首页 > 最新文献

2012 Fourth International Conference on Computational and Information Sciences最新文献

英文 中文
Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth 动态二进制转换系统的双核架构:频率和带宽之间的权衡
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.133
Xu Fan, Shen Li, W. Zhiying
Traditional DBT system is hard to accelerate by introducing a customized processor core because the startup overhead is hard to eliminate. In this paper, we concentrate on how to choose a suitable layout of the DBT core in a dual-core system. We analyze the tradeoff between the frequency and the memory bandwidth of the DBT core through an analytical model, and simulated 4 different and usual layouts of dual-core DBT in experiments. Finally, the validation of our model is verified through experimental results: the dual-core DBT framework can sharply reduce the startup overhead and speedup the translation-execution process by about 12%. Moreover, we also found the relationship between the code expand rate and the communication overhead: the performance of a program with high code expand rate is not sensitive to the communication speed of the platform.
传统的DBT系统很难通过引入定制的处理器内核来加速,因为启动开销很难消除。本文主要讨论如何在双核系统中选择合适的DBT核心布局。通过分析模型分析了DBT核心的频率和存储带宽之间的权衡,并在实验中模拟了4种不同和常见的双核DBT布局。最后,通过实验结果验证了我们的模型的有效性:双核DBT框架可以大幅降低启动开销,并将翻译执行过程加快约12%。此外,我们还发现了代码扩展率与通信开销之间的关系:高代码扩展率的程序的性能对平台的通信速度不敏感。
{"title":"Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth","authors":"Xu Fan, Shen Li, W. Zhiying","doi":"10.1109/ICCIS.2012.133","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.133","url":null,"abstract":"Traditional DBT system is hard to accelerate by introducing a customized processor core because the startup overhead is hard to eliminate. In this paper, we concentrate on how to choose a suitable layout of the DBT core in a dual-core system. We analyze the tradeoff between the frequency and the memory bandwidth of the DBT core through an analytical model, and simulated 4 different and usual layouts of dual-core DBT in experiments. Finally, the validation of our model is verified through experimental results: the dual-core DBT framework can sharply reduce the startup overhead and speedup the translation-execution process by about 12%. Moreover, we also found the relationship between the code expand rate and the communication overhead: the performance of a program with high code expand rate is not sensitive to the communication speed of the platform.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Improved Fractional Order Differential Image Information Extraction Algorithm 改进的分数阶差分图像信息提取算法
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.330
Mingliang Hou, Yuran Liu, Yanglie Fu
Texture and edge information are equally important to identification of most of natural images. In view of the weakness of the existing integer order differential operators that it can't extract texture information from the images, this study developed a fractional differential algorithm, which can extract texture and marginal information simultaneously, based on settlement of the drift problem of fractional differential operator. Experimental results showed that our algorithm can not only extract texture information but also extract more edge information than the traditional algorithms.
纹理和边缘信息对大多数自然图像的识别同样重要。针对现有的整数阶微分算子不能从图像中提取纹理信息的缺点,在解决分数阶微分算子漂移问题的基础上,开发了一种可以同时提取纹理和边缘信息的分数阶微分算法。实验结果表明,该算法不仅可以提取纹理信息,而且可以提取出比传统算法更多的边缘信息。
{"title":"The Improved Fractional Order Differential Image Information Extraction Algorithm","authors":"Mingliang Hou, Yuran Liu, Yanglie Fu","doi":"10.1109/ICCIS.2012.330","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.330","url":null,"abstract":"Texture and edge information are equally important to identification of most of natural images. In view of the weakness of the existing integer order differential operators that it can't extract texture information from the images, this study developed a fractional differential algorithm, which can extract texture and marginal information simultaneously, based on settlement of the drift problem of fractional differential operator. Experimental results showed that our algorithm can not only extract texture information but also extract more edge information than the traditional algorithms.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132077264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational Rationality of Formal Analysis on Cryptographic Protocols 密码协议形式分析的计算合理性
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.111
S. Liu, J. Ye
This paper describes and discusses the computational rationality of formal analysis on cryptographic protocols, which is based on the computational rationality theorem of formal encrypt on Abadi-Rowgaway. Analysis of group key distribution protocol shows that the theorem has strong analytical ability to the protocols alternative attacks. The paper presents formal methods on group key distribution protocols, and the formal definition of security in the computational method. Finally, it proves its rationality.
