Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces...Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.展开更多
Based on the uniaxial compression creep experiments conducted on bauxite sandstone obtained from Sanmenxia,typical creep experiment curves were obtained.From the characteristics of strain component of creep curves,the...Based on the uniaxial compression creep experiments conducted on bauxite sandstone obtained from Sanmenxia,typical creep experiment curves were obtained.From the characteristics of strain component of creep curves,the creep strain is composed of instantaneous elastic strain,ε(me),instantaneous plastic strain,ε(mp),viscoelastic strain,ε(ce),and viscoplastic strain,ε(cp).Based on the characteristics of instantaneous plastic strain,a new element of instantaneous plastic rheology was introduced,instantaneous plastic modulus was defined,and the modified Burgers model was established.Then identification of direct screening method in this model was completed.According to the mechanical properties of rheological elements,one- and three-dimensional creep equations in different stress levels were obtained.One-dimensional model parameters were identified by the method of least squares,and in the process of computation,Gauss-Newton iteration method was applied.Finally,by fitting the experimental curves,the correctness of direct method model was verified,then the examination of posterior exclusive method of the model was accomplished.The results showed that in the improved Burgers models,the rheological characteristics of sandstone are embodied properly,microscopic analysis of creep curves is also achieved,and the correctness of comprehensive identification method of rheological model is verified.展开更多
Aiming at that the successive test data set of the strapdown inertial measurement unit is always small,a Bayesian method is used to study its statistical characteristics.Its prior and posterior distributions are set u...Aiming at that the successive test data set of the strapdown inertial measurement unit is always small,a Bayesian method is used to study its statistical characteristics.Its prior and posterior distributions are set up by the method and the pretest,sample and population information.Some statistical inferences can be made based on the posterior distribution.It can reduce the statistical analysis error in the case of small sample set.展开更多
Posterior constraint optimal selection techniques (COSTs) are developed for nonnegative linear programming problems (NNLPs), and a geometric interpretation is provided. The posterior approach is used in both a dynamic...Posterior constraint optimal selection techniques (COSTs) are developed for nonnegative linear programming problems (NNLPs), and a geometric interpretation is provided. The posterior approach is used in both a dynamic and non-dynamic active-set framework. The computational performance of these methods is compared with the CPLEX standard linear programming algorithms, with two most-violated constraint approaches, and with previously developed COST algorithms for large-scale problems.展开更多
Preventing subsidence of intervertebral cages in posterior lumbar interbody fusion (PLIF) requires understanding its mechanism, which is yet to be done. We aimed to describe the mechanism of intervertebral cage subsid...Preventing subsidence of intervertebral cages in posterior lumbar interbody fusion (PLIF) requires understanding its mechanism, which is yet to be done. We aimed to describe the mechanism of intervertebral cage subsidence by using finite element analysis through simulation of the osteoporotic vertebral bodies of an elderly woman. The data from computed tomography scans of L2-L5 vertebrae in a 72-year-old woman with osteoporosis were used to create 2 FE models: one not simulating implant placement (LS-INT) and one simulating L3/4 PLIF using polyetheretherketone (PEEK) cages (LS-PEEK). Loads and moments simulating the living body were applied to these models, and the following analyses were performed: 1) Drucker-Prager equivalent stress distribution at the cage contact surfaces;2) the distribution of damage elements in L2-L5 during incremental loading;and 3) the distribution of equivalent plastic strain at the cage contact surfaces. In analysis 1, the Drucker-Prager equivalent stress on the L3 and L4 vertebral endplates was greater for LS-PEEK than for LS-INT under all loading conditions and tended to be particularly concentrated at the contact surfaces. In analysis 2, compared with LS-INT, LS-PEEK showed more damage elements along the bone around the cages in the L3 vertebral body posterior to the cage contact surfaces, followed by the area of the L4 vertebral body posterior to the cage contact surfaces. In analysis 3, in the L3 inferior surface in LS-PEEK the distribution of equivalent plastic strain was visualized as gradually expanding along the cages from the area posterior to the cages to the area anterior to them with increased loading. These analyses suggested that in PLIF for osteoporotic vertebral bodies, the localized stress concentration generated by the use of PEEK cages may cause accumulation of microscopic damage in the fragile osteoporotic vertebral bodies around the cages, which may result in cage subsidence.展开更多
For a generalized quasi-Newtonian flow, a new stabilized method focused on the low-order velocity-pressure pairs, (bi)linear/(bi)linear and (bi)linear/constant element, is presented. The pressure projection stab...For a generalized quasi-Newtonian flow, a new stabilized method focused on the low-order velocity-pressure pairs, (bi)linear/(bi)linear and (bi)linear/constant element, is presented. The pressure projection stabilized method is extended from Stokes problems to quasi-Newtonian flow problems. The theoretical framework developed here yields an estimate bound, which measures error in the approximate velocity in the W 1,r(Ω) norm and that of the pressure in the L r' (Ω) (1/r + 1/r' = 1). The power law model and the Carreau model are special ones of the quasi-Newtonian flow problem discussed in this paper. Moreover, a residual-based posterior bound is given. Numerical experiments are presented to confirm the theoretical results.展开更多
文摘Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.
基金Projects (51174228,51274249) supported by the National Natural Science Foundation of China
文摘Based on the uniaxial compression creep experiments conducted on bauxite sandstone obtained from Sanmenxia,typical creep experiment curves were obtained.From the characteristics of strain component of creep curves,the creep strain is composed of instantaneous elastic strain,ε(me),instantaneous plastic strain,ε(mp),viscoelastic strain,ε(ce),and viscoplastic strain,ε(cp).Based on the characteristics of instantaneous plastic strain,a new element of instantaneous plastic rheology was introduced,instantaneous plastic modulus was defined,and the modified Burgers model was established.Then identification of direct screening method in this model was completed.According to the mechanical properties of rheological elements,one- and three-dimensional creep equations in different stress levels were obtained.One-dimensional model parameters were identified by the method of least squares,and in the process of computation,Gauss-Newton iteration method was applied.Finally,by fitting the experimental curves,the correctness of direct method model was verified,then the examination of posterior exclusive method of the model was accomplished.The results showed that in the improved Burgers models,the rheological characteristics of sandstone are embodied properly,microscopic analysis of creep curves is also achieved,and the correctness of comprehensive identification method of rheological model is verified.
文摘Aiming at that the successive test data set of the strapdown inertial measurement unit is always small,a Bayesian method is used to study its statistical characteristics.Its prior and posterior distributions are set up by the method and the pretest,sample and population information.Some statistical inferences can be made based on the posterior distribution.It can reduce the statistical analysis error in the case of small sample set.
文摘Posterior constraint optimal selection techniques (COSTs) are developed for nonnegative linear programming problems (NNLPs), and a geometric interpretation is provided. The posterior approach is used in both a dynamic and non-dynamic active-set framework. The computational performance of these methods is compared with the CPLEX standard linear programming algorithms, with two most-violated constraint approaches, and with previously developed COST algorithms for large-scale problems.
文摘Preventing subsidence of intervertebral cages in posterior lumbar interbody fusion (PLIF) requires understanding its mechanism, which is yet to be done. We aimed to describe the mechanism of intervertebral cage subsidence by using finite element analysis through simulation of the osteoporotic vertebral bodies of an elderly woman. The data from computed tomography scans of L2-L5 vertebrae in a 72-year-old woman with osteoporosis were used to create 2 FE models: one not simulating implant placement (LS-INT) and one simulating L3/4 PLIF using polyetheretherketone (PEEK) cages (LS-PEEK). Loads and moments simulating the living body were applied to these models, and the following analyses were performed: 1) Drucker-Prager equivalent stress distribution at the cage contact surfaces;2) the distribution of damage elements in L2-L5 during incremental loading;and 3) the distribution of equivalent plastic strain at the cage contact surfaces. In analysis 1, the Drucker-Prager equivalent stress on the L3 and L4 vertebral endplates was greater for LS-PEEK than for LS-INT under all loading conditions and tended to be particularly concentrated at the contact surfaces. In analysis 2, compared with LS-INT, LS-PEEK showed more damage elements along the bone around the cages in the L3 vertebral body posterior to the cage contact surfaces, followed by the area of the L4 vertebral body posterior to the cage contact surfaces. In analysis 3, in the L3 inferior surface in LS-PEEK the distribution of equivalent plastic strain was visualized as gradually expanding along the cages from the area posterior to the cages to the area anterior to them with increased loading. These analyses suggested that in PLIF for osteoporotic vertebral bodies, the localized stress concentration generated by the use of PEEK cages may cause accumulation of microscopic damage in the fragile osteoporotic vertebral bodies around the cages, which may result in cage subsidence.
基金Project supported by the Key Technology Research and Development Program of Sichuan Province of China(No.05GG006-006-2)
文摘For a generalized quasi-Newtonian flow, a new stabilized method focused on the low-order velocity-pressure pairs, (bi)linear/(bi)linear and (bi)linear/constant element, is presented. The pressure projection stabilized method is extended from Stokes problems to quasi-Newtonian flow problems. The theoretical framework developed here yields an estimate bound, which measures error in the approximate velocity in the W 1,r(Ω) norm and that of the pressure in the L r' (Ω) (1/r + 1/r' = 1). The power law model and the Carreau model are special ones of the quasi-Newtonian flow problem discussed in this paper. Moreover, a residual-based posterior bound is given. Numerical experiments are presented to confirm the theoretical results.