The present study proposes a modified random sequential absorption(RSA)algorithm to generate a representative volume element(RVE)model for predicting the elastic properties of discontinuous curved fiber reinforced com...The present study proposes a modified random sequential absorption(RSA)algorithm to generate a representative volume element(RVE)model for predicting the elastic properties of discontinuous curved fiber reinforced composites(DCFRCs)with varying fiber waviness functions and orientations.A small-move method was proposed to modify the traditional RSA algorithm.In comparison with the original RSA algorithm,the generation efficiency of the proposed modified RSA algorithm increased by over 40%,and the achievable maximum fiber volume fraction could reach up to 15%with a fiber aspect ratio of 15.The generated RVE model was utilized in conducting finite element analysis to investigate the effect of fiber waviness and wavy functions on the elastic properties of DCFRCs.Finally,a modified rule-of-mixture was proposed to predict the elastic properties of DCFRCs with various fiber orientations.The results indicated that the elastic properties predicted by the modified rule-of-mixture were in good agreement with those obtained from the RVE model,thereby demonstrating its effectiveness.展开更多
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was pres...RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock.展开更多
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ...The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.展开更多
基金supported by the Liaoning Science and Technology Program“Open Bidding for Selecting the Best Candidates”Project,China(Grant No.2022JH1/10400043)Shanghai Science and Technology Innovation Action Plan,China(Grant No.22511102600)sponsored by Shanghai Gaofeng Project for University Academic Program Development。
文摘The present study proposes a modified random sequential absorption(RSA)algorithm to generate a representative volume element(RVE)model for predicting the elastic properties of discontinuous curved fiber reinforced composites(DCFRCs)with varying fiber waviness functions and orientations.A small-move method was proposed to modify the traditional RSA algorithm.In comparison with the original RSA algorithm,the generation efficiency of the proposed modified RSA algorithm increased by over 40%,and the achievable maximum fiber volume fraction could reach up to 15%with a fiber aspect ratio of 15.The generated RVE model was utilized in conducting finite element analysis to investigate the effect of fiber waviness and wavy functions on the elastic properties of DCFRCs.Finally,a modified rule-of-mixture was proposed to predict the elastic properties of DCFRCs with various fiber orientations.The results indicated that the elastic properties predicted by the modified rule-of-mixture were in good agreement with those obtained from the RVE model,thereby demonstrating its effectiveness.
基金NSF of U nited States under Contract 5 978East Asia and Pacific Program(960 2 485 )
文摘RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock.
文摘The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.