi-static errors of machine tools is proposed. Based on principle of traditional DDA interpolator, a DDA interpolator is divided into command generator and command analyzer. There are three types of errors, considering the difference of positions between compensation points and interpolation segments. According to the classification, errors are distributed evenly in data processing and compensated to certain interpolation segments in machining. On-line implementation results show that the proposed approach greatly improves positioning accuracy of computer numerical control (CNC) machine tools.展开更多
The deep fissured rock mass is affected by coupled effects of initial ground stress and external dynamic disturbance.In order to study the effect of internal flaw on pre-stressed rock mechanical responses and failure ...The deep fissured rock mass is affected by coupled effects of initial ground stress and external dynamic disturbance.In order to study the effect of internal flaw on pre-stressed rock mechanical responses and failure behavior under impact loading,intact granite specimens and specimens with different flaw inclinations are tested by a modified split Hopkinson pressure bar(SHPB)and digital image correlation(DIC)method.The results show that peak strain and dynamic strength of intact specimens and specimens with different flaw angles(α)decrease with the increase of axial static pressure.The 90°flaw has weak reduction effect on peak strain,dynamic strength and combined strength,while 45°and 0°flaws have remarkable reduction effect.Specimens with 90°flaw are suffered combined shear and tensile failure under middle and low axial static pre-stresses,and suffered shear failure under high axial static pre-stresses.Specimens with 45°and 0°flaws are suffered oblique shear failure caused by pre-existing flaw under different axial static pre-stresses.Besides,based on digital image correlation method,it is found that micro-cracks before formation of macro fractures(include shear and tensile fractures)belong to tensile cracks.Tensile and shear strain localizations at pre-existing flaw tip for specimen with 45°and 0°flaws are produced much earlier than that at other positions.展开更多
The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well ...The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12.展开更多
The model of heat source(MHS) which reflects the thermal interaction between materials and laser during processing determines the accuracy of simulation results. To acquire desirable simulations results, although vari...The model of heat source(MHS) which reflects the thermal interaction between materials and laser during processing determines the accuracy of simulation results. To acquire desirable simulations results, although various modifications of heat sources in the aspect of absorption process of laser by materials have been purposed, the distribution of laser power density(DLPD) in MHS is still modeled theoretically. However, in the actual situations of laser processing, the DLPD is definitely different from the ideal models. So, it is indispensable to build MHS using actual DLPD to improve the accuracy of simulation results. Besides, an automatic modeling method will be benefit to simplify the tedious pre-processing of simulations. This paper presents a modeling method and corresponding algorithm to model heat source using measured DLPD. This algorithm automatically processes original data to get modeling parameters and provides a step MHS combining with absorption models. Simulations and experiments of heat transfer in steel plates irradiated by laser prove the mothed and the step MHS. Moreover, the investigations of laser induced thermal-crack propagation in glass highlight the signification of modeling heat source based on actual DLPD and demonstrate the enormous application of this method in the simulation of laser processing.展开更多
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio...The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.展开更多
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp...Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.展开更多
The article deals with the question of the possibility of a new interpretation of Picasso’s picture entitled Crucifixion, which was created in the context of the art paradigm shift in the 1930s when the master focuse...The article deals with the question of the possibility of a new interpretation of Picasso’s picture entitled Crucifixion, which was created in the context of the art paradigm shift in the 1930s when the master focused his attention to the return to painting as a reference framework of myth and religion. But this return was only a turning point towards a modern understanding of the world and art from other sources. It should be noted that the problem of pictorial turn nowadays has a strong impact on the postmodern theology, which encompasses various cultural traditions, and also quite opposite philosophical attitudes. The article shows, thus, the inner relationship and connection between painting art and the search for transgression in the language that was the idea of Bataille. In the first part of this article, author tries to show the consequences of Bataille’s thinking of transgression; the second part has attempted to articulate the problems of interpretation of Picasso’s canvas Crucifixion; and concluding remarks is an attempt to review the emphasis on relationship with pictorial turn and transformations in the notion of contemporary art concerning the body as a sovereign event of the freedom and sacrifice.展开更多
文摘A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.
文摘In allusion to the limitations of the traditional attitude measurement system consisting of a three-axis magnetic sensor and two accelerometers on high-spinning projectile, a new scheme comprised of two magnetic sensors and two accelerometers installed in a particular way is given. The configuration of the sensors is described. The calculation method and the mathematical model of the projectile attitude based on the sensor configuration are discussed. The basic calculation method including the Magsonde Window, the proof of the ratios of maximums and minimums and the calculation of the attitude angles are analyzed in theory. Finally, the system is simulated under the given conditions. The simulation result indicates that the estimated attitude angles are in agreement with the true attitude angles.
文摘This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre...
