Grounding characteristics of linear, star-type and toroidal electrodes are discussed in this paper. Based on the analysis of the performance of double-ring in uniform and horizontal two-layer soils, an electrode model...
详细信息
Grounding characteristics of linear, star-type and toroidal electrodes are discussed in this paper. Based on the analysis of the performance of double-ring in uniform and horizontal two-layer soils, an electrode model of standard triple concentric rings buried with different depth is presented for plusmn800 kV Xiluodu and Xiangjiaba converter stations in the first period of Jinsha River DC projects. Considering the three sending converter stations in the projects close to each other relatively, an initial analysis of sharing electrodes has been made, including the operation mode of converter stations, choice of rated current and the design model of electrodes. Simulation results obtained from the electrode sites primarily selected for Xiluodu right-bank converter station show that the above model can satisfy the operation requirements with a better economical performance and sharing electrodes by multi-converter stations is also feasible. They may supply some reference to the practical projects.
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ...
详细信息
Certificateless public key cryptography (CL-PKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asiacrypt 2003, which removes the use of certificate to ensure the authenticity of the user's public k...
详细信息
Certificateless public key cryptography (CL-PKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asiacrypt 2003, which removes the use of certificate to ensure the authenticity of the user's public key in the traditional certificate-based public key cryptography and also overcomes the key escrow problem in the identity-based public key cryptography. Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced by Araki et al.. In this paper, to the best of our knowledge, we give the first precise definition and security notions for certificateless convertible limited verifier signature and then the first concrete signature scheme which is provably secure under the CDH assumption. We also extend our signature scheme into a certificateless convertible two limited verifiers scheme for certain applications at the end of this paper
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iter...
详细信息
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iterative computations of division, multiplication and accumulation with variable loop times. Besides standard HDL programming and schematic input, Simulink-to-FPGA has been tried as a different design flow. Experimental results are compared between different design methods with discussion of their pros and cons
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types and then accomplishing the detection for data package through the collaboration of the detect nodes, the processing efficiency of the intrusion detection system has been improved as a whole.
Low Earth orbit (LEO) satellite networks are capable of providing wireless connectivity seamlessly and continuously to any part of the world with guaranteed short round-trip propagation delay. As a key part of next ge...
详细信息
Low Earth orbit (LEO) satellite networks are capable of providing wireless connectivity seamlessly and continuously to any part of the world with guaranteed short round-trip propagation delay. As a key part of next generation network (NGN) infrastructure, next generation satellite networks are expected to support a variety of applications with diverse performance requirements. This paper argues that the constellation tomography for the LEO satellite network is a preliminary step for efficient satellite network monitoring and performance promotion. To measure the constellation, a divide-and-conquer mechanism is developed for each parameter estimation by delay probing. The delay measurement is only carried out between two terminals located at the same geographic positions. Performance evaluation on several popular polar LEO constellations proves the accuracy and efficiency of the developed constellation tomography algorithms in divide-and-conquer manner. The geographic position limitation of the delay probing terminals for valid constellation inference is also analyzed in the paper
The highly topological dynamics characterize the most fundamental property of satellite networks contrary to the terrestrial networks. This manifest feature directs the researches on various aspects of satellite netwo...
详细信息
The highly topological dynamics characterize the most fundamental property of satellite networks contrary to the terrestrial networks. This manifest feature directs the researches on various aspects of satellite networks, including routing and switching architecture selection, routing protocol and reliable transmission control protocol design and enhancement, etc,. The paper quantifies the dynamical activates of layered satellite network topologies. The number and length of network snapshots of one-layered satellite constellations are formulated concisely. The snapshot distributions of typical multi-layered constellations are also evaluated. With this work, it compensates for the simplified topological assumptions in many satellite network related investigations. The thorough understanding of this basic feature not only provides for an accurate quantification of network behavior, but also guides constellation design for future satellite networks
As for the development of the Internet applications and distributed computing, the need for supporting these distributed, collaborative, loosely coupled and complex applications emerges. Although powerful, the flat mo...
详细信息
As for the development of the Internet applications and distributed computing, the need for supporting these distributed, collaborative, loosely coupled and complex applications emerges. Although powerful, the flat model is found lacking functionality and efficiency when used for these new applications. Aiming at getting more flexible models, various extensions to the traditional transaction model have been proposed. However, these researches focus on relaxing the constraints of ACID properties and increasing the concurrency and flexibility in specific environments, and the restriction of data source interfaces leads to the difficulties in implementing the extended transaction primitives. A novel framework for supporting extended transaction models in the J2EE platform is presented by enforcing the transaction manager to control the concurrency. In this way, the transaction manager holds a full control of access from applications to data sources, and thus gives supports for common extended transaction models.
Dual Source Heating (Air Conditioning) System is a system proposed in patent 00100102.7. A full exposition of its performance is presented in this paper. It is found that in comparison with conventional system it cons...
详细信息
Dual Source Heating (Air Conditioning) System is a system proposed in patent 00100102.7. A full exposition of its performance is presented in this paper. It is found that in comparison with conventional system it consumes far less fossil fuel. Against the electrically driven heat pump, it provides a more reliable operation. Unlike CHP (Combined Heat and Power), the problem of interconnection with public power grid does not exist. In addition, to meet a specified heat load, the amount of natural gas needed to feed the system is remarkably reduced than that needed for cogeneration system. This is important because in China natural gas is relatively scarce and the peak demand appears normally in heating seasons.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
暂无评论