A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time...A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time-varying meshing stiffness were taken into consideration. The differential governing equations of motion were solved by employing variable step-size Rung-Kutta numerical integration method. The behavior of dynamic load sharing characteristics affected by the system parameters including input rate, sun gear's supporting stiffness and eccentricity error, planet's eccentricity error, sun gear's bearing clearance, backlashes of sun-planet and planet-ring meshes were investigated qualitatively and systematically. Some theoretical results are summarized at last which extend the current understanding of the dynamic load sharing behavior of planet gear train, enrich the related literature and provide references for the design of planetary gear train.展开更多
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm...This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership...The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership in consensus in a blockchain scenario supports dynamic changes,which effectively prevents the corruption of consensus participants.Especially in cross-chain protocols,the dynamic access to different blockchains will inevitably bring about the demand for member dynamic.Most existing threshold cryptography schemes rely on redefined key shares,leading to a static set of secret sharing participants.In this paper,we propose a general approach to coupling blockchain consensus and dynamic secret sharing.The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals.Our scheme facilitates threshold cryptography membership dynamic,thus underlying support for membership dynamic of threshold cryptographybased BFT consensus schemes.We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme.After the correctness and security proof,our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety.Experimental results prove that our scheme obtains dynamic membership with negligible overhead.展开更多
In current researches on spectrum leasing, Common model and Property-right model are two main approaches to dynamic spectrum sharing. However, Common model does not consider the obligation of Primary System (PS) and i...In current researches on spectrum leasing, Common model and Property-right model are two main approaches to dynamic spectrum sharing. However, Common model does not consider the obligation of Primary System (PS) and is unfair to Secondary System (SS), while the cooperation based on Property-rights model has problems on its feasibility. This paper proposes a novel system model, in which a Cost-Prediction scheme for Spectrum Leasing (CPSL scheme) is designed to forecast the cost that PS would pay for leasing spectrum. Cost Function is introduced as a criterion to evaluate the potential cost of spectrum leasing for PS. The simulation results show that compared with Common model based scheme, CPSL scheme substantially improves the QoS of the delay-sensitive traffic in SS at the cost of a small degradation of PS performance.展开更多
P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b...P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.展开更多
Recently,genetic algorithms(GAs) have been applied to multi-modal dynamic optimization(MDO).In this kind of optimization,an algorithm is required not only to find the multiple optimal solutions but also to locate a dy...Recently,genetic algorithms(GAs) have been applied to multi-modal dynamic optimization(MDO).In this kind of optimization,an algorithm is required not only to find the multiple optimal solutions but also to locate a dynamically changing optimum.Our fuzzy genetic sharing(FGS) approach is based on a novel genetic algorithm with dynamic niche sharing(GADNS).FGS finds the optimal solutions,while maintaining the diversity of the population.For this,FGS uses several strategies.First,an unsupervised fuzzy clustering method is used to track multiple optima and perform GADNS.Second,a modified tournament selection is used to control selection pressure.Third,a novel mutation with an adaptive mutation rate is used to locate unexplored search areas.The effectiveness of FGS in dynamic environments is demonstrated using the generalized dynamic benchmark generator(GDBG).展开更多
Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. ...Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges.展开更多
The Space-Terrestrial Integrated Network(STIN)is considered to be a promising paradigm for realizing worldwide wireless connectivity in sixth-Generation(6G)wireless communication systems.Unfortunately,excessive interf...The Space-Terrestrial Integrated Network(STIN)is considered to be a promising paradigm for realizing worldwide wireless connectivity in sixth-Generation(6G)wireless communication systems.Unfortunately,excessive interference in the STIN degrades the wireless links and leads to poor performance,which is a bottleneck that prevents its commercial deployment.In this article,the crucial features and challenges of STIN-based interference are comprehensively investigated,and some candidate solutions for Interference Management(IM)are summarized.As traditional IM techniques are designed for single-application scenarios or specific types of interference,they cannot meet the requirements of the STIN architecture.To address this issue,we propose a self-adaptation IM method that reaps the potential benefits of STIN and is applicable to both rural and urban areas.A number of open issues and potential challenges for IM are discussed,which provide insights regarding future research directions related to STIN.展开更多
Extensive research in recent years has shown that dynamic spectrum sharing is a promising ap- proach to'address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication parad...Extensive research in recent years has shown that dynamic spectrum sharing is a promising ap- proach to'address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.展开更多
基金Project(51105194)supported by the National Natural Science Foundation of ChinaProject(20113218110017)supported by the Doctoral Program Foundation of Institutions of Higher Education of China+2 种基金Project supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,ChinaProject(CXZZ11_0199)supported by the Funding of Jiangsu Innovation Program for Graduate Education,ChinaProjects(NZ2013303,NZ2014201)supported by the Fundamental Research Funds for the Central Universities,China
文摘A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time-varying meshing stiffness were taken into consideration. The differential governing equations of motion were solved by employing variable step-size Rung-Kutta numerical integration method. The behavior of dynamic load sharing characteristics affected by the system parameters including input rate, sun gear's supporting stiffness and eccentricity error, planet's eccentricity error, sun gear's bearing clearance, backlashes of sun-planet and planet-ring meshes were investigated qualitatively and systematically. Some theoretical results are summarized at last which extend the current understanding of the dynamic load sharing behavior of planet gear train, enrich the related literature and provide references for the design of planetary gear train.
