To avoid the aerodynamic performance loss of airfoil at non-design state which often appears in single point design optimization, and to improve the adaptability to the uncertain factors in actual flight environment, ...To avoid the aerodynamic performance loss of airfoil at non-design state which often appears in single point design optimization, and to improve the adaptability to the uncertain factors in actual flight environment, a two-dimensional stochastic airfoil optimization design method based on neural networks is presented. To provide highly efficient and credible analysis, four BP neural networks are built as surrogate models to predict the airfoil aerodynamic coefficients and geometry parameter. These networks are combined with the probability density function obeying normal distribution and the genetic algorithm, thus forming an optimization design method. Using the method, for GA(W)-2 airfoil, a stochastic optimization is implemented in a two-dimensional flight area about Mach number and angle of attack. Compared with original airfoil and single point optimization design airfoil, results show that the two-dimensional stochastic method can improve the performance in a specific flight area, and increase the airfoil adaptability to the stochastic changes of multiple flight parameters.展开更多
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc...In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.展开更多
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m...The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.展开更多
文摘To avoid the aerodynamic performance loss of airfoil at non-design state which often appears in single point design optimization, and to improve the adaptability to the uncertain factors in actual flight environment, a two-dimensional stochastic airfoil optimization design method based on neural networks is presented. To provide highly efficient and credible analysis, four BP neural networks are built as surrogate models to predict the airfoil aerodynamic coefficients and geometry parameter. These networks are combined with the probability density function obeying normal distribution and the genetic algorithm, thus forming an optimization design method. Using the method, for GA(W)-2 airfoil, a stochastic optimization is implemented in a two-dimensional flight area about Mach number and angle of attack. Compared with original airfoil and single point optimization design airfoil, results show that the two-dimensional stochastic method can improve the performance in a specific flight area, and increase the airfoil adaptability to the stochastic changes of multiple flight parameters.
文摘In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.
基金This work is supported by the National Natural Science Foundation for Distinguished Young Scholar of China under Grant No. 61325006 and the National High-tech Research and Development Program of China under Grant No. 2014AA01A701.
文摘The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.