A numerical study was conducted for the fully developed laminar flow in rotating curved elliptical pipe. Due to the rotation, the Coriolis force can also contribute to the secondary flow. The interaction of rotation a...A numerical study was conducted for the fully developed laminar flow in rotating curved elliptical pipe. Due to the rotation, the Coriolis force can also contribute to the secondary flow. The interaction of rotation and curvature complicates the flow characteristics. The boundary-fitted coordinate was adopted to study the flow characteristic in the rotating systems. The effects of rotation on the flow transition were studied in detail. The generation and mergence of vortices in rotating curved elliptical pipes were also captured for the first time. The simulation results show that the flow for the case of large aspect ratio of the cross-section is more likely to be unstable than that for smaller one.展开更多
An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneou...An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneously deal with error detection and data correction.Up to three errors in our approach can be detected and corrected. This approach has at least thesame security as that based on RSA system, but smaller keys to achieve the same level of security.Our approach is more efficient than the known ones and more suited for limited environments likepersonal digital assistants (PDAs), mobile phones and smart cards without RSA co-processors.展开更多
To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level aler...To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level alerts is integrated by using the Chronicle patternsbased on time intervals, which describe and match the alerts with the temporal time constrains of aninput sequence. In the second stage, the preparing relationship between the high-level alerts isdefined, which is applied to eorrtlatethe high-level alerts, and the attack scenario is constructedby drawing the attack graph. In the end a given example show? the performances of this two-stagecorrelation algorithm in decreasing the number and improving the information semantic of theintrusion alerts produced by the IDS.展开更多
基金the National Natural Science Foundation of China(Grant No: 10272096)
文摘A numerical study was conducted for the fully developed laminar flow in rotating curved elliptical pipe. Due to the rotation, the Coriolis force can also contribute to the secondary flow. The interaction of rotation and curvature complicates the flow characteristics. The boundary-fitted coordinate was adopted to study the flow characteristic in the rotating systems. The effects of rotation on the flow transition were studied in detail. The generation and mergence of vortices in rotating curved elliptical pipes were also captured for the first time. The simulation results show that the flow for the case of large aspect ratio of the cross-section is more likely to be unstable than that for smaller one.
基金Supported by the National Natural Science Funda tion of China (90204012)
文摘An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneously deal with error detection and data correction.Up to three errors in our approach can be detected and corrected. This approach has at least thesame security as that based on RSA system, but smaller keys to achieve the same level of security.Our approach is more efficient than the known ones and more suited for limited environments likepersonal digital assistants (PDAs), mobile phones and smart cards without RSA co-processors.
文摘To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level alerts is integrated by using the Chronicle patternsbased on time intervals, which describe and match the alerts with the temporal time constrains of aninput sequence. In the second stage, the preparing relationship between the high-level alerts isdefined, which is applied to eorrtlatethe high-level alerts, and the attack scenario is constructedby drawing the attack graph. In the end a given example show? the performances of this two-stagecorrelation algorithm in decreasing the number and improving the information semantic of theintrusion alerts produced by the IDS.