本文以Abadi-Rowgaway上形式加密的计算合理性定理为基础,描述和讨论了密码协议形式分析的计算合理性。对组密钥分发协议的分析表明,该定理对协议替代攻击具有较强的分析能力。本文给出了组密钥分发协议的形式化方法,并在计算方法中给出了安全性的形式化定义。最后,证明了其合理性。
{"title":"Computational Rationality of Formal Analysis on Cryptographic Protocols","authors":"S. Liu, J. Ye","doi":"10.1109/ICCIS.2012.111","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.111","url":null,"abstract":"This paper describes and discusses the computational rationality of formal analysis on cryptographic protocols, which is based on the computational rationality theorem of formal encrypt on Abadi-Rowgaway. Analysis of group key distribution protocol shows that the theorem has strong analytical ability to the protocols alternative attacks. The paper presents formal methods on group key distribution protocols, and the formal definition of security in the computational method. Finally, it proves its rationality.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical Computation of Wellbore Dynamic Pressure during Perforating 射孔过程中井筒动压力的数值计算
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.192
C. Li, Ming-yong Ma
The wellbore dynamic pressure waves are produced in the perforation liquid after the shaped charges are initiated and then fiercely strike the gunstring, packer, casing and artificial bottom. The impact and damage effect only depend on the amplitude and holding time of dynamic pressures. This paper discusses the simplification of perforators' explosion with gun in the oil well. On the basis of simplification model, the finite element method is applied to compute the wellbore dynamic pressure under different working conditions. The simulation results indicate that peak compression enhances and the duration of platform pressures obviously prolongs with the perforators' amount once detonated increasing. The holding time of platform pressure clearly prolongs with the accretion of perforator's explosive charge mass. The peak compression and holding time of reflection waves decrease with the augment of distance between the end of tubing and artificial bottom. The peak compression and holding time must be lowered if possible to avoid undesirable failures and damage during perforating operation.
聚能射孔液在射孔液中产生井筒动压力波,然后猛烈冲击射孔管柱、封隔器、套管和人工井底。冲击和损伤效应仅取决于动压力的幅值和保持时间。本文讨论了油井射孔器带枪爆炸的简化问题。在简化模型的基础上,应用有限元法计算了不同工况下的井筒动压力。仿真结果表明,随着射孔器起爆次数的增加,峰值压缩增强,平台压力持续时间明显延长。平台压力保持时间随着穿孔装药质量的增加而明显延长。反射波的峰值压缩和保持时间随着油管端距人工底的增加而减小。如果可能的话,必须降低峰值压缩和保持时间,以避免在射孔作业中出现意想不到的故障和损坏。
{"title":"Numerical Computation of Wellbore Dynamic Pressure during Perforating","authors":"C. Li, Ming-yong Ma","doi":"10.1109/ICCIS.2012.192","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.192","url":null,"abstract":"The wellbore dynamic pressure waves are produced in the perforation liquid after the shaped charges are initiated and then fiercely strike the gunstring, packer, casing and artificial bottom. The impact and damage effect only depend on the amplitude and holding time of dynamic pressures. This paper discusses the simplification of perforators' explosion with gun in the oil well. On the basis of simplification model, the finite element method is applied to compute the wellbore dynamic pressure under different working conditions. The simulation results indicate that peak compression enhances and the duration of platform pressures obviously prolongs with the perforators' amount once detonated increasing. The holding time of platform pressure clearly prolongs with the accretion of perforator's explosive charge mass. The peak compression and holding time of reflection waves decrease with the augment of distance between the end of tubing and artificial bottom. The peak compression and holding time must be lowered if possible to avoid undesirable failures and damage during perforating operation.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133822844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Storage and Solving of Large Sparse Matrix Linear Equations 大型稀疏矩阵线性方程的存储与求解
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.293
Chao Liu, Junmin Ye, Yining Ma
Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of large sparse matrix linear equations. Under the condition of CSR, Symmetrica Successive Over Relaxations-Preconditioned Conjugate Gradient method (SSOR-PCG) is employed in the solution of large sparse matrix linear equations.
