1,004 research outputs found

    Secure Transmission in Linear Multihop Relaying Networks

    Get PDF
    This paper studies the design and secrecy performance of linear multihop networks, in the presence of randomly distributed eavesdroppers in a large-scale two-dimensional space. Depending on whether there is feedback from the receiver to the transmitter, we study two transmission schemes: on-off transmission (OFT) and non-on-off transmission (NOFT). In the OFT scheme, transmission is suspended if the instantaneous received signal-to-noise ratio (SNR) falls below a given threshold, whereas there is no suspension of transmission in the NOFT scheme. We investigate the optimal design of the linear multiple network in terms of the optimal rate parameters of the wiretap code as well as the optimal number of hops. These design parameters are highly interrelated since more hops reduces the distance of per-hop communication which completely changes the optimal design of the wiretap coding rates. Despite the analytical difficulty, we are able to characterize the optimal designs and the resulting secure transmission throughput in mathematically tractable forms in the high SNR regime. Our numerical results demonstrate that our analytical results obtained in the high SNR regime are accurate at practical SNR values. Hence, these results provide useful guidelines for designing linear multihop networks with targeted physical layer security performance.This work was supported in part by the Natural Science Foundation of China under Grant 61401159 and Grant 61771203, in part by the Pearl River Science and Technology Nova Program of Guangzhou under Grant 201710010111, and in part by the Guangdong Science and Technology Plan under Grant 2016A010101009. The work of X. Zhou was supported by the Australian Research Council Discovery Projects under Grant DP150103905ARC Discovery Projects Grant DP150103905

    Secure Routing in Multihop Wireless Ad-hoc Networks with Decode-and-Forward Relaying

    Get PDF
    In this paper, we study the problem of secure routing in a multihop wireless ad-hoc network in the presence of randomly distributed eavesdroppers. Specifically, the locations of the eavesdroppers are modeled as a homogeneous Poisson point process (PPP) and the source-destination pair is assisted by intermediate relays using the decode-and-forward (DF) strategy. We analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probability (SCP) for both colluding and non-colluding eavesdroppers. To facilitate finding an efficient solution to secure routing, we derive accurate approximations of the SCP. Based on the SCP approximations, we study the secure routing problem which is defined as finding the multihop path having the highest SCP. A revised Bellman-Ford algorithm is adopted to find the optimal path in a distributed manner. Simulation results demonstrate that the proposed secure routing scheme achieves nearly the same performance as exhaustive search.ARC Discovery Projects Grant DP15010390

    Antiseismic response research of horizontal residual heat removal pump in different seismic spectrum input directions

    Get PDF
    A million kilowatt horizontal residual heat removal pump is an essential part of the first loop residual heat removal system in nuclear power plants; it is the second most significant piece of nuclear power equipment. The residual heat removal pump of a nuclear power plant is examined by using a multiseismic spectrum, multiinput direction method to analyze its dynamic characteristics and responses. The aim of this analysis was to determine the seismic responses and possible actions to reduce damage to the integral structure. The favorable and unfavorable spectra are investigated as well. The research focuses on avoiding the damaging effects caused by earthquakes. The maximum value of seismic effect and the corresponding seismic input direction are determined, laying a speculative foundation for structural design and installation. Utilizing a response spectrum method, the antiseismic performance of a pump at SSE seismic load has been analyzed according to an algorithm using the square root of the sum of the squares. The result shows that the deformation of the impeller surface fitted with a wear ring decreases along the direction of flow in different input directions of the seismic spectrum. The largest deformation occurs at an angle of approximately 135 degrees; thus, antiseismic analysis should be conducted at this input angle to conservatively evaluate the antiseismic performance, and the installation angle designed for frequent earthquakes should avoid 135 degrees to decrease the deformation caused by the seismic force. Calculation results prove that the clearance between the rotor and the stator of the horizontal residual heat removal pump shows satisfactory seismic response performance that fulfills the requirements for antiseismic design according to the RCC-M standard; this may reduce seismic damage and avoid environmental disasters

    Study of the transfer between libration point orbits and lunar orbits in Earth–Moon system

    Get PDF
    This paper is devoted to the study of the transfer problem from a libration point orbit of the Earth–Moon system to an orbit around the Moon. The transfer procedure analysed has two legs: the first one is an orbit of the unstable manifold of the libration orbit and the second one is a transfer orbit between a certain point on the manifold and the final lunar orbit. There are only two manoeuvres involved in the method and they are applied at the beginning and at the end of the second leg. Although the numerical results given in this paper correspond to transfers between halo orbits around the L1 point (of several amplitudes) and lunar polar orbits with altitudes varying between 100 and 500 km, the procedure we develop can be applied to any kind of lunar orbits, libration orbits around the L1 or L2 points of the Earth–Moon system, or to other similar cases with different values of the mass ratio.Peer ReviewedPostprint (author's final draft

    De novo assembly and transcriptome characterization: novel insights into the natural resistance mechanisms of Microtus fortis against Schistosoma japonicum

    Get PDF
    BACKGROUND: Microtus fortis is a non-permissive host of Schistosoma japonicum. It has natural resistance against schistosomes, although the precise resistance mechanisms remain unclear. The paucity of genetic information for M. fortis limits the use of available immunological methods. Thus, studies based on high-throughput sequencing technologies are required to obtain information about resistance mechanisms against S. japonicum. RESULTS: Using Illumina single-end technology, a de novo assembly of the M. fortis transcriptome produced 67,751 unigenes with an average length of 868 nucleotides. Comparisons were made between M. fortis before and after infection with S. japonicum using RNA-seq quantification analysis. The highest number of differentially expressed genes (DEGs) occurred two weeks after infection, and the highest number of down-regulated DEGs occurred three weeks after infection. Simultaneously, the strongest pathological changes in the liver were observed at week two. Gene ontology terms and pathways related to the DEGs revealed that up-regulated transcripts were involved in metabolism, immunity and inflammatory responses. Quantitative real-time PCR analysis showed that patterns of gene expression were consistent with RNA-seq results. CONCLUSIONS: After infection with S. japonicum, a defensive reaction in M. fortis commenced rapidly, increasing dramatically in the second week, and gradually decreasing three weeks after infection. The obtained M. fortis transcriptome and DEGs profile data demonstrated that natural and adaptive immune responses, play an important role in M. fortis immunity to S. japonicum. These findings provide a better understanding of the natural resistance mechanisms of M. fortis against schistosomes. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi: 10.1186/1471-2164-15-417) contains supplementary material, which is available to authorized users
    • …
    corecore