During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granul...During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granular flow have not yet been elucidated.To address this gap,physical flume tests and discrete element simulations are conducted considering a range of normalized deposition height h0/H from 0 to 1,where h0 and H represent the deposition height and obstacle height,respectively.An analytical model is modified to evaluate the flow velocity and flow depth after interacting with the retained materials,which further serve to calculate the peak impact force on the obstacle.Notably,the computed impact forces successfully predict the experimental results when a≥25°.In addition,the results indicate that a higher h0/H leads to a lower dynamic impact force,a greater landing distance L,and a larger landing coefficient Cr,where Cr is the ratio of slope-parallel component of landing velocity to flow velocity just before landing.Compared to the existing overflow model,the measured landing distance L is underestimated by up to 30%,and therefore it is insufficient for obstacle design when there is retained material.Moreover,the recommended Cr in current design practice is found to be nonconservative for estimating the landing velocity of geophysical flow.This study provides insightful scientific basis for designing obstacles with deposition.展开更多
This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple...This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
In this paper,an intelligent reflecting surface(IRS)-and-unmanned aerial vehicle(UAV)-assisted two-way amplify-and-forward(AF)relay network in maritime Internet of Things(IoT)is proposed,where ship1(S1)and ship2(S2)ca...In this paper,an intelligent reflecting surface(IRS)-and-unmanned aerial vehicle(UAV)-assisted two-way amplify-and-forward(AF)relay network in maritime Internet of Things(IoT)is proposed,where ship1(S1)and ship2(S2)can be viewed as data collecting centers.To enhance the message exchange rate between S1 and S2,a problem of maximizing minimum rate is cast,where the variables,namely AF relay beamforming matrix and IRS phase shifts of two time slots,need to be optimized.To achieve a maximum rate,a low-complexity alternately iterative(AI)scheme based on zero forcing and successive convex approximation(LC-ZF-SCA)algorithm is presented.To obtain a significant rate enhancement,a high-performance AI method based on one step,semidefinite programming and penalty SCA(ONSSDP-PSCA)is proposed.Simulation results show that by the proposed LC-ZF-SCA and ONS-SDP-PSCA methods,the rate of the IRS-and-UAV-assisted AF relay network surpass those of with random phase and only AF relay networks.Moreover,ONS-SDP-PSCA perform better than LC-ZF-SCA in aspect of rate.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
This research investigates the behavior of a 2×2 pile group under two-directional lateral loads in addition to the vertical load.Through three-dimensional numerical modeling based on Flac 3D software,the study ex...This research investigates the behavior of a 2×2 pile group under two-directional lateral loads in addition to the vertical load.Through three-dimensional numerical modeling based on Flac 3D software,the study examines the total bearing capacity and efficiency coefficient of the pile group,considering factors such as the angle of lateral load,relative pile spacing,and relative stiffness of the pile-soil system.The findings highlight the significance of these factors in understanding and predicting the response of pile groups to changing lateral load directions.The results reveal that increasing the angle of the lateral load from 0°to 45°enhances both the maximum total lateral load and the efficiency coefficient of the pile group.When the relative stiffness of the pile-soil system significantly increases,soil stiffening occurs and reducing the relative spacing of the piles from 7 to 3 times the diameter of the piles diminishes the influence of the pile group.Consequently,the response of the pile group to lateral loads becomes more linear,with only a slight alteration in the maximum total lateral load and the efficiency coefficient when the lateral load is angled from 0°to 45°.Conversely,increasing the relative distance between the piles,specifically from 3 to 7 times the diameter of the piles,amplifies the influence of the pile group.Both the maximum total lateral load and the efficiency coefficient of the pile group exhibit an observed increase.These provide insights for designing pile groups and optimizing their performance under lateral loading conditions.展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent i...Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.展开更多
基金funded by the National Natural Science Foundation of China(Grant Nos.42120104002,41941019)the Research Grants Council of the Hong Kong Special Administrative Region,China(Grant No.AoE/E-603/18).
