China Seismo-Electromagnetic Satellite (CSES) will be launched at the end of 2016 and the orbit is sun- synchronous and the altitude is about 500 km. The design of CSES satellite and ground segment are introduced in...China Seismo-Electromagnetic Satellite (CSES) will be launched at the end of 2016 and the orbit is sun- synchronous and the altitude is about 500 km. The design of CSES satellite and ground segment are introduced in this paper first. And then the preliminary proposals of scientific data verification and cross-verification in CSES mission are given, which can be used to classify the payloads' operation state, and validate the reliability of data.展开更多
Flexible roll forming is a promising manufacturing method for the production of variable cross section products. Considering the large plastic strain in this forming process which is much larger than that of uniform d...Flexible roll forming is a promising manufacturing method for the production of variable cross section products. Considering the large plastic strain in this forming process which is much larger than that of uniform deformation phase of uniaxial tensile test, the widely adopted method of simulating the forming processes with non-supplemented material data from uniaxial tensile test will certainly lead to large error. To reduce this error, the material data is supplemented based on three constitutive models. Then a finite element model of a six passes flexible roll forming process is established based on the supplemented material data and the original material data from the uniaxial tensile test. The flexible roll forming experiment of a B pillar reinforcing plate is carried out to verify the proposed method. Final cross section shapes of the experimental and the simulated results are compared. It is shown that the simulation calculated with supplemented material data based on Swift model agrees well with the experimental results, while the simulation based on original material data could not predict the actual deformation accurately. The results indicate that this material supplement method is reliable and indispensible, and the simulation model can well reflect the real metal forming process. Detailed analysis of the distribution and history of plastic strain at different positions are performed. A new material data supplement method is proposed to tackle the problem which is ignored in other roll forming simulations, and thus the forming process simulation accuracy can be greatly improved.展开更多
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as ...Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for about:blank site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site.展开更多
In a database-as-a-service(DaaS)model,a data owner stores data in a database server of a service provider,and the DaaS adopts the encryption for data privacy and indexing for data query.However,an attacker can obtain ...In a database-as-a-service(DaaS)model,a data owner stores data in a database server of a service provider,and the DaaS adopts the encryption for data privacy and indexing for data query.However,an attacker can obtain original data’s statistical information and distribution via the indexing distribution from the database of the service provider.In this work,a novel indexing schema is proposed to satisfy privacy-preserved data management requirements,in which an attacker cannot obtain data source distribution or statistic information from the index.The approach includes 2 parts:the Hash-based indexing for encrypted data and correctness verification for range queries.The evaluation results demonstrate that the approach can hide statistical information of encrypted data distribution while can also obtain correct answers for range queries.Meanwhile,the approach can achieve nearly 10 times and 35 times improvement on encrypted data publishing and indexing respectively,compared with the start-of-the-art method order-preserving Hash-based function(OPHF).展开更多
In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for organizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (cipherte...In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for organizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.展开更多
基金supported by the civil space project "CSES Scientific Data Verification Technology Research"National Natural Science Foundation of China(granted No.41374127)
文摘China Seismo-Electromagnetic Satellite (CSES) will be launched at the end of 2016 and the orbit is sun- synchronous and the altitude is about 500 km. The design of CSES satellite and ground segment are introduced in this paper first. And then the preliminary proposals of scientific data verification and cross-verification in CSES mission are given, which can be used to classify the payloads' operation state, and validate the reliability of data.
基金Supported by National Natural Science Foundation of China(Grant Nos.51205004,51475003)Beijing Municipal Natural Science Foundation of China(Grant No.3152010)Beijing Municipal Education Committee Science and Technology Program,China(Grant No.KM201510009004)
文摘Flexible roll forming is a promising manufacturing method for the production of variable cross section products. Considering the large plastic strain in this forming process which is much larger than that of uniform deformation phase of uniaxial tensile test, the widely adopted method of simulating the forming processes with non-supplemented material data from uniaxial tensile test will certainly lead to large error. To reduce this error, the material data is supplemented based on three constitutive models. Then a finite element model of a six passes flexible roll forming process is established based on the supplemented material data and the original material data from the uniaxial tensile test. The flexible roll forming experiment of a B pillar reinforcing plate is carried out to verify the proposed method. Final cross section shapes of the experimental and the simulated results are compared. It is shown that the simulation calculated with supplemented material data based on Swift model agrees well with the experimental results, while the simulation based on original material data could not predict the actual deformation accurately. The results indicate that this material supplement method is reliable and indispensible, and the simulation model can well reflect the real metal forming process. Detailed analysis of the distribution and history of plastic strain at different positions are performed. A new material data supplement method is proposed to tackle the problem which is ignored in other roll forming simulations, and thus the forming process simulation accuracy can be greatly improved.
基金The national natural science foundation(61273290,61373147)Xiamen Scientific Plan Project(2014S0048,3502Z20123037)+1 种基金Fujian Scientific Plan Project(2013HZ0004-1)FuJian provincial education office A-class project(-JA13238)
文摘Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for about:blank site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site.
基金the National Natural Science Foundation of China(No.61931019).
文摘In a database-as-a-service(DaaS)model,a data owner stores data in a database server of a service provider,and the DaaS adopts the encryption for data privacy and indexing for data query.However,an attacker can obtain original data’s statistical information and distribution via the indexing distribution from the database of the service provider.In this work,a novel indexing schema is proposed to satisfy privacy-preserved data management requirements,in which an attacker cannot obtain data source distribution or statistic information from the index.The approach includes 2 parts:the Hash-based indexing for encrypted data and correctness verification for range queries.The evaluation results demonstrate that the approach can hide statistical information of encrypted data distribution while can also obtain correct answers for range queries.Meanwhile,the approach can achieve nearly 10 times and 35 times improvement on encrypted data publishing and indexing respectively,compared with the start-of-the-art method order-preserving Hash-based function(OPHF).
文摘In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for organizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.