Experimental results of new type joints between the column and the. steel beam of concrete-filled rectangular steel tubular (CFRT) under reversed cyclic loads are presented. The earthquake resistant capacity of the ...Experimental results of new type joints between the column and the. steel beam of concrete-filled rectangular steel tubular (CFRT) under reversed cyclic loads are presented. The earthquake resistant capacity of the joint is influenced by infilled concrete, stiffener length and relative dimensions of column and beam. It is found that the hysteresis curves obtained in the experiment are full and the joints have a good energy dissipation capacity. The nonlinear finite element models are also used to analyze the hysteresis behavior of the joints under reversed cyclic loads using ANSYS 8.0. The influences of the stiffener length and the infilled concrete are analyzed. Analytical results show that the stiffener length and the infilled concrete are critical for the joints. Furthermore, the skeleton curves of the finite element models are in good agreement with those of experiments.展开更多
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,prop...In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,propose an efficient three-phase framework and corresponding algorithms for dealing with this problem.Firstly,a greedy scheduling algorithm based on the lower bound of the ergodic rate is performed for generating an elementary cluster in the first phase.And then the elementary cluster is divided into many small clusters according to the following proposed algorithms based on the short term instantaneous information in the second phase.In the end,based on the limited feedback two zero-forcing(ZF) precoding strategies are adopted for reducing the intra-cluster interference in the third phase.The provided Monte Carlo simulations show the effectiveness of our proposed algorithms in the respect of system spectral efficiency and average user rate.展开更多
In order to evaluate the seismic behavior of confined RC column-composite beam joints, five interior joints were tested under low cyclic reversed load. The weakening extent of flanges, the number of studs, and whether...In order to evaluate the seismic behavior of confined RC column-composite beam joints, five interior joints were tested under low cyclic reversed load. The weakening extent of flanges, the number of studs, and whether to reinforce weakened flanges were used as parameters in designing these five joints. Failure characteristics, hysteretic curves, skeleton curves, ductility, energy dissipation, strength degradation, and stiffness degradation were analyzed. The test results revealed that the steel beam flanges in the joints were equivalent to the tie rod. Weakened flanges resulted in poor seismic behavior; however, the seismic behavior could be improved by increasing studs and reinforcing weakened flanges. The joint steel plate hoops, equivalent to stirrups, did not yield when the maximum load was reached, but yielded when the failure load was reached for the joints with shear failure. Increasing stud-type joints and reinforcing flange-type joints ensured good seismic behavior and met project requirements. Based on the experimental results, the failure mechanism of the joints was discussed, and the shear capacity equations of the joints was presented.展开更多
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc...Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.展开更多
基金Supprorted by the Science and Technology Foundation of Jiangsu Construction Committee(JS200214)the Science Research Foundation of Nanjing Institute of Technology(KXJ08122)~~
文摘Experimental results of new type joints between the column and the. steel beam of concrete-filled rectangular steel tubular (CFRT) under reversed cyclic loads are presented. The earthquake resistant capacity of the joint is influenced by infilled concrete, stiffener length and relative dimensions of column and beam. It is found that the hysteresis curves obtained in the experiment are full and the joints have a good energy dissipation capacity. The nonlinear finite element models are also used to analyze the hysteresis behavior of the joints under reversed cyclic loads using ANSYS 8.0. The influences of the stiffener length and the infilled concrete are analyzed. Analytical results show that the stiffener length and the infilled concrete are critical for the joints. Furthermore, the skeleton curves of the finite element models are in good agreement with those of experiments.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
基金supported by the National Natural Science Foundation of China(NSFC) under Grant(No. 61461136001)
文摘In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,propose an efficient three-phase framework and corresponding algorithms for dealing with this problem.Firstly,a greedy scheduling algorithm based on the lower bound of the ergodic rate is performed for generating an elementary cluster in the first phase.And then the elementary cluster is divided into many small clusters according to the following proposed algorithms based on the short term instantaneous information in the second phase.In the end,based on the limited feedback two zero-forcing(ZF) precoding strategies are adopted for reducing the intra-cluster interference in the third phase.The provided Monte Carlo simulations show the effectiveness of our proposed algorithms in the respect of system spectral efficiency and average user rate.
基金Supported by the National Natural Science Foundation of China(No.51209094)
文摘In order to evaluate the seismic behavior of confined RC column-composite beam joints, five interior joints were tested under low cyclic reversed load. The weakening extent of flanges, the number of studs, and whether to reinforce weakened flanges were used as parameters in designing these five joints. Failure characteristics, hysteretic curves, skeleton curves, ductility, energy dissipation, strength degradation, and stiffness degradation were analyzed. The test results revealed that the steel beam flanges in the joints were equivalent to the tie rod. Weakened flanges resulted in poor seismic behavior; however, the seismic behavior could be improved by increasing studs and reinforcing weakened flanges. The joint steel plate hoops, equivalent to stirrups, did not yield when the maximum load was reached, but yielded when the failure load was reached for the joints with shear failure. Increasing stud-type joints and reinforcing flange-type joints ensured good seismic behavior and met project requirements. Based on the experimental results, the failure mechanism of the joints was discussed, and the shear capacity equations of the joints was presented.
基金National Natural Science Foundation of China(No.61163009)。
文摘Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.