基于物理层安全理论,研究了存在窃听用户情形下协作译码转发中继网络中的安全能效问题。安全能效,即消耗单位能量所能传输的保密信息量。在满足各节点发射功率约束和中继处最小译码速率要求下,通过功率控制实现系统的安全能效最大化。...基于物理层安全理论,研究了存在窃听用户情形下协作译码转发中继网络中的安全能效问题。安全能效,即消耗单位能量所能传输的保密信息量。在满足各节点发射功率约束和中继处最小译码速率要求下,通过功率控制实现系统的安全能效最大化。针对目标函数非凸问题,利用分式规划和DC(Difference of Convex functions)规划理论把目标函数分解为子函数通过迭代来进行优化求解。仿真结果表明,能效优化可以显著提升系统的安全能效。展开更多
In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed an...In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed and simulated in this paper which makes the UAV satisfy requirements of different missions. At first, the digital map information is processed vdth an integrated terrain smoothing algorithm, and a safe flight surface which integrates the vehicle dynamic is built and added on the terrain, and then, models of the complicated threats are established and integrated into the digital terrain. At last, an improved A * algorithm is used to plan the three-dimension path on the safe sur- face, and then smooth the path. Simulation results indicate that the approach has a good perform- ance in creating an optimal path in the three-dimension environment and the path planning algorithm is more simple, efficient and easily realized in the engineering field.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
China has achieved a political consensus around the need to transform the path of economic growth toward one that lowers carbon intensity and ultimately leads to reductions in carbon emissions, but there remain differ...China has achieved a political consensus around the need to transform the path of economic growth toward one that lowers carbon intensity and ultimately leads to reductions in carbon emissions, but there remain different views on pathways that could achieve such a transformation. The essential question is whether radical or incremental reforms are required in the coming decades. This study explores relevant pathways in China beyond 2020, particularly modeling the major target choices of carbon emission peaking in China around 2030 as China-US Joint Announcement by an integrated assessment model for climate change IAMC based on carbon factor theory. Here scenarios DGS-2020, LGS2025, LBS-2030 and DBS-2040 derived from the historical pathways of developed countries are developed to access the comprehensive impacts on the economy, energy and climate security for the greener development in China. The findings suggest that the period of 2025--2030 is the window of opportunity to achieve a peak in carbon emissions at a level below 12 Gt CO2 and 8.5 t per capita by reasonable trade-offs from economy growth, annually -0.2% in average and cumulatively -3% deviation to BAU in 2030. The oil and natural gas import dependence will exceed 70% and 45% respectively while the non-fossil energy and electricity share will rise to above 20% and 45%. Meantime, the electrification level in end use sectors will increase substantially and the electricity energy ratio approaching 50%, the labor and capital productivity should be double in improvements and the carbon intensity drop by 65% by 2030 compared to the 2005 level, and the cumulative emission reductions are estimated to be more than 20 Gt CO2 in 2015-2030.展开更多
The European Structural Integrity Assessment Procedure(SINTAP) was applied to the assessment of welded joints of the API 5L X65 pipeline steel with an assumed embedded flaw and surface flaw at the weld toe. At defau...The European Structural Integrity Assessment Procedure(SINTAP) was applied to the assessment of welded joints of the API 5L X65 pipeline steel with an assumed embedded flaw and surface flaw at the weld toe. At default level( level 0), the assessment point was established by esti- mating fracture toughness value K1c conservatively from Charpy energy test data. At the same time, the analysis level 1 (basic level)was applied based on the fracture toughness CTOD. Then the two assessment levels were compared. The assessment results show that all assessment points are located within the failure lines of analysis levels 0 and 1. So the welded joint of the pipeline is safe. It can be concluded that the assessment based on Charpy absorbed energy is practicable when other fracture toughness data are not available, or cannot be easily obtained. The results are conservative.展开更多
Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WS...Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WSNs in confined underground area such as coal face and laneway, we presents an energy- efficient clustering routing protocol based on weight (ECRPW) to prolong the lifetime of networks. ECRPW takes into consideration the nodes' residual energy during the election process of cluster heads. The constraint of distance threshold is used to optimize cluster scheme. Furthermore, the protocol also sets up a routing tree based on cluster heads' weight. The results show that ECRPW had better perfor- mance in energy consumption, death ratio of node and network lifetime.展开更多
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res...Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.展开更多
