172 research outputs found

    A Spark-based genetic algorithm for sensor placement in large scale drinking water distribution systems

    Get PDF
    Water pollution incidents have occurred frequently in recent years, causing severe damages, economic loss and long-lasting society impact. A viable solution is to install water quality monitoring sensors in water supply networks (WSNs) for real-time pollution detection, thereby mitigating the risk of catastrophic contamination incidents. Given the significant cost of placing sensors at all locations in a network, a critical issue is where to deploy sensors within WSNs, while achieving rapid detection of contaminant events. Existing studies have mainly focused on sensor placement in water distribution systems (WDSs). However, the problem is still not adequately addressed, especially for large scale WSNs. In this paper, we investigate the sensor placement problem in large scale WDSs with the objective of minimizing the impact of contamination events. Specifically, we propose a two-phase Spark-based genetic algorithm (SGA). Experimental results show that SGA outperforms other traditional algorithms in both accuracy and efficiency, which validates the feasibility and effectiveness of our proposed approach

    On the Release of Crls in Public Key Infrastructure

    Get PDF
    Public key infrastructure provides a promising founda-tion for verifying the authenticity of communicating par-ties and transferring trust over the internet. The key issue in public key infrastructure is how to process certificate revocations. Previous research in this aspect has con-centrated on the tradeoffs that can be made among dif-ferent revocation options. No rigorous efforts have been made to understand the probability distribution of certifi-cate revocation requests based on real empirical data. In this study, we first collect real empirical data from VeriSign and derive the probability function for certifi-cate revocation requests. We then prove that a revocation system will become stable after a period of time. Based on these, we show that different certificate authorities should take different strategies for releasing certificate revocation lists for different types of certificate services. We also provide the exact steps by which certificate au-thorities can derive optimal releasing strategies.

    MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event Detection

    Full text link
    Event detection (ED) is aimed to identify the key trigger words in unstructured text and predict the event types accordingly. Traditional ED models are too data-hungry to accommodate real applications with scarce labeled data. Besides, typical ED models are facing the context-bypassing and disabled generalization issues caused by the trigger bias stemming from ED datasets. Therefore, we focus on the true few-shot paradigm to satisfy the low-resource scenarios. In particular, we propose a multi-step prompt learning model (MsPrompt) for debiasing few-shot event detection, that consists of the following three components: an under-sampling module targeting to construct a novel training set that accommodates the true few-shot setting, a multi-step prompt module equipped with a knowledge-enhanced ontology to leverage the event semantics and latent prior knowledge in the PLMs sufficiently for tackling the context-bypassing problem, and a prototypical module compensating for the weakness of classifying events with sparse data and boost the generalization performance. Experiments on two public datasets ACE-2005 and FewEvent show that MsPrompt can outperform the state-of-the-art models, especially in the strict low-resource scenarios reporting 11.43% improvement in terms of weighted F1-score against the best-performing baseline and achieving an outstanding debiasing performance

    Simulation of the effect of stand-off parameter on collapse behaviours of a single cavitation bubble in jet drilling

    Get PDF
    Cavitation jet drilling has been extensively employed for the exploitation of geo-energy resources. The dynamics of cavitation bubbles in close proximity to the solid boundary have been a subject of great interest during jet drilling, as they play a crucial role in determining the cavitation performance. In present work, the dynamics of a single cavitation bubble near a solid surface is numerically investigated by using the axisymmetric Navier-Stokes equations and the volume of fluid method with considering the surface tension of gas-liquid interface, liquid viscosity and compressibility of gas in bubble. The simulated profiles are qualitatively and quantitatively consistent with the experimental images, which proves the reliability of employed numerical model. The effects of stand-off distance on the bubble profiles, bubble volume and collapse time have been analysed. Moreover, the cavitation erosion patterns towards the solid wall are also revealed for different dimensionless standoff distances. The simulation results reveal two distinct collapse patterns for the bubble profiles. The solid wall significantly impedes the shrinkage rate of the bubble, resulting in the longest collapse time when the dimensionless stand-off distance is 1.0. Three erosion patterns of cavitation bubbles towards the solid wall are observed, with the shock wave and micro-jet both contributing significantly to the damage caused by cavitation erosion. The shock wave sweeps the wall resulting in circular corrosion pits with a severely eroded centre, while the micro jet penetrates the wall leading to small spot corrosion pits.Document Type: Original articleCited as: Wu, X., Zhang, Y., Huang, H., Hui, C., Hu, Z., Li, G. Simulation of the effect of stand-off parameter on collapse behaviours of a single cavitation bubble in jet drilling. Advances in Geo-Energy Research, 2023, 8(3): 181-192. https://doi.org/10.46690/ager.2023.06.0

    Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions

    Get PDF
    Yoneyama et al. introduced Leaky Random Oracle Model (LROM for short) at ProvSec2008 in order to discuss security (or insecurity) of cryptographic schemes which use hash functions as building blocks when leakages from pairs of input and output of hash functions occur. This kind of leakages occurs due to various attacks caused by sloppy usage or implementation. Their results showed that this kind of leakages may threaten the security of some cryptographic schemes. However, an important fact is that such attacks would leak not only pairs of input and output of hash functions, but also the secret key. Therefore, LROM is rather limited in the sense that it considers leakages from pairs of input and output of hash functions alone, instead of taking into consideration other possible leakages from the secret key simultaneously. On the other hand, many other leakage models mainly concentrate on leakages from the secret key and ignore leakages from hash functions for a cryptographic scheme exploiting hash functions in these leakage models. Some examples show that the above drawbacks of LROM and other leakage models may cause insecurity of some schemes which are secure in the two kinds of leakage model. In this paper, we present an augmented model of both LROM and some leakage models, which both the secret key and pairs of input and output of hash functions can be leaked. Furthermore, the secret key can be leaked continually during the whole life cycle of a cryptographic scheme. Hence, our new model is more universal and stronger than LROM and some leakage models (e.g. only computation leaks model and bounded memory leakage model). As an application example, we also present a public key encryption scheme which is provably IND-CCA secure in our new model
    corecore