73 research outputs found

    Silicon Carbide Power MESFET

    Get PDF

    EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing

    Get PDF
    Edge computing is an extension of cloud computing that enables messages to be acquired and processed at low cost. Many terminal devices are being deployed in the edge network to sense and deal with the massive data. By migrating part of the computing tasks from the original cloud computing model to the edge device, the message is running on computing resources close to the data source. The edge computing model can effectively reduce the pressure on the cloud computing center and lower the network bandwidth consumption. However, the security and privacy issues in edge computing are worth noting. In this paper, we propose an efficient auto-correction retrieval scheme for data management in edge computing, named EARS-DM. With automatic error correction for the query keywords instead of similar words extension, EARS-DM can tolerate spelling mistakes and reduce the complexity of index storage space. By the combination of TF-IDF value of keywords and the syntactic weight of query keywords, keywords who are more important will obtain higher relevance scores. We construct an R-tree index building with the encrypted keywords and the children nodes of which are the encrypted identifier FID and Bloom filter BF of files who contain this keyword. The secure index will be uploaded to the edge computing and the search phrase will be performed by the edge computing which is close to the data source. Then EDs sort the matching encrypted file identifier FID by relevance scores and upload them to the cloud server (CS). Performance analysis with actual data indicated that our scheme is efficient and accurate

    Redundancy Analysis of Capacitance Data of a Coplanar Electrode Array for Fast and Stable Imaging Processing

    No full text
    A coplanar electrode array sensor is established for the imaging of composite-material adhesive-layer defect detection. The sensor is based on the capacitive edge effect, which leads to capacitance data being considerably weak and susceptible to environmental noise. The inverse problem of coplanar array electrical capacitance tomography (C-ECT) is ill-conditioning, in which a small error of capacitance data can seriously affect the quality of reconstructed images. In order to achieve a stable image reconstruction process, a redundancy analysis method for capacitance data is proposed. The proposed method is based on contribution rate and anti-interference capability. According to the redundancy analysis, the capacitance data are divided into valid and invalid data. When the image is reconstructed by valid data, the sensitivity matrix needs to be changed accordingly. In order to evaluate the effectiveness of the sensitivity map, singular value decomposition (SVD) is used. Finally, the two-dimensional (2D) and three-dimensional (3D) images are reconstructed by the Tikhonov regularization method. Through comparison of the reconstructed images of raw capacitance data, the stability of the image reconstruction process can be improved, and the quality of reconstructed images is not degraded. As a result, much invalid data are not collected, and the data acquisition time can also be reduced

    Data-driven XGBoost model for maximum stress prediction of additive manufactured lattice structures

    No full text
    Abstract Lattice structures created using additive manufacturing technology inevitably produce inherent defects that seriously affect their mechanical properties. Predicting and analysing the effect of defects on the maximum stress is very important for improving the lattice structure design and process. This study mainly used the finite element method to calculate the lattice structure constitutive equation. The increase in defect type and quantity leads to difficulty in modelling and reduces calculation accuracy. We established a data-driven extreme gradient enhancement (XGBoost) with hyperparameter optimization to predict the maximum stress of the lattice structure in additive manufacturing. We used four types of defect characteristics that affect the mechanical properties—the number of layers, thick-dominated struts (oversize), thin-dominated struts (undersizing), and bend-dominated struts (waviness)—as the input parameters of the model. The hyperparameters of the basic XGBoost model were optimised according to the diversity of the inherent defect characteristics of the lattice structure, while the parameters selected by experience were replaced using the Gaussian process method in Bayesian optimization to improve the model’s generalisation ability. The prediction datasets included the type and number of defects obtained via computer tomography and the calculation results of the finite element model with the corresponding defects implanted. The root mean square error and R-squared error of the maximum stress prediction were 17.40 and 0.82, respectively, indicating the effectiveness of the model proposed in this paper. Furthermore, we discussed the influence of the four types of defects on the maximum stress, among which the thick strut defect had the greatest influence

    An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT

    Get PDF
    The Internet of Things (IoT) is developing towards smart and mobile Internet of Things (SM-IoT), which has made great progress. Due to the inherent heterogeneity, distribution, intensive communication, and resource constraints of SM-IoT, efficient security and privacy communication protocols become a particularly critical challenge. Signcryption has received considerable attention. Various signcryption schemes have been proposed to solve secure communication. However, most of them are low in efficiency, without the consideration of characteristics of the SM-IoT. In this paper, we propose a signcryption scheme to achieve efficient secure multi-message and multi-receiver communication for the heterogeneous and distributed SM-IoT. We develop Identity-based Cryptography (IBC) and Certificateless Cryptography (CLC) to solve the certificate management problem. Our scheme no longer needs wireless secure channel during key generation phase of traditional CLC system, which improves the applicability of our scheme in wireless SM-IoT environment. There is no expensive operations, such as bilinear pairing, in our scheme. In addition, our scheme outsources part of the verification overhead from the SM-IoT users to the gateway without revealing user privacy. The performance evaluation shows that the computation efficiency in both sender and receiver side is improved in our scheme
    • …
    corecore