文摘Digital factory technology is an advanced manufacturing technology served as to establish a bridge between the process of product development and manufacturing.In terms of application for digital factory technology in machining,especially in machining of a complicated part such as a cylinder body part,a concept of digital process planning and its framework are proposed.Its components including machining domain knowledge model,machining knowledge base,machining resource base and process planning system are studied.A machining knowledge model in tree form and an object-driven knowledge reasoning mechanism are used for machining knowledge base.The process planning system is a user interface that leads a planner to finish the planning process.A case about a cylinder head part is given to demonstrate how the platform works.The framework of digital process planning is the foundation of some intelligent CAPP systems and helps to production line planning.
文摘The non-linear finite element software ABAQUS was used to simulate the dynamic response of a marine supercharged boiler when subjected to impact loading. Shock resistance was analyzed by the time-domain simulation method. After exhaustive simulations,the effect of air pressure induced by different working conditions on the shock response of a supercharged boiler was reviewed,leading to conclusions about the variability of structural response with different loading parameters. In order to simulate the real impulsive environments of supercharged boilers,the integration of equipment and ship structure was then primarily used to analyze shock response. These distinctly different equipment shock test methods,run under equivalent work conditions,were compared and the causes of discrepancy were analyzed. The main purpose of this paper is to present references for the anti-shock design of marine supercharged boilers.
基金financial support from the Basic Fund for the Scientific Research and Operation of Central Universities of China (No. 2009KH10
文摘A series of char samples were derived from pyrolysis of two typical low-rank coals in China (Shengli lig- nite and Shenmu bituminous coal) at low, medium and fast heating rates, respectively, to the same pyrol- ysis temperature 750℃. Then these chars were characterized by means of thermogravimetric analysis and Fourier transform infrared spectrometer with the aim to investigate the influence of heating rate in pyrolysis process on gasification reactivity and surface chemistry of them. Besides, a homogeneous model was used to quantitatively analyze the activation energy of gasification reaction. The results reveal that Shengli lignite and its derived chars behave higher gasification reactivity and have less content of oxygen functional groups than Shenmu coal and chars. Meanwhile, chars derived from Shengli lignite at 50℃/min and Shenmu coal at 200℃/min have the greatest gasification reactivity, respectively. The oxygen functional groups in Shengli lignite are easily thermo-decomposed, and they are less affected by the heating rate, while that in Shenmu coal have a significant change with the variation of heating rate. In addition, there is no good correlation between the change of oxygen functional groups and that of the gasification reactivity of the derived chars from pyrolysis at different heating rates.
基金Supported by the National Defense Preliminary Research Project Fund of Zhejiang University,and Qianjiang Talent Plan.
文摘The spallation of the concrete slabs or walls resulting from contact detonation constitutes risk to the personnel and equipment inside the structures because of the high speed concrete fragments even though the overall structures or structural members are not destroyed completely. Correctly predicting the damage caused by any potential contact detonation can lead to better fortification design to withstand the blast Ioadings. It is therefore of great significance to study the mechanism involved in the spallation of concrete slabs and walls. Existing studies on this topic often employ simplified material models and 1D wave analysis, which cannot reproduce the realistic response in the spallation process. Numerical simulations are therefore carried out under different contact blast Ioadings in the free air using LS-DYNA. Sophisticated concrete and reinforcing bar material models are adopted, taking into account the strain rate effect on both tension and compression. The erosion technique is used to model the fracture and failure of materials under tensile stress. Full processes of the deformation and dynamic damage of reinforced concrete (RC) slabs and plain concrete slabs are thus observed realistically. It is noted that with the increase of quantity of explosive, the dimensions of damage crater increase and the slabs experience four different damage patterns, namely explosive crater, spalling, perforation, and punching. Comparison between the simulation results of plain concrete slabs and those of RC slabs show that reinforcing bars can enhance the integrity and shearing resistance of the slabs to a certain extent, and meanwhile attenuate the ejection velocity and decrease the size of the concrete fragments. Therefore, optimizing reinforcement arrangement can improve the anti-spallation capability of the slabs and walls to a certain extent.
基金ACKNOWLEDGEMENTS This work has been supported by the National Natural Science Foundation of China under Grant No. 61272519, 61121061.
文摘In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
文摘Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.
基金The National Natural Science Foundation of China(No.60702163)the National Science and Technology Major Project(No.2010ZX03007-002-01,2011ZX03004-003)
文摘A digital predistorted class-F power amplifier (PA) using Cree GaN HEMT CGH40010 operating at 2. 12 GHz is presented to obtain high efficiency and excellent linearity for wideband code-division multiple access ( WCDMA ) applications. Measurement results with the continuous wave (CW) signals indicate that the designed class-F PA achieves a peak power-added efficiency (PAE) of 75. 2% with an output power of 39.4 dBm. The adjacent channel power ratio (ACPR) of the designed PA after digital predistortion (DPD) decreases from -28. 3 and -27. 5 dBc to -51.9 and -54. 0 dBc, respectively, for a 4-carrier 20 MHz WCDMA signal with 7. 1 dB peak to average power ratio (PAPR). The drain efficiency (DE) of the PA is 37. 8% at an average output power of 33. 3 dBm. The designed power amplifier can be aoolied in the WCDMA system.
