In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all...In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.展开更多
In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist ...In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist or not in the one-dimensional lattice chains is an interesting problem. By using the number state method and the Hartree approximation combined with the method of multiple scales, we investigate quantum solirons and localized modes in a one-dimensional lattice chain with the nonlinear substrate potential. It is shown that quantum solitons do exist in this nonlinear lattice chain, and at the boundary of the phonon Brillouin zone, quantum solitons become quantum localized modes, phonons are pinned to the lattice of the vicinity at the central position j = j0.展开更多
We propose a new scripting model for rapid and easier development of packet processing using shell scripts. In this paper we present EtherPIPE, a character network I/O device, that allows the programmer to access netw...We propose a new scripting model for rapid and easier development of packet processing using shell scripts. In this paper we present EtherPIPE, a character network I/O device, that allows the programmer to access network traffic data as a file through UNIX commands. By setting a UNIX pipe "r' from or to EtherP1PE's output or input with UNIX commands, packets can be easily processed, executing functions such as packet filtering, packet capturing, generating arbitrary packets, and rewriting header information. In order to prove the utilities of our model, we have developed FPGA-based EtherPIPE adapter using a commodity FPGA card and a character device driver featuring new offloading functions. With our prototype implementation, packet scripting works at 1Gbps wire-speed, receiving packets with precise hardware timestamps. This paper argues for use cases of the EtherPIPE, and discusses enhanced formats of character devices for easier network scripting.)展开更多
We propose an effective and useful numerical simulation scheme for the investigation of the ultra-fast laser pulses in tenuous plasmas. The accuracy of the method is tested by numerical examples. We check some special...We propose an effective and useful numerical simulation scheme for the investigation of the ultra-fast laser pulses in tenuous plasmas. The accuracy of the method is tested by numerical examples. We check some special examples to investigate the laser envelope evolving and modulation in plasmas. Asymmetric two-peak modulation structure is found and its underlying physics is analyzed. The advantages and shortages of the method are also discussed.展开更多
A boiler drum BDT921 that is installed in the Control Laboratory, Department of Mechatronics and Robotics Engineering, Faculty of Electric and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM) is be...A boiler drum BDT921 that is installed in the Control Laboratory, Department of Mechatronics and Robotics Engineering, Faculty of Electric and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM) is being used as a model plant to achieve the digital control system since its analog. Implementing a digital system to boiler quite a though work. This paper covers analysis from the experiment done to match with digital design that will be implemented to the real system. The digital control design will come up with the mathematical model and will be analyzed with MATLAB and SIMULINK software named as "Discrete Analysis ofBDT921 Simulation". A proportional integral and derivative (PID) controller is being chosen as the control element in discrete form as the real system is using the same control element. The output responses behave as the second order system with a bit difference in rise times and peak times compared with data obtained from experiment. With regarding to the analysis done, the digital control can be implemented and for further viewing, to be controlled digitally with computer in the control room.展开更多
基金supported partly by the following funding agencies:the National Natural Science Foundation(No.61170274)the Innovative Research Groups of the National Natural Science Foundation(No.61121061)+1 种基金the National Key Basic Research Program of China (No.2011CB302506)Youth Scientific Research and Innovation Plan of Beijing University of Posts and Telecommunications(No. 2013RC1101)
文摘In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.
基金The project supported by the Natural Science Foundation of Hunan Province of China under Grant No. 03JJY6008
文摘In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist or not in the one-dimensional lattice chains is an interesting problem. By using the number state method and the Hartree approximation combined with the method of multiple scales, we investigate quantum solirons and localized modes in a one-dimensional lattice chain with the nonlinear substrate potential. It is shown that quantum solitons do exist in this nonlinear lattice chain, and at the boundary of the phonon Brillouin zone, quantum solitons become quantum localized modes, phonons are pinned to the lattice of the vicinity at the central position j = j0.
文摘We propose a new scripting model for rapid and easier development of packet processing using shell scripts. In this paper we present EtherPIPE, a character network I/O device, that allows the programmer to access network traffic data as a file through UNIX commands. By setting a UNIX pipe "r' from or to EtherP1PE's output or input with UNIX commands, packets can be easily processed, executing functions such as packet filtering, packet capturing, generating arbitrary packets, and rewriting header information. In order to prove the utilities of our model, we have developed FPGA-based EtherPIPE adapter using a commodity FPGA card and a character device driver featuring new offloading functions. With our prototype implementation, packet scripting works at 1Gbps wire-speed, receiving packets with precise hardware timestamps. This paper argues for use cases of the EtherPIPE, and discusses enhanced formats of character devices for easier network scripting.)
基金The project supported by National Natural Science Foundation of China under Grant No. 10475009 and the New Century Excellent Talents of Universities of China
文摘We propose an effective and useful numerical simulation scheme for the investigation of the ultra-fast laser pulses in tenuous plasmas. The accuracy of the method is tested by numerical examples. We check some special examples to investigate the laser envelope evolving and modulation in plasmas. Asymmetric two-peak modulation structure is found and its underlying physics is analyzed. The advantages and shortages of the method are also discussed.
文摘A boiler drum BDT921 that is installed in the Control Laboratory, Department of Mechatronics and Robotics Engineering, Faculty of Electric and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM) is being used as a model plant to achieve the digital control system since its analog. Implementing a digital system to boiler quite a though work. This paper covers analysis from the experiment done to match with digital design that will be implemented to the real system. The digital control design will come up with the mathematical model and will be analyzed with MATLAB and SIMULINK software named as "Discrete Analysis ofBDT921 Simulation". A proportional integral and derivative (PID) controller is being chosen as the control element in discrete form as the real system is using the same control element. The output responses behave as the second order system with a bit difference in rise times and peak times compared with data obtained from experiment. With regarding to the analysis done, the digital control can be implemented and for further viewing, to be controlled digitally with computer in the control room.