In real world applications the supply, the demand and the transportation cost per unit of the quantities in a transportation problem are hardly specified precisely because of the changing economic and environmental co...In real world applications the supply, the demand and the transportation cost per unit of the quantities in a transportation problem are hardly specified precisely because of the changing economic and environmental conditions. It is also important that the time required for transportation should be minimum. In this paper a method has been proposed for the minimization of transportation costs. Supply and transportation costs per unit of the quantities are also determined. The present study was carried out to evaluate the quality of gravel to know its suitability for aggregate (raw material for concrete and road). The samples of gravel were analyzed for petrographic, physical, mechanical and chemical properties. Samples were categorized as quartzite group and carbonate group according to ASTM standard 295. Among these, samples of quartzite group were found dominant. The petrography examination of gravels which was carried out constituted of opal, tridymite, chalcedony, crystobalite and alkali carbonates rocks. Those minerals react with alkalis in cement leading to expansion and cracking of concrete. Other components such as sulfides, sulfates, halites, iron oxides, clay minerals and anhydrites are examined, which might be present as coating and impurities. The present study indicated that all samples are suitable for concrete making and obtain the optimum solution for transporting these materials from quarries to cities with minimum cost according to Egyptian Code.展开更多
The reconstruction of spacecraft cluster based on local information and distributed strategy is investigated.Each spacecraft is an intelligent individual that can detect information within a limited range and can dete...The reconstruction of spacecraft cluster based on local information and distributed strategy is investigated.Each spacecraft is an intelligent individual that can detect information within a limited range and can determine its behavior based on surrounding information.The objective of the cluster is to achieve the formation reconstruction with minimum fuel consumption.Based on the principle of dual pulse rendezvous maneuver,three target selection strategies are designed for collision avoidance.Strategy-1 determines the target point’s attribution according to the target’s distance when the target point conflicts and uses a unit pulse to avoid a collision.Strategy-2 changes the collision avoidance behavior.When two spacecraft meet more than once,the strategy switches the target points of the two spacecraft.In Strategy-3,the spacecraft closer to the target has higher priority in target allocation.Strategy-3 also switches the target points when two spacecraft encounter more than once.The three strategies for a given position,different completion times,and random position are compared.Numerical simulations show that all three strategies can accomplish the spacecraft cluster's reconfiguration under the specified requirements.Strategy-3 is better than Strategy-1 in all simulation cases in the sense of less fuel consumption with different completion times and given location,and it is more effective than Strategy-2 in most of the completion time.With a random initial position and given time,Strategy-3 is better than Strategy-1 in about 70%of the cases and more stable.展开更多
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp...A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
文摘In real world applications the supply, the demand and the transportation cost per unit of the quantities in a transportation problem are hardly specified precisely because of the changing economic and environmental conditions. It is also important that the time required for transportation should be minimum. In this paper a method has been proposed for the minimization of transportation costs. Supply and transportation costs per unit of the quantities are also determined. The present study was carried out to evaluate the quality of gravel to know its suitability for aggregate (raw material for concrete and road). The samples of gravel were analyzed for petrographic, physical, mechanical and chemical properties. Samples were categorized as quartzite group and carbonate group according to ASTM standard 295. Among these, samples of quartzite group were found dominant. The petrography examination of gravels which was carried out constituted of opal, tridymite, chalcedony, crystobalite and alkali carbonates rocks. Those minerals react with alkalis in cement leading to expansion and cracking of concrete. Other components such as sulfides, sulfates, halites, iron oxides, clay minerals and anhydrites are examined, which might be present as coating and impurities. The present study indicated that all samples are suitable for concrete making and obtain the optimum solution for transporting these materials from quarries to cities with minimum cost according to Egyptian Code.
基金supported by the Advanced Research Project of China Manned Space Program.
文摘The reconstruction of spacecraft cluster based on local information and distributed strategy is investigated.Each spacecraft is an intelligent individual that can detect information within a limited range and can determine its behavior based on surrounding information.The objective of the cluster is to achieve the formation reconstruction with minimum fuel consumption.Based on the principle of dual pulse rendezvous maneuver,three target selection strategies are designed for collision avoidance.Strategy-1 determines the target point’s attribution according to the target’s distance when the target point conflicts and uses a unit pulse to avoid a collision.Strategy-2 changes the collision avoidance behavior.When two spacecraft meet more than once,the strategy switches the target points of the two spacecraft.In Strategy-3,the spacecraft closer to the target has higher priority in target allocation.Strategy-3 also switches the target points when two spacecraft encounter more than once.The three strategies for a given position,different completion times,and random position are compared.Numerical simulations show that all three strategies can accomplish the spacecraft cluster's reconfiguration under the specified requirements.Strategy-3 is better than Strategy-1 in all simulation cases in the sense of less fuel consumption with different completion times and given location,and it is more effective than Strategy-2 in most of the completion time.With a random initial position and given time,Strategy-3 is better than Strategy-1 in about 70%of the cases and more stable.
基金supported by the State Key Program of National Natural Science of China(Grant Nos. 61332019)the National Natural Science Foundation of China (61572303)+7 种基金National Key Research and Development Program of China ( 2017YFB0802003 , 2017YFB0802004)National Cryptography Development Fund during the 13th Five-year Plan Period (MMJJ20170216)the Foundation of State Key Laboratory of Information Security (2017-MS-03)the Fundamental Research Funds for the Central Universities(GK201702004,GK201603084)Major State Basic Research Development Program of China (973 Program) (No.2014CB340600)National High-tech R&D Program of China(2015AA016002, 2015AA016004)Natural Science Foundation of He Bei Province (No. F2017201199)Science and technology research project of Hebei higher education (No. QN2017020)
文摘A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.