Tech Science Press
Not a member yet
    4999 research outputs found

    Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem

    No full text
    Due to the characteristics of chaotic systems, different cryptosystems based on chaos have been proposed to satisfy the security of multimedia data. A plain image-related chaotic algorithm is proposed by Luo et al. with high speed and efficiency. Security weaknesses of the cryptosystem are studied in this paper. It is found that the important secret key information is leaked because an important parameter can be obtained after an inverse operation in the last step of the cryptosystems without secret key. Meanwhile, the value zero is processed improperly in quantification algorithm. Based on the weaknesses, chosen plaintext attack on the cryptosystem is proposed, by which, an important parameter, equivalent to secret key, can be calculated with a specific chosen plain image. With the obtained parameter, the plain image of any ciphered image, encrypted by the cryptosystem, can be recovered. Then, an improvement is proposed to solve the problems after modifying the quantification algorithm. It is from the experiments that chosen plaintext attack is valid and improved algorithm possesses better performance

    Impact of Tactical Parameters of Aircraft on Jamming Effectiveness of Surface-Source IR Decoy

    Get PDF
    As the platform for surface-source infrared decoys, the target aircraft is the aim of attacks in air-to-air combat. It can quickly and accurately evaluate the jamming effectiveness of the surface-source IR decoy in various states of motion is important for enhancing the security of the aircraft. This paper proposes a model of surface-source IR decoy, and compares and analyzes simulated and measured infrared images of diffusion. A system to assess the effectiveness of the jamming of the surface-source IR decoy, target aircraft, and infrared guided missile called “Trinity” is established. Simulations were conducted to assess the impact of flight height, flight speed, and the maneuvering of the target aircraft on the jamming effectiveness of the surface-source IR decoy. The results show that with an increase in flight height and speed, the jamming probability of a surface-source IR decoy first increases and then decreases, where evasive maneuvering by the target aircraft can effectively improve this probability. When the radius of the vertical snake maneuver was 125 m, that of the horizontal snake maneuver was 200 m, and the radius of the barrel roll maneuver was 250 m, the jamming probability of the surface-source IR decoy was relatively high. By comparing the simulation results with measured data, the study verified the accuracy of the proposed method

    Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets

    Get PDF
    DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data. The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard. However, DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads. The main challenges in MANETs include prediction of the available bandwidth, establishing communication with neighboring nodes and predicting the consumption of bandwidth flow. These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol. In this paper, the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy. The calculation includes certain metrics like: admission control and bandwidth consumption. To compute the bandwidth of channel, bandwidth utilization and traffic priority is distinguished through dual busy tone is proposed. This operates distinctly on its own packet transmission operation. This CACP mechanism defends the conventional traffic flows from new nodes and based on the measured status information of the channel, it QoS of the admitted flows is maintained. This ensures maximum amount of bandwidth flows accommodated by resources and determines the resources in a system meet the new flow requirements while maintaining existing bandwidth flow levels

    Key Process Protection of High Dimensional Process Data in Complex Production

    Get PDF
    In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional anomaly detection model from the experimental results

    Three-Dimensional Numerical Analysis of Blast-Induced Damage Characteristics of the Intact and Jointed Rockmass

    Get PDF
    This article reports numerical results investigating the damage evolution and spatial distribution characteristics of intact and jointed rockmass subjected to blast loading. The behaviors of rock material are described by the Holmquist- Johnson-Cook (HJC) constitutive model incorporated in the finite element software LS-DYNA. Results indicate that the damage distribution shows a reverse S-shape attenuation with the increase of the distance from borehole, and a better goodness of fit with the Logistic function is observed. In the single-hole blasting of jointed rockmass, there are two types of regions around the intersection of borehole and joint in which the damage degree is quite different. The crushing damage develops in a Ψ-shape path along the joint. In the radial direction, the crushing damage and cracking damage of rock show different distribution forms with the increase of joint dip angle. As for the double-hole blasting, due to the superposition of the blast waves, the damage degree in the region between the two boreholes of intact rockmass is significantly large. For jointed rockmass, the joint has local enhancement or inhibition effect on the blast damage in the region between the two boreholes

    Localization Based Evolutionary Routing (LOBER) for Efficient Aggregation in Wireless Multimedia Sensor Networks

