With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and po...With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption efficiency.To enhance performance,this paper proposes a new encryption algorithm designed to optimize parallel processing and adapt to images of varying sizes and colors.The method begins by using SHA-384 to extract the hash value of the plaintext image,which is then processed to determine the chaotic system’s initial value and block size.The image is padded and divided into blocks for further processing.A novel two-dimensional infinite collapses hyperchaotic map(2DICHM)is employed to generate the intra-block scrambling sequence,while an improved variable Joseph traversal sequence is used for inter-block scrambling.After removing the padding,3D forward and backward shift diffusions,controlled by the 2D-ICHM sequences,are applied to the scrambled image,producing the ciphertext.Simulation results demonstrate that the proposed algorithm outperforms others in terms of entropy,anti-noise resilience,correlation coefficient,robustness,and encryption efficiency.展开更多
The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-...The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-scale transformation and have consistent topological relationships. Although the laneway data generated by traverse survey-ing is non-scale data it is still impossible to construct a multi-scale spatial database directly from it. In this paper an al-gorithm is presented to first calculate the laneway mid-line to support multi-scale transformation; then to express topo-logical relationships arising from the data structure; and,finally,a laneway spatial database is built and multi-scale ex-pression is achieved using components GIS-SuperMap Objects. The research result is of great significance for improv-ing the efficiency of laneway data storage and updating,for ensuring consistency of laneway data expression and for extending the potential value of a mine spatial database.展开更多
The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent lav...The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.展开更多
The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderate...The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.展开更多
An attempt has been made with overlaying of stain-less steel on mild steel by the technique of friction surfacing. This investigation elaborates the excellence acquired by different combination of the process paramete...An attempt has been made with overlaying of stain-less steel on mild steel by the technique of friction surfacing. This investigation elaborates the excellence acquired by different combination of the process parameters used in friction surfacing specifically traverse speed of the cross slide, speed of rotation of the spindle and the uniaxial compressive load. Excellent overlaying has been obtained amongst the chosen materials. To which, the coating can be done with various set of process parameters. It has been observed that the bond strength of the coating was found to be at a maximum of 502 MPa by ram tensile test.Based upon this results the surface methodology was characterized with scanning electron microscope.For authenticating the results, the coated specimen was subjected to salt spray test. The bonding microstructure was characterized using optical microscopy and X-ray diffraction. Corrosion resistance of surfaced coatings was found to be more inferior to that of mechtrode material and greater with the substrate.展开更多
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plai...This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.展开更多
Using a Monte Carlo simulation tool of the multi-functional package for SEEs Analysis (MUFPSA), we study the temporal characteristics of ion-velocity susceptibility to the single event upset (SEU) effect, includin...Using a Monte Carlo simulation tool of the multi-functional package for SEEs Analysis (MUFPSA), we study the temporal characteristics of ion-velocity susceptibility to the single event upset (SEU) effect, including the deposited energy, traversed time within the device, and profile of the current pulse. The results show that the averaged dposited energy decreases with the increase of the ion-velocity, and incident ions of 2~9Bi have a wider distribution of energy deposition than 132Xe at the same ion-velocity. Additionally, the traversed time presents an obvious decreasing trend with the increase of ion-velocity. Concurrently, ion-velocity certainly has an influence on the current pulse and then it presents a particular regularity. The detailed discussion is conducted to estimate the relevant linear energy transfer (LET) of incident ions and the SEU cross section of the testing device from experiment and simulation and to critically consider the metric of LET.展开更多
The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations ...The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+4 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)the Talent Recruitment Special Fund of Anhui University of Science and Technology(Grant No.2024yjrc175)the Graduate Innovation Fund Project of Anhui University of Science and Technology(Grant Nos.2024cx2067,2024cx2107,and 2024cx2064)Seed Support Project for Postgraduate Innovation,Entrepreneurship and Practice at Anhui University of Science and Technology(Grant No.2024cxcysj084).