文摘基于物理层安全理论,研究了存在窃听用户情形下协作译码转发中继网络中的安全能效问题。安全能效,即消耗单位能量所能传输的保密信息量。在满足各节点发射功率约束和中继处最小译码速率要求下,通过功率控制实现系统的安全能效最大化。针对目标函数非凸问题,利用分式规划和DC(Difference of Convex functions)规划理论把目标函数分解为子函数通过迭代来进行优化求解。仿真结果表明,能效优化可以显著提升系统的安全能效。
文摘In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed and simulated in this paper which makes the UAV satisfy requirements of different missions. At first, the digital map information is processed vdth an integrated terrain smoothing algorithm, and a safe flight surface which integrates the vehicle dynamic is built and added on the terrain, and then, models of the complicated threats are established and integrated into the digital terrain. At last, an improved A * algorithm is used to plan the three-dimension path on the safe sur- face, and then smooth the path. Simulation results indicate that the approach has a good perform- ance in creating an optimal path in the three-dimension environment and the path planning algorithm is more simple, efficient and easily realized in the engineering field.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
基金supported by National Science and Technology Program"The Key Supporting Research of The International Negotiations on Climate Change and the Domestic Emission Reduction"(2012BAC20B04)
文摘China has achieved a political consensus around the need to transform the path of economic growth toward one that lowers carbon intensity and ultimately leads to reductions in carbon emissions, but there remain different views on pathways that could achieve such a transformation. The essential question is whether radical or incremental reforms are required in the coming decades. This study explores relevant pathways in China beyond 2020, particularly modeling the major target choices of carbon emission peaking in China around 2030 as China-US Joint Announcement by an integrated assessment model for climate change IAMC based on carbon factor theory. Here scenarios DGS-2020, LGS2025, LBS-2030 and DBS-2040 derived from the historical pathways of developed countries are developed to access the comprehensive impacts on the economy, energy and climate security for the greener development in China. The findings suggest that the period of 2025--2030 is the window of opportunity to achieve a peak in carbon emissions at a level below 12 Gt CO2 and 8.5 t per capita by reasonable trade-offs from economy growth, annually -0.2% in average and cumulatively -3% deviation to BAU in 2030. The oil and natural gas import dependence will exceed 70% and 45% respectively while the non-fossil energy and electricity share will rise to above 20% and 45%. Meantime, the electrification level in end use sectors will increase substantially and the electricity energy ratio approaching 50%, the labor and capital productivity should be double in improvements and the carbon intensity drop by 65% by 2030 compared to the 2005 level, and the cumulative emission reductions are estimated to be more than 20 Gt CO2 in 2015-2030.
基金Supported by National Natural Science Foundation of China(No. 50375109)
文摘The European Structural Integrity Assessment Procedure(SINTAP) was applied to the assessment of welded joints of the API 5L X65 pipeline steel with an assumed embedded flaw and surface flaw at the weld toe. At default level( level 0), the assessment point was established by esti- mating fracture toughness value K1c conservatively from Charpy energy test data. At the same time, the analysis level 1 (basic level)was applied based on the fracture toughness CTOD. Then the two assessment levels were compared. The assessment results show that all assessment points are located within the failure lines of analysis levels 0 and 1. So the welded joint of the pipeline is safe. It can be concluded that the assessment based on Charpy absorbed energy is practicable when other fracture toughness data are not available, or cannot be easily obtained. The results are conservative.
基金supports provided by the National Natural Science Foundation of China (No.50904070)the China Postdoctoral Science Foundation (No.20100471009)+2 种基金the National High Technology Research and Development Program of China (Nos. 2008AA062200 and2007AA01Z180)the Key Project of Jiangsu (No. BG2007012)the Science Foundation of China University of Mining and Technology (No. OC080303)
文摘Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WSNs in confined underground area such as coal face and laneway, we presents an energy- efficient clustering routing protocol based on weight (ECRPW) to prolong the lifetime of networks. ECRPW takes into consideration the nodes' residual energy during the election process of cluster heads. The constraint of distance threshold is used to optimize cluster scheme. Furthermore, the protocol also sets up a routing tree based on cluster heads' weight. The results show that ECRPW had better perfor- mance in energy consumption, death ratio of node and network lifetime.
文摘Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.