    Get PDF
    Efficient aggregation in wireless sensor nodes helps reduce network traffic and reduce energy consumption. The objective of this work Localization Based Evolutionary Routing (LOBER) is to achieve global optimization for aggregation and WMSN lifetime. Improved localization is achieved by a novel Centroid Based Octant Localization (CBOL) technique considering an arbitrary hexagonal region. Geometric principles of hexagon are used to locate the unknown nodes in the centroid positions of partitioned regions. Flower pollination algorithm, a meta heuristic evolutionary algorithm that is extensively applied in solving real life, complex and nonlinear optimization problems in engineering and industry is modified as Enhanced Flower Pollination Algorithm (EFPA) to fit into WMSN and enhance routing mechanism and ensure efficiency in data aggregation. The system is simulated using MATLAB and found to have a considerable improvement in the optimization process

    An Improved End-to-End Memory Network for QA Tasks

    Get PDF
    At present, End-to-End trainable Memory Networks (MemN2N) has proven to be promising in many deep learning fields, especially on simple natural language-based reasoning question and answer (QA) tasks. However, when solving some subtasks such as basic induction, path finding or time reasoning tasks, it remains challenging because of limited ability to learn useful information between memory and query. In this paper, we propose a novel gated linear units (GLU) and local-attention based end-to-end memory networks (MemN2N-GL) motivated by the success of attention mechanism theory in the field of neural machine translation, it shows an improved possibility to develop the ability of capturing complex memory-query relations and works better on some subtasks. It is an improved end-to-end memory network for QA tasks. We demonstrate the effectiveness of these approaches on the 20 bAbI dataset which includes 20 challenging tasks, without the use of any domain knowledge. Our project is open source on github4

    Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion

    Get PDF
    For the case of that only a single stego image of LSB (Least Significant Bit) matching steganography is available, the existing steganalysis algorithms cannot effectively locate the modified pixels. Therefore, an algorithm is proposed to locate the modified pixels of LSB matching based on spatial and wavelet filter fusion. Firstly, the validity of using the residuals obtained by spatial and wavelet filtering to locate the modified pixels of LSB matching is analyzed. It is pointed out that both of these two kinds of residuals can be used to identify the modified pixels of LSB matching with success rate higher than that of randomly guessing. Then, a method is proposed to measure the correlation between the results of two locating algorithms. Statistical results show that there are low correlations between the locating results of spatial filter based algorithm and wavelet filter based algorithm. Then these two kinds of residuals are fused by the voting method to improve the locating performance. The experimental results show that the proposed fusion algorithm can effectively improve the locating accuracy for the modified pixels of LSB matching

    Numerical Simulation and Optimization of a Mid-Temperature Heat Pipe Exchanger

    Get PDF
    In this paper, we take the mid-temperature gravity heat pipe exchanger as the research object, simulate the fluid flow field, temperature field and the working state of heat pipe in the heat exchanger by Fluent software. The effects of different operating parameters and fin parameters on the heat transfer performance of heat exchangers are studied. The results show that the heat transfer performance of the mid-temperature gravity heat pipe exchanger is the best when the fin spacing is between 5 mm and 6 mm, the height of the heat pipe is between 12 mm and 13 mm, and the inlet velocity of the fluid is between 2.5 m/s to 3 m/s

    Characterizing the Mechanical Variations of Human Femoropopliteal Artery During Aging Process

    Get PDF
    Vascular diseases during aging process are closely correlated to the age-related changes of mechanical stimuli for resident cells. Characterizing the variations of mechanical environments in vessel walls with advancing age is crucial for a better understanding of vascular remodeling and pathological changes. In this study, the mechanical stress, strain, and wall stiffness of the femoropopliteal arteries (FPAs) were compared among four different age groups from adolescent to young, middle-aged, and aged subjects. The material parameters and geometries adopted in the FPA models were obtained from published experimental results. It is found that high mechanical stress appears at different layers in young and old FPA walls respectively. The characteristics of the middle-aged FPA wall suggests that it is the most capable of resisting high blood pressures and maintaining a mechanical homeostasis during the entire life span. It is demonstrated that the variations of stress and strain rather than that of wall stiffness can be used as an indicator to illustrate the profile of FPA aging. Our results could serve as an age-specific mechanical reference for vascular mechanobiological studies, and allow further exploration of cellular dysfunctions in vessel walls during aging process

    2,546

    full texts

    4,999

    metadata records
    Updated in last 30 days.
    Tech Science Press
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