In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
Gas flexible pipes are critical multi-layered equipment for offshore oil and gas development.Under high pressure conditions,small molecular components of natural gas dissolve into the polymer inner liner of the flexib...Gas flexible pipes are critical multi-layered equipment for offshore oil and gas development.Under high pressure conditions,small molecular components of natural gas dissolve into the polymer inner liner of the flexible pipes and further diffuse into the annular space,incurring annular pressure build-up and/or production of acidic environment,which poses serious challenges to the structure and integrity of the flexible pipes.Gas permeation in pipes is a complex phenomenon governed by various factors such as internal pressure and temperature,annular structure,external temperature.In a long-distance gas flexible pipe,moreover,gas permeation exhibits non-uniform features,and the gas permeated into the annular space flows along the metal gap.To assess the complex gas transport behavior in long-distance gas flexible pipes,a mathematical model is established in this paper considering the multiphase flow phenomena inside the flexible pipes,the diffusion of gas in the inner liner,and the gas seepage in the annular space under varying permeable properties of the annulus.In addition,the effect of a variable temperature is accounted.A numerical calculation method is accordingly constructed to solve the coupling mathematical equations.The annular permeability was shown to significantly influence the distribution of annular pressure.As permeability increases,the annular pressure tends to become more uniform,and the annular pressure at the wellhead rises more rapidly.After annular pressure relief followed by shut-in,the pressure increase follows a convex function.By simulating the pressure recovery pattern after pressure relief and comparing it with test results,we deduce that the annular permeability lies between 123 and 512 m D.The results help shed light upon assessing the annular pressure in long distance gas flexible pipes and thus ensure the security of gas transport in the emerging development of offshore resources.展开更多
Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides...Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides better mobility,flexibility,and convenience due to its simplicity in hardware implementation and longer transmission distances.In this paper,we consider an MRCWPT system with multiple power transmitters,one intended power receiver and multiple unintended power receivers.We investigate the probabilistic robust beamforming designs and provide efficient algorithms to achieve the local optimums under two different criteria,i.e.,total source power minimization problem and min-max unintended receiving power restriction problem.As the problems are quite typical in robust design situations,our proposed robust beamformers can be conveniently applied to other probabilistic robust design problems,thus reduce the complexity as well as improve the beamforming performance.Numerical results demonstrate that the proposed algorithms can significantly improve the performance as well as the robustness of the WPT system.展开更多
This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration ...This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration of the case where eavesdroppers hide around certain targets.Focusing on the users that work in harvesting-transmitting mode with time switching receivers,we establish communication model via time division multiple access.On this basis,we propose a lightweight secure transmission scheme based on dual-thresholds for physical-layer security enhancement,which consists of two protocols applied to the downlink(DL) and uplink(UL) transmission respectively.In the DL,we design a dynamic information-power switching transmission protocol based on signal-to-noise ratio threshold,which provides an opportunistic approach to reform the fixed period allocation of information and power transfer;in the UL,an energy threshold is proposed for users to control the transmission,which is called a user-led on-off transmission protocol.Furthermore,we give a comprehensive performance analysis for the proposed scheme in terms of delay,reliability,security and secrecy throughput.Based on the analysis results,we optimize the two thresholds and the DL-UL allocationcoefficient to maximize the secrecy throughput.Simulation results show the proposed scheme can bring about a substantial secrecy gain.展开更多
The experiments of large consumers direct power trading is conducting in china nationwide, and it’s important to the reform of electricity market. To compensated efficiencies in security correction of large consumers...The experiments of large consumers direct power trading is conducting in china nationwide, and it’s important to the reform of electricity market. To compensated efficiencies in security correction of large consumers direct power trading, a novel security correction method based on DC power transfer distribution factor was proposed. Using the presented method to comply security correction, all the transactions that satisfy the specific requirements of maximizing social welfare are able to enter security correction process, and when the power of transmission line is out of limit, this method avoid the transaction which causes this problem is abandoned directly by introducing supplement transactions. The simulation has shown that the proposed security correction method of large consumers direct power trading based on DC power transfer distribution factor is effective.展开更多
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra...In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.展开更多