求解大型稀疏矩阵线性方程组一直是科学计算和工程计算领域的研究热点。利用系数矩阵的稀疏性和对称性特点,采用压缩稀疏行(Compressed Sparse Row, CSR)存储大型稀疏矩阵线性方程。在CSR条件下,采用对称连续过松弛-预条件共轭梯度法(SSOR-PCG)求解大型稀疏矩阵线性方程组。
{"title":"Storage and Solving of Large Sparse Matrix Linear Equations","authors":"Chao Liu, Junmin Ye, Yining Ma","doi":"10.1109/ICCIS.2012.293","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.293","url":null,"abstract":"Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of large sparse matrix linear equations. Under the condition of CSR, Symmetrica Successive Over Relaxations-Preconditioned Conjugate Gradient method (SSOR-PCG) is employed in the solution of large sparse matrix linear equations.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method for Solving the Performance Isolation Problem in PaaS Based on Forecast and Dynamic Programming 基于预测和动态规划的PaaS中性能隔离问题的解决方法
Jiayang Yu, R. Rao
As a Platform as a Service (PaaS) designer, we should satisfy customers' demands of resources and to save resources in a cloud at the same time. In PaaS, one of the main problems is that if one of virtual machines' (VM) workload increases fast in a host, other VMs' performance characteristics may be influenced negatively. To solve the performance isolation problem, this paper gives a method. In this method, we use an algorithm to forecast all VMs' resources usage at first. Then we find which VMs' workloads may increase fast in future. We move these VMs to hosts which have more resources and other VMs' performance characteristics will not be affected at the same time. So the main problem now is which hosts we should use to move these VMs as mentioned above to. In this paper, we use Dynamic Programming method to solve this problem. So, with all of these algorithms, in this paper, we propose a strategy to solve Performance Isolation problem in PaaS.
作为平台即服务(PaaS)设计者,我们既要满足客户对资源的需求,同时又要节约云中的资源。在PaaS中,一个主要问题是,如果主机中某个虚拟机(VM)的工作负载快速增加,则可能会对其他虚拟机的性能特征产生负面影响。为了解决性能隔离问题,本文给出了一种方法。在该方法中,我们首先使用一种算法来预测所有虚拟机的资源使用情况。然后我们发现哪些虚拟机的工作负载在未来可能会快速增长。我们将这些虚拟机迁移到资源更丰富的主机上,同时不会影响其他虚拟机的性能特性。所以现在的主要问题是我们应该使用哪台主机来移动上面提到的这些虚拟机。本文采用动态规划方法来解决这一问题。因此,在本文中,我们提出了一种解决PaaS中性能隔离问题的策略。
{"title":"A Method for Solving the Performance Isolation Problem in PaaS Based on Forecast and Dynamic Programming","authors":"Jiayang Yu, R. Rao","doi":"10.1109/ICCIS.2012.23","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.23","url":null,"abstract":"As a Platform as a Service (PaaS) designer, we should satisfy customers' demands of resources and to save resources in a cloud at the same time. In PaaS, one of the main problems is that if one of virtual machines' (VM) workload increases fast in a host, other VMs' performance characteristics may be influenced negatively. To solve the performance isolation problem, this paper gives a method. In this method, we use an algorithm to forecast all VMs' resources usage at first. Then we find which VMs' workloads may increase fast in future. We move these VMs to hosts which have more resources and other VMs' performance characteristics will not be affected at the same time. So the main problem now is which hosts we should use to move these VMs as mentioned above to. In this paper, we use Dynamic Programming method to solve this problem. So, with all of these algorithms, in this paper, we propose a strategy to solve Performance Isolation problem in PaaS.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the "Customer Scale Trap" of Group-Purchase Websites' Business Mode 团购网站商业模式中的“客户规模陷阱”研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.256
Chunying Cui
As one of the major commercial innovations in recent years, websites for group purchase have experienced a fast booming in domestic market. However, they have fell into a predicament because of the excessive competition. Analyzing the operating characteristics of these websites according to the Theory of Two-sided Markets, this paper finds out that one of the factors that limits the group-purchase websites from developing is the customer scale trap. Studying the platform mode of e-commerce in terms of network externalities, it further puts forward a new opinion, i.e., overcoming the trap through the accumulation of platform customer utility.