文摘During long-term operation,the performance of obstacles would be changed due to the material accumulating upslope the obstacle.However,the effects of retained material on impact,overflow and landing dynamics of granular flow have not yet been elucidated.To address this gap,physical flume tests and discrete element simulations are conducted considering a range of normalized deposition height h0/H from 0 to 1,where h0 and H represent the deposition height and obstacle height,respectively.An analytical model is modified to evaluate the flow velocity and flow depth after interacting with the retained materials,which further serve to calculate the peak impact force on the obstacle.Notably,the computed impact forces successfully predict the experimental results when a≥25°.In addition,the results indicate that a higher h0/H leads to a lower dynamic impact force,a greater landing distance L,and a larger landing coefficient Cr,where Cr is the ratio of slope-parallel component of landing velocity to flow velocity just before landing.Compared to the existing overflow model,the measured landing distance L is underestimated by up to 30%,and therefore it is insufficient for obstacle design when there is retained material.Moreover,the recommended Cr in current design practice is found to be nonconservative for estimating the landing velocity of geophysical flow.This study provides insightful scientific basis for designing obstacles with deposition.
基金supported in part by the National Key Research and Development Program of China(2019YFB2204701)in part by the National Natural Science Foundation of China(61831006,62022023,and 62250610223)in part by the Big Data Computing Center at Southeast University for numerical calculation.
文摘This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金supported in part by the National Natural Science Foundation of China (Nos.U22A2002, and 62071234)the Hainan Province Science and Technology Special Fund (ZDKJ2021022)+1 种基金the Scientific Research Fund Project of Hainan University under Grant KYQD(ZR)-21008the Collaborative Innovation Center of Information Technology, Hainan University (XTCX2022XXC07)
文摘In this paper,an intelligent reflecting surface(IRS)-and-unmanned aerial vehicle(UAV)-assisted two-way amplify-and-forward(AF)relay network in maritime Internet of Things(IoT)is proposed,where ship1(S1)and ship2(S2)can be viewed as data collecting centers.To enhance the message exchange rate between S1 and S2,a problem of maximizing minimum rate is cast,where the variables,namely AF relay beamforming matrix and IRS phase shifts of two time slots,need to be optimized.To achieve a maximum rate,a low-complexity alternately iterative(AI)scheme based on zero forcing and successive convex approximation(LC-ZF-SCA)algorithm is presented.To obtain a significant rate enhancement,a high-performance AI method based on one step,semidefinite programming and penalty SCA(ONSSDP-PSCA)is proposed.Simulation results show that by the proposed LC-ZF-SCA and ONS-SDP-PSCA methods,the rate of the IRS-and-UAV-assisted AF relay network surpass those of with random phase and only AF relay networks.Moreover,ONS-SDP-PSCA perform better than LC-ZF-SCA in aspect of rate.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
文摘This research investigates the behavior of a 2×2 pile group under two-directional lateral loads in addition to the vertical load.Through three-dimensional numerical modeling based on Flac 3D software,the study examines the total bearing capacity and efficiency coefficient of the pile group,considering factors such as the angle of lateral load,relative pile spacing,and relative stiffness of the pile-soil system.The findings highlight the significance of these factors in understanding and predicting the response of pile groups to changing lateral load directions.The results reveal that increasing the angle of the lateral load from 0°to 45°enhances both the maximum total lateral load and the efficiency coefficient of the pile group.When the relative stiffness of the pile-soil system significantly increases,soil stiffening occurs and reducing the relative spacing of the piles from 7 to 3 times the diameter of the piles diminishes the influence of the pile group.Consequently,the response of the pile group to lateral loads becomes more linear,with only a slight alteration in the maximum total lateral load and the efficiency coefficient when the lateral load is angled from 0°to 45°.Conversely,increasing the relative distance between the piles,specifically from 3 to 7 times the diameter of the piles,amplifies the influence of the pile group.Both the maximum total lateral load and the efficiency coefficient of the pile group exhibit an observed increase.These provide insights for designing pile groups and optimizing their performance under lateral loading conditions.
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.
文摘Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed.