In order to simulate field distribution rules,mathematical models for 3-D air flows and gas transfer in the goaf of the coal mining are established,based on theories of permeability and dynamic dispersion through poro...In order to simulate field distribution rules,mathematical models for 3-D air flows and gas transfer in the goaf of the coal mining are established,based on theories of permeability and dynamic dispersion through porous media. A gas dispersion equation in a 3-D field is calculated by use of numerical method on a weighted upstream multi-element balance. Based on data of an example with a U type ventilation mode,surface charts of air pressure distribution and gas concentration are drawn by Graphtool software. Finally,a comparison between actually measured results in the model test and the numerical simulation results is made to proves the numerical implementation feasible.展开更多
With the substantial increase in image transmission,the demand for image security is increasing.Noise-like images can be obtained by conventional encryption schemes,and although the security of the images can be guara...With the substantial increase in image transmission,the demand for image security is increasing.Noise-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noise-like images cannot be directly previewed and retrieved.Based on the rank-then-encipher method,some researchers have designed a three-pixel exact thumbnail preserving encryption(TPE2)scheme,which can be applied to balance the security and availability of images,but this scheme has low encryption efficiency.In this paper,we introduce an efficient exact thumbnail preserving encryption scheme.First,blocking and bit-plane decomposition operations are performed on the plaintext image.The zigzag scrambling model is used to change the bit positions in the lower four bit planes.Subsequently,an operation is devised to permute the higher four bit planes,which is an extended application of the hidden Markov model.Finally,according to the difference in bit weights in each bit plane,a bit-level weighted diffusion rule is established to generate an encrypted image and still maintain the same sum of pixels within the block.Simulation results show that the proposed scheme improves the encryption efficiency and can guarantee the availability of images while protecting their privacy.展开更多
By the load definition of cluster, the request is regarded as granularity to compute load and implement the load balancing in cache cluster. First, the processing power of cache-node is studied from four aspects: netw...By the load definition of cluster, the request is regarded as granularity to compute load and implement the load balancing in cache cluster. First, the processing power of cache-node is studied from four aspects: network bandwidth, memory capacity, disk access rate and CPU usage. Then, the weighted load of cache-node is customized. Based on this, a load-balancing algorithm that can be applied to the cache cluster is proposed. Finally, Polygraph is used as a benchmarking tool to test the cache cluster possessing the load-balancing algorithm and the cache cluster with cache array routing protocol respectively. The results show the load-balancing algorithm can improve the performance of the cache cluster.展开更多
基金Projects 50534090 and 50674090 supported by the National Natural Science Foundation of China2005CB221503 by the National Key Basic ResearchDevelopment Program (973 Program)
文摘In order to simulate field distribution rules,mathematical models for 3-D air flows and gas transfer in the goaf of the coal mining are established,based on theories of permeability and dynamic dispersion through porous media. A gas dispersion equation in a 3-D field is calculated by use of numerical method on a weighted upstream multi-element balance. Based on data of an example with a U type ventilation mode,surface charts of air pressure distribution and gas concentration are drawn by Graphtool software. Finally,a comparison between actually measured results in the model test and the numerical simulation results is made to proves the numerical implementation feasible.
基金supported by the Pre-research Project of Songshan Laboratory,China(No.YYJC012022011)the Postgraduate Education Reform and Quality Improvement Project of Henan Province,China(Nos.YJS2022JD26 and SYLAL2023020)+2 种基金the Postgraduate Education Innovation Training Base,China(No.SYLJD2022008)the Science and Technology Project of Henan Province,China(Nos.232102210109 and 232102210096)the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness,China(No.HNTS2022019)。
文摘With the substantial increase in image transmission,the demand for image security is increasing.Noise-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noise-like images cannot be directly previewed and retrieved.Based on the rank-then-encipher method,some researchers have designed a three-pixel exact thumbnail preserving encryption(TPE2)scheme,which can be applied to balance the security and availability of images,but this scheme has low encryption efficiency.In this paper,we introduce an efficient exact thumbnail preserving encryption scheme.First,blocking and bit-plane decomposition operations are performed on the plaintext image.The zigzag scrambling model is used to change the bit positions in the lower four bit planes.Subsequently,an operation is devised to permute the higher four bit planes,which is an extended application of the hidden Markov model.Finally,according to the difference in bit weights in each bit plane,a bit-level weighted diffusion rule is established to generate an encrypted image and still maintain the same sum of pixels within the block.Simulation results show that the proposed scheme improves the encryption efficiency and can guarantee the availability of images while protecting their privacy.
文摘By the load definition of cluster, the request is regarded as granularity to compute load and implement the load balancing in cache cluster. First, the processing power of cache-node is studied from four aspects: network bandwidth, memory capacity, disk access rate and CPU usage. Then, the weighted load of cache-node is customized. Based on this, a load-balancing algorithm that can be applied to the cache cluster is proposed. Finally, Polygraph is used as a benchmarking tool to test the cache cluster possessing the load-balancing algorithm and the cache cluster with cache array routing protocol respectively. The results show the load-balancing algorithm can improve the performance of the cache cluster.