团购网站作为近年来的重大商业创新之一,在国内市场得到了快速的发展。然而,由于过度竞争,他们陷入了困境。本文运用双边市场理论对团购网站的经营特点进行了分析,发现团购网站发展的制约因素之一是顾客规模陷阱。从网络外部性的角度对电子商务的平台模式进行研究,进一步提出了通过平台客户效用的积累来克服陷阱的新观点。
{"title":"Research on the \"Customer Scale Trap\" of Group-Purchase Websites' Business Mode","authors":"Chunying Cui","doi":"10.1109/ICCIS.2012.256","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.256","url":null,"abstract":"As one of the major commercial innovations in recent years, websites for group purchase have experienced a fast booming in domestic market. However, they have fell into a predicament because of the excessive competition. Analyzing the operating characteristics of these websites according to the Theory of Two-sided Markets, this paper finds out that one of the factors that limits the group-purchase websites from developing is the customer scale trap. Studying the platform mode of e-commerce in terms of network externalities, it further puts forward a new opinion, i.e., overcoming the trap through the accumulation of platform customer utility.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Service-Oriented Network Simulation and Operation of Supporting Platform 面向服务的网络仿真与支撑平台运行研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.255
Li Jianning, Yu Jie, Sun Liyang
With the development of distributed simulation technology, firstly this paper based on the service-oriented technology, presents a service-oriented network simulation construction and operation models to meet the future military system simulation new demands. Secondly, we particularly present relevant research on the network simulation supporting platform and interrelated core services, focusing on operation support platform architecture and construction and operation of the simulation application services under the architecture. End of the paper gives the key technologies analysis for future explanation of the operation support platform, including multi-CoST Management, virtual scheduling and simulation core services management.
随着分布式仿真技术的发展,本文首先以面向服务的技术为基础,提出了面向服务的网络仿真构建和运行模型,以满足未来军事系统仿真的新需求。其次,重点对网络仿真支撑平台及相关核心业务进行了相关研究,重点研究了运营支撑平台架构及架构下仿真应用服务的构建与运营。最后对运营支撑平台的关键技术进行了分析,包括多成本管理、虚拟调度和仿真核心业务管理。
{"title":"Research on Service-Oriented Network Simulation and Operation of Supporting Platform","authors":"Li Jianning, Yu Jie, Sun Liyang","doi":"10.1109/ICCIS.2012.255","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.255","url":null,"abstract":"With the development of distributed simulation technology, firstly this paper based on the service-oriented technology, presents a service-oriented network simulation construction and operation models to meet the future military system simulation new demands. Secondly, we particularly present relevant research on the network simulation supporting platform and interrelated core services, focusing on operation support platform architecture and construction and operation of the simulation application services under the architecture. End of the paper gives the key technologies analysis for future explanation of the operation support platform, including multi-CoST Management, virtual scheduling and simulation core services management.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapdos: A RFID Authentication Protocol for Defending against DoS Rapdos:一种防御DoS的RFID认证协议
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.215
Zhao Wang, Xuesong Zhang, Zhong Chen
Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However, current RFID authentication protocols cannot defend against DoS attack. This paper proposes Rapdos, a novel mutual authentication protocol, which is based on the use of symmetric encryption and dynamic update key to prevent the DoS attack. The experiment has validated that Rapdos has provided good security for RFID system, and can defeat location privacy attack, relay attack, eavesdropping attack, denial-of-service attack, and solve problems of RFID security privacy.