文摘Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.
基金the Special Project for Key Mechatronic Equipment of Zhejiang Province (No. 2006C11067)the Science&Technology Project of Zhejiang Province (No. 2005E10049), China
文摘To reduce mechanical vibrations induced by big errors compensation, a new software compensation method based on an improved digital differential analyzer (DDA) interpolator for static and quasi-static errors of machine tools is proposed. Based on principle of traditional DDA interpolator, a DDA interpolator is divided into command generator and command analyzer. There are three types of errors, considering the difference of positions between compensation points and interpolation segments. According to the classification, errors are distributed evenly in data processing and compensated to certain interpolation segments in machining. On-line implementation results show that the proposed approach greatly improves positioning accuracy of computer numerical control (CNC) machine tools.
基金Project(2019JJ20028)supported by the Outstanding Youth Science Foundations of Hunan Province of ChinaProject(51774321)supported by the National Natural Science Foundation of ChinaProject(2018YFC0604606)supported by the State Key Research Development Program of China。
文摘The deep fissured rock mass is affected by coupled effects of initial ground stress and external dynamic disturbance.In order to study the effect of internal flaw on pre-stressed rock mechanical responses and failure behavior under impact loading,intact granite specimens and specimens with different flaw inclinations are tested by a modified split Hopkinson pressure bar(SHPB)and digital image correlation(DIC)method.The results show that peak strain and dynamic strength of intact specimens and specimens with different flaw angles(α)decrease with the increase of axial static pressure.The 90°flaw has weak reduction effect on peak strain,dynamic strength and combined strength,while 45°and 0°flaws have remarkable reduction effect.Specimens with 90°flaw are suffered combined shear and tensile failure under middle and low axial static pre-stresses,and suffered shear failure under high axial static pre-stresses.Specimens with 45°and 0°flaws are suffered oblique shear failure caused by pre-existing flaw under different axial static pre-stresses.Besides,based on digital image correlation method,it is found that micro-cracks before formation of macro fractures(include shear and tensile fractures)belong to tensile cracks.Tensile and shear strain localizations at pre-existing flaw tip for specimen with 45°and 0°flaws are produced much earlier than that at other positions.
文摘The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12.
基金Project(2021YFF0500200) supported by the National Key R&D Program of ChinaProject(52105437) supported by the National Natural Science Foundation of China+1 种基金Project(202006120184) supported by the Heilongjiang Provincial Postdoctoral Science Foundation,ChinaProject(LBH-Z20054) supported by the China Scholarship Council。
文摘The model of heat source(MHS) which reflects the thermal interaction between materials and laser during processing determines the accuracy of simulation results. To acquire desirable simulations results, although various modifications of heat sources in the aspect of absorption process of laser by materials have been purposed, the distribution of laser power density(DLPD) in MHS is still modeled theoretically. However, in the actual situations of laser processing, the DLPD is definitely different from the ideal models. So, it is indispensable to build MHS using actual DLPD to improve the accuracy of simulation results. Besides, an automatic modeling method will be benefit to simplify the tedious pre-processing of simulations. This paper presents a modeling method and corresponding algorithm to model heat source using measured DLPD. This algorithm automatically processes original data to get modeling parameters and provides a step MHS combining with absorption models. Simulations and experiments of heat transfer in steel plates irradiated by laser prove the mothed and the step MHS. Moreover, the investigations of laser induced thermal-crack propagation in glass highlight the signification of modeling heat source based on actual DLPD and demonstrate the enormous application of this method in the simulation of laser processing.
文摘The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.
文摘Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
文摘The article deals with the question of the possibility of a new interpretation of Picasso’s picture entitled Crucifixion, which was created in the context of the art paradigm shift in the 1930s when the master focused his attention to the return to painting as a reference framework of myth and religion. But this return was only a turning point towards a modern understanding of the world and art from other sources. It should be noted that the problem of pictorial turn nowadays has a strong impact on the postmodern theology, which encompasses various cultural traditions, and also quite opposite philosophical attitudes. The article shows, thus, the inner relationship and connection between painting art and the search for transgression in the language that was the idea of Bataille. In the first part of this article, author tries to show the consequences of Bataille’s thinking of transgression; the second part has attempted to articulate the problems of interpretation of Picasso’s canvas Crucifixion; and concluding remarks is an attempt to review the emphasis on relationship with pictorial turn and transformations in the notion of contemporary art concerning the body as a sovereign event of the freedom and sacrifice.