• 제목/요약/키워드: Zhengzhou

검색결과 298건 처리시간 0.026초

Atomistic simulations of defect accumulation and evolution in heavily irradiated titanium for nuclear-powered spacecraft

  • Hai Huang;Xiaoting Yuan;Longjingrui Ma;Jiwei Lin;Guopeng Zhang;Bin Cai
    • Nuclear Engineering and Technology
    • /
    • 제55권6호
    • /
    • pp.2298-2304
    • /
    • 2023
  • Titanium alloys are expected to become one of the candidate materials for nuclear-powered spacecraft due to their excellent overall performance. Nevertheless, atomistic mechanisms of the defect accumulation and evolution of the materials due to long-term exposure to irradiation remain scarcely understood by far. Here we investigate the heavy irradiation damage in a-titanium with a dose as high as 4.0 canonical displacements per atom (cDPA) using atomistic simulations of Frenkel pair accumulation. Results show that the content of surviving defects increases sharply before 0.04 cDPA and then decreases slowly to stabilize, exhibiting a strong correlation with the system energy. Under the current simulation conditions, the defect clustering fraction may be not directly dependent on the irradiation dose. Compared to vacancies, interstitials are more likely to form clusters, which may further cause the formation of 1/3<1210> interstitial-type dislocation loops extended along the (1010) plane. This study provides an important insight into the understanding of the irradiation damage behaviors for titanium.

Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation

  • Sun, Gangcan;Liu, Mengge;Han, Zhuo;Zhao, Chuanyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.422-436
    • /
    • 2020
  • In this paper, we investigate the impact of antenna correlation on secure transmission in a multi-eavesdropper single-input multiple-output (SIMO) system, where the receiver and eavesdroppers are equipped with correlated antennas. Based on the practical passive eavesdropping system, the new closed-form expressions of secrecy outage probability (SOP) and non-zero secrecy capacity probability are derived to explore the effect of antenna correlation on the system with multiple eavesdroppers. To further analyze the secrecy performance of the investigated system, we theoretically derive the expression of asymptotic SOP to clearly show the diversity order and array gain. Finally, Monte Carlo simulations verify the effectiveness of our theoretical results.

Enhanced Locality Sensitive Clustering in High Dimensional Space

  • Chen, Gang;Gao, Hao-Lin;Li, Bi-Cheng;Hu, Guo-En
    • Transactions on Electrical and Electronic Materials
    • /
    • 제15권3호
    • /
    • pp.125-129
    • /
    • 2014
  • A dataset can be clustered by merging the bucket indices that come from the random projection of locality sensitive hashing functions. It should be noted that for this to work the merging interval must be calculated first. To improve the feasibility of large scale data clustering in high dimensional space we propose an enhanced Locality Sensitive Hashing Clustering Method. Firstly, multiple hashing functions are generated. Secondly, data points are projected to bucket indices. Thirdly, bucket indices are clustered to get class labels. Experimental results showed that on synthetic datasets this method achieves high accuracy at much improved cluster speeds. These attributes make it well suited to clustering data in high dimensional space.

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

Road Damage Detection and Classification based on Multi-level Feature Pyramids

  • Yin, Junru;Qu, Jiantao;Huang, Wei;Chen, Qiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.786-799
    • /
    • 2021
  • Road damage detection is important for road maintenance. With the development of deep learning, more and more road damage detection methods have been proposed, such as Fast R-CNN, Faster R-CNN, Mask R-CNN and RetinaNet. However, because shallow and deep layers cannot be extracted at the same time, the existing methods do not perform well in detecting objects with fewer samples. In addition, these methods cannot obtain a highly accurate detecting bounding box. This paper presents a Multi-level Feature Pyramids method based on M2det. Because the feature layer has multi-scale and multi-level architecture, the feature layer containing more information and obvious features can be extracted. Moreover, an attention mechanism is used to improve the accuracy of local boundary boxes in the dataset. Experimental results show that the proposed method is better than the current state-of-the-art methods.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

Seismic fragility analysis of corroded RC pier strengthened by engineered cementitious composites

  • Yan Liang;Jing-Xiao Shu;Cheng-Xin Zhao;Xi Dong Wang;Guang Yu Yang
    • Earthquakes and Structures
    • /
    • 제26권4호
    • /
    • pp.269-283
    • /
    • 2024
  • When a reinforced concrete (RC) structure is exposed to a corrosive environment for an extended period of time, the material qualities deteriorate, resulting in a loss in seismic performance. Engineered Cementitious Composites (ECC) have been used to reinforce the corroded RC structure, which can achieve reinforcement effectiveness for a small change in cross-section size. In this work, finite element models of unjacketed RC pier and ECC jacketed pier were established and verified by experimental tests, with the buckling effect of longitudinal reinforcement considered. Compared with the unjacketed pier, the displacement of the pier top of the ECC jacketed pier was reduced by about 9.52% under earthquake action. In the case of moderate and major earthquakes, the probability of exceedance of ECC jacketed pier is significantly reduced. For the case of rare earthquake loading, with the ECC jacket, the e of the pier experiencing serious damage and complete damage states is reduced by 10.29% and 29.78%, respectively.