射频识别(RFID)技术是一种非接触式自动识别技术。RFID的基本原理是结合射频信号的空间传输特性。从物体识别到实现自动识别,RFID具有有效、多样、容量大、成本低、抗污染、穿透性强等优点。然而,现有的RFID认证协议无法抵御DoS攻击。本文提出了一种新的互认证协议Rapdos,该协议利用对称加密和动态更新密钥来防止DoS攻击。实验验证了Rapdos为RFID系统提供了良好的安全性,能够挫败位置隐私攻击、中继攻击、窃听攻击、拒绝服务攻击,解决RFID安全隐私问题。
{"title":"Rapdos: A RFID Authentication Protocol for Defending against DoS","authors":"Zhao Wang, Xuesong Zhang, Zhong Chen","doi":"10.1109/ICCIS.2012.215","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.215","url":null,"abstract":"Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However, current RFID authentication protocols cannot defend against DoS attack. This paper proposes Rapdos, a novel mutual authentication protocol, which is based on the use of symmetric encryption and dynamic update key to prevent the DoS attack. The experiment has validated that Rapdos has provided good security for RFID system, and can defeat location privacy attack, relay attack, eavesdropping attack, denial-of-service attack, and solve problems of RFID security privacy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anisotropic Mechanical-Hydraulic Coupling for Deep Buried Tunnel in Soft Rock with Rich Water 富水软岩深埋隧道各向异性机-液耦合研究
Ben-guo He, Zhiqiang Zhang, Tengfei Ma
Qilianshan tunnel is a key project on Lanzhou-Xinjiang passenger dedicated line, located in Gansu province in the Northwest China. It is subjected to geo-stress in soft rock with rich water. Anisotropic mechanical-hydraulic coupling model was performed to investigate the energy density, effective stress and maximum shear stress, displacements and plastic zone of surrounding rock. Consequently, research results show that estimating pore water pressure distribution is important during construction. Energy, effective stress and the maximum shear stress accumulation zone occur and the peak value is located at 2.1 m from side wall. The displacement of crown is most and reaches to 7 cm which is less than ultimate displacement in teams of Code of Design on Tunnel of Railway. Extracted deformation ahead of working face is significantly affected when the distance is less than 8 m. Transversal plastic zone is mainly located at crown, shoulder and invert. The depth of it is 4 m. Pore water pressure and energy distribution ahead of working face increases firstly, and then it reduces. The peak value is located at 10 m ahead of working face. Not only does the analysis method fit for Qilianshan tunnel, but it can be a reference for similar geological engineering.
祁连山隧道是兰新客运专线的重点工程,位于中国西北的甘肃省境内。它在富水软岩中受地应力作用。采用各向异性力学-水力耦合模型研究了围岩的能量密度、有效应力和最大剪应力、位移和塑性区。因此,研究结果表明,估算孔隙水压力分布在施工过程中具有重要意义。存在能量、有效应力和最大剪应力聚集带,峰值位于距侧壁2.1 m处。在《铁路隧道设计规范》中,顶板位移最大,达到7cm,小于极限位移。当距离小于8 m时,对工作面前方提取变形影响较大。横向塑性区主要位于拱顶、肩和仰拱。它的深度是4米。工作面前方孔隙水压力和能量分布先增大后减小。峰值位于工作面前方10m处。该分析方法不仅适用于祁连山隧道,而且可为类似地质工程提供参考。
{"title":"Anisotropic Mechanical-Hydraulic Coupling for Deep Buried Tunnel in Soft Rock with Rich Water","authors":"Ben-guo He, Zhiqiang Zhang, Tengfei Ma","doi":"10.1109/ICCIS.2012.76","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.76","url":null,"abstract":"Qilianshan tunnel is a key project on Lanzhou-Xinjiang passenger dedicated line, located in Gansu province in the Northwest China. It is subjected to geo-stress in soft rock with rich water. Anisotropic mechanical-hydraulic coupling model was performed to investigate the energy density, effective stress and maximum shear stress, displacements and plastic zone of surrounding rock. Consequently, research results show that estimating pore water pressure distribution is important during construction. Energy, effective stress and the maximum shear stress accumulation zone occur and the peak value is located at 2.1 m from side wall. The displacement of crown is most and reaches to 7 cm which is less than ultimate displacement in teams of Code of Design on Tunnel of Railway. Extracted deformation ahead of working face is significantly affected when the distance is less than 8 m. Transversal plastic zone is mainly located at crown, shoulder and invert. The depth of it is 4 m. Pore water pressure and energy distribution ahead of working face increases firstly, and then it reduces. The peak value is located at 10 m ahead of working face. Not only does the analysis method fit for Qilianshan tunnel, but it can be a reference for similar geological engineering.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Fourth International Conference on Computational and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1