The over-exploitation of water resources in the Haihe River Basin (HRB) has now become a serious problem. This is clearly evidenced by the fact that many local rivers and lakes are drying up and the total amount of ...The over-exploitation of water resources in the Haihe River Basin (HRB) has now become a serious problem. This is clearly evidenced by the fact that many local rivers and lakes are drying up and the total amount of over-exploited groundwater has reached over 1000×10^8m^3. It is important to note that the exploitation of water resources in HRB was reasonable before 1979. After 1980, however, over-exploitation happened with an annual average amount of 40×10^8m^3. Both the dry season and rapid economic growth in HRB took place at the same time. Therefore, the over-exploitation of water in HRB was actually the negative result of the conjunction of a continuous dry season and rapid economic growth. So the over-exploitation would not be as serious as it is today if either of the above two stopped. After the first stage of south-to-north water transfer project, the water shortage problem in HRB could be eased for the following reasons: firstly, water transfer project will bring to the Basin 60x108m3 water resources; secondly, a wet season will come back eventually according to natural law of climate variability; finally, its agricultural and industrial use and total water consumption all have decreased from the peak value, so that the groundwater table will raise certainly and ecological water in rivers and lakes that were dried-up will be partly restored. In the future, the main problem of water resources security in HRB will include water pollution, operation risk of the south-to-north water transfer project, groundwater pollution and engineering geological hazards that may be brought by groundwater rise. The proposed countermeasures are as follows: keeping strengthening water demand management, raising water price as well as subsidies for the low- income family and improving other water related policies, preventing and dealing with water pollution seriously and getting fully prepared for the operation of south-to-north water transfer project.展开更多
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
基金supported by the Natural Science Research Project of Guangling College of Yangzhou University,China (ZKZD18004)General Program of Natural Science Research in Higher Education Institutions of Jiangsu Province,China (20KJD430006)。
文摘Gas flexible pipes are critical multi-layered equipment for offshore oil and gas development.Under high pressure conditions,small molecular components of natural gas dissolve into the polymer inner liner of the flexible pipes and further diffuse into the annular space,incurring annular pressure build-up and/or production of acidic environment,which poses serious challenges to the structure and integrity of the flexible pipes.Gas permeation in pipes is a complex phenomenon governed by various factors such as internal pressure and temperature,annular structure,external temperature.In a long-distance gas flexible pipe,moreover,gas permeation exhibits non-uniform features,and the gas permeated into the annular space flows along the metal gap.To assess the complex gas transport behavior in long-distance gas flexible pipes,a mathematical model is established in this paper considering the multiphase flow phenomena inside the flexible pipes,the diffusion of gas in the inner liner,and the gas seepage in the annular space under varying permeable properties of the annulus.In addition,the effect of a variable temperature is accounted.A numerical calculation method is accordingly constructed to solve the coupling mathematical equations.The annular permeability was shown to significantly influence the distribution of annular pressure.As permeability increases,the annular pressure tends to become more uniform,and the annular pressure at the wellhead rises more rapidly.After annular pressure relief followed by shut-in,the pressure increase follows a convex function.By simulating the pressure recovery pattern after pressure relief and comparing it with test results,we deduce that the annular permeability lies between 123 and 512 m D.The results help shed light upon assessing the annular pressure in long distance gas flexible pipes and thus ensure the security of gas transport in the emerging development of offshore resources.
基金supported by National Natural Science Foundation of China(Grant No.61771185,61831013)Science and Technology Research Project of Henan Province(Grant No.182102210044)+1 种基金Key Scientific Research Program of Henan Higher Education(Grant No.18A510009)Beijing Municipal Natural Science Foundation(Grant No.4182030)
文摘Wireless power transfer(WPT) to support mobile and portable devices is an emerging wireless technique.Among all kinds of approaches,magnetic resonance coupling(MRC) is an excellent one for mid-range WPT,which provides better mobility,flexibility,and convenience due to its simplicity in hardware implementation and longer transmission distances.In this paper,we consider an MRCWPT system with multiple power transmitters,one intended power receiver and multiple unintended power receivers.We investigate the probabilistic robust beamforming designs and provide efficient algorithms to achieve the local optimums under two different criteria,i.e.,total source power minimization problem and min-max unintended receiving power restriction problem.As the problems are quite typical in robust design situations,our proposed robust beamformers can be conveniently applied to other probabilistic robust design problems,thus reduce the complexity as well as improve the beamforming performance.Numerical results demonstrate that the proposed algorithms can significantly improve the performance as well as the robustness of the WPT system.
