期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
NUMERICAL ANALYSIS OF THE FLUID FLOW IN A ROTATING CURVED ELLIPTICAL PIPE 被引量:2
1
作者 majian-feng SHENXin-rong ZHANGBen-zhao CHENHua-jun 《Journal of Hydrodynamics》 SCIE EI CSCD 2005年第2期171-178,共8页
A numerical study was conducted for the fully developed laminar flow in rotating curved elliptical pipe. Due to the rotation, the Coriolis force can also contribute to the secondary flow. The interaction of rotation a... A numerical study was conducted for the fully developed laminar flow in rotating curved elliptical pipe. Due to the rotation, the Coriolis force can also contribute to the secondary flow. The interaction of rotation and curvature complicates the flow characteristics. The boundary-fitted coordinate was adopted to study the flow characteristic in the rotating systems. The effects of rotation on the flow transition were studied in detail. The generation and mergence of vortices in rotating curved elliptical pipes were also captured for the first time. The simulation results show that the flow for the case of large aspect ratio of the cross-section is more likely to be unstable than that for smaller one. 展开更多
关键词 rotating curved elliptical pipe secondary flow boundary-fitted coordinates
原文传递
Fault Tolerant Approach for Data Encryption and Digital Signature Based on ECC System
2
作者 ZENGYong majian-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期13-16,共4页
An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneou... An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneously deal with error detection and data correction.Up to three errors in our approach can be detected and corrected. This approach has at least thesame security as that based on RSA system, but smaller keys to achieve the same level of security.Our approach is more efficient than the known ones and more suited for limited environments likepersonal digital assistants (PDAs), mobile phones and smart cards without RSA co-processors. 展开更多
关键词 fault tolerance dliptic curve cryptography error correction
下载PDF
Two-Stage Algorithm for Correlating the Intrusion Alerts
3
作者 WANGLiang-min majian-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期89-92,共4页
To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level aler... To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level alerts is integrated by using the Chronicle patternsbased on time intervals, which describe and match the alerts with the temporal time constrains of aninput sequence. In the second stage, the preparing relationship between the high-level alerts isdefined, which is applied to eorrtlatethe high-level alerts, and the attack scenario is constructedby drawing the attack graph. In the end a given example show? the performances of this two-stagecorrelation algorithm in decreasing the number and improving the information semantic of theintrusion alerts produced by the IDS. 展开更多
关键词 intrusion detection alert correlation partial ordering
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部