文摘With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption efficiency.To enhance performance,this paper proposes a new encryption algorithm designed to optimize parallel processing and adapt to images of varying sizes and colors.The method begins by using SHA-384 to extract the hash value of the plaintext image,which is then processed to determine the chaotic system’s initial value and block size.The image is padded and divided into blocks for further processing.A novel two-dimensional infinite collapses hyperchaotic map(2DICHM)is employed to generate the intra-block scrambling sequence,while an improved variable Joseph traversal sequence is used for inter-block scrambling.After removing the padding,3D forward and backward shift diffusions,controlled by the 2D-ICHM sequences,are applied to the scrambled image,producing the ciphertext.Simulation results demonstrate that the proposed algorithm outperforms others in terms of entropy,anti-noise resilience,correlation coefficient,robustness,and encryption efficiency.
基金Project 2005B018 supported by the Science Foundation of China University of Mining and Technology
文摘The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-scale transformation and have consistent topological relationships. Although the laneway data generated by traverse survey-ing is non-scale data it is still impossible to construct a multi-scale spatial database directly from it. In this paper an al-gorithm is presented to first calculate the laneway mid-line to support multi-scale transformation; then to express topo-logical relationships arising from the data structure; and,finally,a laneway spatial database is built and multi-scale ex-pression is achieved using components GIS-SuperMap Objects. The research result is of great significance for improv-ing the efficiency of laneway data storage and updating,for ensuring consistency of laneway data expression and for extending the potential value of a mine spatial database.
基金funded by Indian Space Research Organization (ISRO) India. Project No. ISRO/RES/3/728/16e17
文摘The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.
文摘The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.
文摘An attempt has been made with overlaying of stain-less steel on mild steel by the technique of friction surfacing. This investigation elaborates the excellence acquired by different combination of the process parameters used in friction surfacing specifically traverse speed of the cross slide, speed of rotation of the spindle and the uniaxial compressive load. Excellent overlaying has been obtained amongst the chosen materials. To which, the coating can be done with various set of process parameters. It has been observed that the bond strength of the coating was found to be at a maximum of 502 MPa by ram tensile test.Based upon this results the surface methodology was characterized with scanning electron microscope.For authenticating the results, the coated specimen was subjected to salt spray test. The bonding microstructure was characterized using optical microscopy and X-ray diffraction. Corrosion resistance of surfaced coatings was found to be more inferior to that of mechtrode material and greater with the substrate.
基金Project supported by the National Natural Science Foundation of China(Grant No.61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund(Grant No.MMJJ20170203)+2 种基金Liaoning Province Science and Technology Innovation Leading Talents Program Project(Grant No.XLYC1802013)Key Research and Development Projects of Liaoning Province,China(Grant No.2019020105-JH2/103)Jinan City‘20 universities’Funding Projects Introducing Innovation Team Program(Grant No.2019GXRC031).
文摘This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11179003,10975164,10805062,and 11005134)
文摘Using a Monte Carlo simulation tool of the multi-functional package for SEEs Analysis (MUFPSA), we study the temporal characteristics of ion-velocity susceptibility to the single event upset (SEU) effect, including the deposited energy, traversed time within the device, and profile of the current pulse. The results show that the averaged dposited energy decreases with the increase of the ion-velocity, and incident ions of 2~9Bi have a wider distribution of energy deposition than 132Xe at the same ion-velocity. Additionally, the traversed time presents an obvious decreasing trend with the increase of ion-velocity. Concurrently, ion-velocity certainly has an influence on the current pulse and then it presents a particular regularity. The detailed discussion is conducted to estimate the relevant linear energy transfer (LET) of incident ions and the SEU cross section of the testing device from experiment and simulation and to critically consider the metric of LET.
基金TraversingNAT/firewallTeachingandResearchAwardProgramforOutstandingYoungTeachersinHighEducationInstitutionsofMOE ,China (No .2 0 0 0 6 5 )
文摘The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.