基金supported in part by China High-Tech RD Program(863 Program) SS2015AA011306National Natural Science Foundation of China under Grants No.61379006,61401510,61501516,61521003
文摘This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration of the case where eavesdroppers hide around certain targets.Focusing on the users that work in harvesting-transmitting mode with time switching receivers,we establish communication model via time division multiple access.On this basis,we propose a lightweight secure transmission scheme based on dual-thresholds for physical-layer security enhancement,which consists of two protocols applied to the downlink(DL) and uplink(UL) transmission respectively.In the DL,we design a dynamic information-power switching transmission protocol based on signal-to-noise ratio threshold,which provides an opportunistic approach to reform the fixed period allocation of information and power transfer;in the UL,an energy threshold is proposed for users to control the transmission,which is called a user-led on-off transmission protocol.Furthermore,we give a comprehensive performance analysis for the proposed scheme in terms of delay,reliability,security and secrecy throughput.Based on the analysis results,we optimize the two thresholds and the DL-UL allocationcoefficient to maximize the secrecy throughput.Simulation results show the proposed scheme can bring about a substantial secrecy gain.
文摘The experiments of large consumers direct power trading is conducting in china nationwide, and it’s important to the reform of electricity market. To compensated efficiencies in security correction of large consumers direct power trading, a novel security correction method based on DC power transfer distribution factor was proposed. Using the presented method to comply security correction, all the transactions that satisfy the specific requirements of maximizing social welfare are able to enter security correction process, and when the power of transmission line is out of limit, this method avoid the transaction which causes this problem is abandoned directly by introducing supplement transactions. The simulation has shown that the proposed security correction method of large consumers direct power trading based on DC power transfer distribution factor is effective.
基金supported in part by the Ministry of Science and Technology(MOST)in Taiwan under Grants MOST108-2638-E-002-002-MY2,MOST109-2222-E-005-002-MY3,MOST110-2627-M-002-002,MOST110-2221-E-260-014,MOST110-2222-E-006-011,MOST111-2218-E-005-007-MBK,and MOST111-2119-M-033-001supported in part by Higher Education Sprout Project,Ministry of Education to the Headquarters of University Advancement at National Cheng Kung University.
文摘In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.
基金supported by the National Natural Sciences Fund of China (40971298)
文摘The over-exploitation of water resources in the Haihe River Basin (HRB) has now become a serious problem. This is clearly evidenced by the fact that many local rivers and lakes are drying up and the total amount of over-exploited groundwater has reached over 1000×10^8m^3. It is important to note that the exploitation of water resources in HRB was reasonable before 1979. After 1980, however, over-exploitation happened with an annual average amount of 40×10^8m^3. Both the dry season and rapid economic growth in HRB took place at the same time. Therefore, the over-exploitation of water in HRB was actually the negative result of the conjunction of a continuous dry season and rapid economic growth. So the over-exploitation would not be as serious as it is today if either of the above two stopped. After the first stage of south-to-north water transfer project, the water shortage problem in HRB could be eased for the following reasons: firstly, water transfer project will bring to the Basin 60x108m3 water resources; secondly, a wet season will come back eventually according to natural law of climate variability; finally, its agricultural and industrial use and total water consumption all have decreased from the peak value, so that the groundwater table will raise certainly and ecological water in rivers and lakes that were dried-up will be partly restored. In the future, the main problem of water resources security in HRB will include water pollution, operation risk of the south-to-north water transfer project, groundwater pollution and engineering geological hazards that may be brought by groundwater rise. The proposed countermeasures are as follows: keeping strengthening water demand management, raising water price as well as subsidies for the low- income family and improving other water related policies, preventing and dealing with water pollution seriously and getting fully prepared for the operation of south-to-north water transfer project.