基金the Natural Science Foun-dations of China(No.62171464,61771487)the Defense Science Foundation of China(No.2019-JCJQ-JJ-221).
文摘This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
基金supported by the National Key R&D Program of China(2020YFB1005600)the Beijing Natural Science Foundation(M21031)+3 种基金the Natural Science Foundation of China through projects(U21A20467,61932011,62002011,61972019)the Populus euphratica found(CCF-HuaweiBC2021009)the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(ZCL21007)the Youth Top Talent Support Program of Beihang University(YWF-22-L-1272).
文摘The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership in consensus in a blockchain scenario supports dynamic changes,which effectively prevents the corruption of consensus participants.Especially in cross-chain protocols,the dynamic access to different blockchains will inevitably bring about the demand for member dynamic.Most existing threshold cryptography schemes rely on redefined key shares,leading to a static set of secret sharing participants.In this paper,we propose a general approach to coupling blockchain consensus and dynamic secret sharing.The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals.Our scheme facilitates threshold cryptography membership dynamic,thus underlying support for membership dynamic of threshold cryptographybased BFT consensus schemes.We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme.After the correctness and security proof,our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety.Experimental results prove that our scheme obtains dynamic membership with negligible overhead.
基金supported by the National High Technology Research and Development Program of China ('863' Program, No.2009AA01Z242)National Natural Science Foundation of China (60972080)
文摘In current researches on spectrum leasing, Common model and Property-right model are two main approaches to dynamic spectrum sharing. However, Common model does not consider the obligation of Primary System (PS) and is unfair to Secondary System (SS), while the cooperation based on Property-rights model has problems on its feasibility. This paper proposes a novel system model, in which a Cost-Prediction scheme for Spectrum Leasing (CPSL scheme) is designed to forecast the cost that PS would pay for leasing spectrum. Cost Function is introduced as a criterion to evaluate the potential cost of spectrum leasing for PS. The simulation results show that compared with Common model based scheme, CPSL scheme substantially improves the QoS of the delay-sensitive traffic in SS at the cost of a small degradation of PS performance.
基金supported in part by National Basic Research Program of China ("973 Program") under contract No.2007CB311106in part by the Special Funds for Key Program of National Standardization Committee of China No.TC260-JCYJ-W1-2008042
文摘P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.
文摘Recently,genetic algorithms(GAs) have been applied to multi-modal dynamic optimization(MDO).In this kind of optimization,an algorithm is required not only to find the multiple optimal solutions but also to locate a dynamically changing optimum.Our fuzzy genetic sharing(FGS) approach is based on a novel genetic algorithm with dynamic niche sharing(GADNS).FGS finds the optimal solutions,while maintaining the diversity of the population.For this,FGS uses several strategies.First,an unsupervised fuzzy clustering method is used to track multiple optima and perform GADNS.Second,a modified tournament selection is used to control selection pressure.Third,a novel mutation with an adaptive mutation rate is used to locate unexplored search areas.The effectiveness of FGS in dynamic environments is demonstrated using the generalized dynamic benchmark generator(GDBG).
基金supported by the National Natural Science Foundation of China (No.61402529)the Natural Science Basic Research Plan in Shanxi Province of China (No.2020JM-361)+1 种基金the Young and Middle-aged Scientific Research Backbone Projects of Engineering University of PAP (No.KYGG201905)the Basic Researchof Engineering University of PAP (Nos.WJY201920 and WJY202019)。
文摘Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges.
基金This work was supported in part by the National Key R&D Program of China(No.2020YFB1806703)the National Natural Science Foundation of China(No.61901315)+1 种基金the State Major Science and Technology Special Project(No.2018ZX03001023)the Fundamental Research Funds for the Central Universities(No.2020RC03).
文摘The Space-Terrestrial Integrated Network(STIN)is considered to be a promising paradigm for realizing worldwide wireless connectivity in sixth-Generation(6G)wireless communication systems.Unfortunately,excessive interference in the STIN degrades the wireless links and leads to poor performance,which is a bottleneck that prevents its commercial deployment.In this article,the crucial features and challenges of STIN-based interference are comprehensively investigated,and some candidate solutions for Interference Management(IM)are summarized.As traditional IM techniques are designed for single-application scenarios or specific types of interference,they cannot meet the requirements of the STIN architecture.To address this issue,we propose a self-adaptation IM method that reaps the potential benefits of STIN and is applicable to both rural and urban areas.A number of open issues and potential challenges for IM are discussed,which provide insights regarding future research directions related to STIN.
文摘Extensive research in recent years has shown that dynamic spectrum sharing is a promising ap- proach to'address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.