10,766 research outputs found

    Stiffness identification of boundary conditions by using thin-layer element for parameterization

    Get PDF
    The stiffness of boundary conditions in mechanical structures is difficult to represent. A method is proposed to model the mechanical performance of the clamped boundary condition based on thin-layer element. Firstly, the contact surface of clamped boundary condition is parameterized by using isotropic thin-layer element to model the normal and tangential contact stiffness. Secondly, material parameter of thin-layer element is identified by using experimental modal data, parameter identification is transformed as an optimization problem. Experimental investigation is undertaken to verify the proposed method by employing an aluminum honeycomb panel, the numerical model of which is constructed by using the equivalent theory. Thin-layer elements with different properties are used to simulate the mechanical properties in different area of the boundary conditions, and the experimental modal data is adopted to identify the material parameters. Results show that the width to thickness ratio of the thin layer element has a great influence on the identification results

    A novel multi-party semiquantum private comparison protocol of size relationship with d-dimensional single-particle states

    Full text link
    By using d-level single-particle states, the first multi-party semiquantum private comparison (MSQPC) protocol which can judge the size relationship of private inputs from more than two classical users within one execution of protocol is put forward. This protocol requires the help of one quantum third party (TP) and one classical TP, both of whom are allowed to misbehave on their own but cannot conspire with anyone else. Neither quantum entanglement swapping nor unitary operations are necessary for implementing this protocol. TPs are only required to perform d-dimensional single-particle measurements. The correctness analysis validates the accuracy of the compared results. The security analysis verifies that both the outside attacks and the participant attacks can be resisted.Comment: 19 pages, 2 figures, 2 table
    • …
    corecore