Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD...
详细信息
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD method analyze the electromagnetic scattering and propagation for double-negative (DNG) medium, z-transform is applied to the FDTD method in the double-negative (DNG) medium. For the simulations, extremely large computer memory space and a long computational time b required. A parallel algorithm for the FDTD method on the state of the art graphics hardware is presented. The parallel computing techniques can be used to reduce the computation time significantly and have been widely applied in various complex FDTD applications. In this paper, we simulate the interaction between electromagnetic wave and DNG medium, and describe an impact of new GPU features on development process of an efficient Finite Difference Time Domain (FDTD) implementation.
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo...
详细信息
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of moments (MOM). The asymptotic waveform evaluation (AWE) technique for dispersive dielectric medium is deduced and apllied to electromagnetic scattering analysis of double-negative medium within a given frequency band.
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiv...
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equivalent relationship between induced current and the measured CS-current was build, while the CS-current can be computed directly under the new incident source. Finally, we can reconstruct the induce current by utilizing the theory of compressive sensing (CS). Compared with traditional MOM, the computational complexity can be greatly reduced.
Although many methods of refining initialization have appeared, the sensitivity of K-Means to initial centers is still an obstacle in applications. In this paper, we investigate a new class of clustering algorithm, K-...
详细信息
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo...
详细信息
Ana\ysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential an...
详细信息
Ana\ysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential and reaction integrals arising in radar cross section (RCS) computation of cylindrical antenna by method of moments. The singularity of potential and reaction integrals is extracted through the semi-analytical method. The induced current on the surface and RCS of cylindrical antenna are calculated. Numerical examples are presented to illustrate the computational accuracy and efficiency of the proposed technique.
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiva...
详细信息
In this paper we review the major approaches to non-rigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more imp...
详细信息
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate...
详细信息
ISBN:
(纸本)9781424472352
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate all system parameters and all private/public keys. Any ' members in Ad hoc group can collaboratively generate the group signature with the help of a designated clerk, where the signer respectively generates the partial signature by using his private key and the clerk can check the correctness of the partial signature. Furthermore, anyone can verify the validity of the group signature by the group public key and trace back to find the identities of signers from the warrant created by the clerk. What's more, it can dynamically increase the parameter values of ~t and ~n, according to the actual security needs of mobile Ad hoc networks, but the private and public keys of the whole Ad hoc group still are not changed for relatively long-term stability.
暂无评论