Time filter

Source Type

Ganzhou, China

Jia R.P.,Shanghai Institute of Technology | Tao L.,Shanghai Institute of Technology | Tao L.,Gannan Normal College | Zheng K.S.,Shanghai Institute of Technology
Applied Mechanics and Materials | Year: 2011

In this work, highly functionalized carbon nanotubes (CNTs) were achieved using plasma inducing-graft technique, in which maleic anhydride (MAH) was used as graft monomer. Then they were introduced into epoxy resin (EP) curing system to obtain CNTs/EP composites. The modification performance of this proposed method was summarized and contrasted with that of argon (Ar) plasma atmosphere. Results show that these two plasma methods can improve CNTs' surface activity, and corresponding optimum powers are both 60 W. Meanwhile, thin polymaleic anhydride film can be coated on the surface of CNTs during MAH plasma inducing-graft, which can make sure of effectively dispersion and adhesion of CNTs in epoxy. Such treatment can not only obtain highly functionalized CNTs, but also overcome its serious self-entangling and aggregation problem. Compared with those composites modified by argon (Ar) plasma, the mechanical and thermal properties of CNTs/EP composites modified by MAH plasma are greatly enhanced. © (2011) Trans Tech Publications, Switzerland. Source

Qiu X.-F.,Gannan Normal College | Liu J.-W.,Beihang University | Zhao P.-C.,Beihang University
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011 - Proceedings | Year: 2011

There are tremendous business prospects for the cloud computing application on mobile internet. But combining cloud computing technology into mobile internet gives birth to a serial of security problems. One of the challenges is to construct the cloud computing secure architecture on mobile internet. After analyzing the available cloud computing security risks and secure architectures, and taking into account the characteristics of mobile internet, this paper designs a general secure cloud computing architecture on mobile internet with the advantages such as multi-hierarchy, multi-level, elasticity, cross-platform and unified user interface. © 2011 IEEE. Source

Qiu X.-F.,Beihang University | Qiu X.-F.,Gannan Normal College | Liu J.-W.,Beihang University | Sangi A.R.,Beihang University
Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010 | Year: 2010

Routing security is an important and well known issue in Ad hoc network applications and development. Various kinds of solutions have been proposed but they are impractical to be fully applied. In this paper, firstly the wormhole attack topology is analyzed, then cryptography and trust mechanism are combined to design a new multipath trust-based secure routing protocol(MTSR). MTSR based on AODV and SAODV, is distributed and can resist almost all available routing attacks such as discarding, Sybil, spoofing, jamming, flooding, rushing, and especially wormhole attack. Its trust value computation follows the principle of slowly increasing but sharply decreasing, and it does not require any additional equipment, strict assumptions, node location and precise time information. © 2010 IEEE. Source

Jia R.-P.,Shanghai Institute of Technology | Tao L.,Shanghai Institute of Technology | Tao L.,Gannan Normal College | Teng N.,Shanxi Institute of Coal CAS Chemistry
Xinxing Tan Cailiao/New Carbon Materials | Year: 2010

Plasma-induced graft polymerization was used to modify carbon nanotubes (CNTs), in which maleic anhydride (MAH) was used as polymeric monomer and argon as plasma source. The polymer film-modified CNTs (p-CNTs) were introduced into epoxy resin (EP) to obtain p-CNT/EP composites and their effects on EP properties were studied. The p-CNTs were characterized by FTIR and scanning electron microscopy. Results show that maleic anhydride can be graft polymerized onto the surface of CNTs using the plasma technique, forming a uniform polymaleic anhydride (PMAH) film. The mechanical properties of EP were greatly improved by adding p-CNTs. Source

Liu J.,Beihang University | Qiu X.,Beihang University | Qiu X.,Gannan Normal College
China Communications | Year: 2012

A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. Source

Discover hidden collaborations