In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes pro...In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.展开更多
Four different welding sequences of double-pulse MIG welding were conducted for 6061-T6 aluminum alloy automobile bumpers by using nonlinear elastoplasticity finite element method based on ABAQUS software.The post-wel...Four different welding sequences of double-pulse MIG welding were conducted for 6061-T6 aluminum alloy automobile bumpers by using nonlinear elastoplasticity finite element method based on ABAQUS software.The post-welding residual stress and deformation were definitely different among the four welding sequences.The results showed that the highest temperature in Solution A was approximately 200℃higher than the melting point of base metal.High residual stress was resulted from this large temperature gradient and mainly concentrated on the welding vicinity between beam and crash box.The welding deformation primarily occurred in both of the contraction of two-ends of the beam and the self-contraction of crash box.Compared with other welding sequences,the residual stress in Solution A was the smallest,whereas the welding deformation was the largest.However,the optimal sequence was Solution B because of the effective reduction of residual stress and good assembly requirements.展开更多
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a...Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.展开更多
In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based struct...In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks.展开更多
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co...The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.展开更多
Extreme coastal events require careful prediction of wave forces. Recent tsunamis have resulted in extensive damage of coastal structures. Such scenarios are the result of the action of long waves on structures. In th...Extreme coastal events require careful prediction of wave forces. Recent tsunamis have resulted in extensive damage of coastal structures. Such scenarios are the result of the action of long waves on structures. In this paper, the efficiency of vegetation as a buffer system in attenuating the incident ocean waves was studied through a well controlled experimental program. The study focused on the measurement of forces resulting from cnoidal waves on a model building mounted over a slope in the presence and absence of vegetation. The vegetative parameters, along with the width of the green belt, its position from the reference line, the diameter of the individual stems as well as the spacing between them, and their rigidity are varied so as to obtain a holistic view of the wave-vegetation interaction problem. The effect of vegetation on variations of dimensional forces with a Keulegan-Carpenter number (KC) was discussed in this paper. It has been shown that when vegetal patches are present in front of structure, the forces could be limited to within F*≤I, by a percentile of 92%, 90%, 55%, and 96%, respectively for gap ratios of 0.0, 0.5, 1.0, and 1.5. The force is at its maximum for the gap ratio of 1.0 and beyond which the forces start to diminish.展开更多
文摘In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.
基金Projects(31665004,31715011) supported by the Open Fund of State Key Laboratory of Advanced Design and Manufacture for Vehicle Body,Hunan University,ChinaProject(15C0450) supported by the Educational Commission of Hunan Province of China
文摘Four different welding sequences of double-pulse MIG welding were conducted for 6061-T6 aluminum alloy automobile bumpers by using nonlinear elastoplasticity finite element method based on ABAQUS software.The post-welding residual stress and deformation were definitely different among the four welding sequences.The results showed that the highest temperature in Solution A was approximately 200℃higher than the melting point of base metal.High residual stress was resulted from this large temperature gradient and mainly concentrated on the welding vicinity between beam and crash box.The welding deformation primarily occurred in both of the contraction of two-ends of the beam and the self-contraction of crash box.Compared with other welding sequences,the residual stress in Solution A was the smallest,whereas the welding deformation was the largest.However,the optimal sequence was Solution B because of the effective reduction of residual stress and good assembly requirements.
文摘Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.
基金This paper was supported in part by the National Natural Sci-ence Foundation of China under Crant No.61070164 the Science and Technology Planning Project of Guangdong Province, China under Crants No. 201013010600025, No. 2010A032000002 the Nat-ural Science Foundation of Guangdong Province, China under Ca-ant No. 815106 32010000022.
文摘In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks.
基金Supported by the National Natural Science Foundation of China (No.61003236, 61171053, 61170065)the Doctoral Fund of Ministry of Education of China (No.20113223110002)the Natural Science Major Program for Colleges and Universities in Jiangsu Province(No.11KJA520001)
文摘The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
文摘Extreme coastal events require careful prediction of wave forces. Recent tsunamis have resulted in extensive damage of coastal structures. Such scenarios are the result of the action of long waves on structures. In this paper, the efficiency of vegetation as a buffer system in attenuating the incident ocean waves was studied through a well controlled experimental program. The study focused on the measurement of forces resulting from cnoidal waves on a model building mounted over a slope in the presence and absence of vegetation. The vegetative parameters, along with the width of the green belt, its position from the reference line, the diameter of the individual stems as well as the spacing between them, and their rigidity are varied so as to obtain a holistic view of the wave-vegetation interaction problem. The effect of vegetation on variations of dimensional forces with a Keulegan-Carpenter number (KC) was discussed in this paper. It has been shown that when vegetal patches are present in front of structure, the forces could be limited to within F*≤I, by a percentile of 92%, 90%, 55%, and 96%, respectively for gap ratios of 0.0, 0.5, 1.0, and 1.5. The force is at its maximum for the gap ratio of 1.0 and beyond which the forces start to diminish.