Time filter

Source Type

Zhou S.,Sichuan Water Conservancy Vocational College | Liu X.,Sichuan Water Conservancy Vocational College
Journal of Computational and Theoretical Nanoscience | Year: 2016

In order to solve the security problem in the data storage and transmission process, a data security model of Internet of things based on attribute based access control is proposed in this paper. Moreover, this paper introduces a novel method to solve such problems by using Attribute-Based encryption method. The Attribute-based security system is a combination of an attribute-based access control and authentication mechanism. Its biggest advantage is that, it is not necessary to decrypt the data for access control, thus saving the energy consumption of expensive sensor node for data decryption; a detailed analysis has been given to run this system. The experiment result shows this data security model can fulfill the security requirements. Copyright © 2016 American Scientific Publishers All rights reserved.


Liu X.,Sichuan Water Conservancy Vocational College | Zhou S.,Sichuan Water Conservancy Vocational College
Journal of Computational and Theoretical Nanoscience | Year: 2016

Aiming to improve the correct rate and efficiency for distributed keyword search, an encrypted data model in computer networks is proposed in this paper. An efficient yet secure scheme is proposed to search the encrypted cloud data, while recovering the misspellings and typographical errors that exist frequently both in the search request and in the source data. The metric spaces and embedding methods have been used to construct a tree-based index; which allows retrieving only the relevant entries with a minimum number of distance evaluations. Several experiments have been conducted to illustrate the performance of our proposed methods. Furthermore deep analysis has been presented to prove the security of our methods. Copyright © 2016 American Scientific Publishers All rights reserved.


Liu X.,Sichuan Water Conservancy Vocational College
Journal of Computational and Theoretical Nanoscience | Year: 2016

Aiming at improving the efficiency and controllable in data access control and encryption storage technology of Internet of things in network communication, the paper proposed a network security architecture. This paper outlines the security requirements of internet of things and the current research status and this paper also presents a special task for internet of things, their security requirements. Data encryption and access control issue were discussed in detail. The experiment result shows that the performance can be improved substantially. Copyright © 2016 American Scientific Publishers All rights reserved.


Zhou S.,Sichuan Water Conservancy Vocational College
Journal of Computational and Theoretical Nanoscience | Year: 2016

In order to solve the problem of low energy utilization and large storage space in data storage and exchange in Internet of things, an access control model of Internet of things based on distributed memory system is proposed in this paper. With the development of public and private key cryptography, the continuity of role-based cryptography (RBE) and identity-based cryptography (IBE) is to be found regularly and the researches on access control model on the basis of these cryptosystems seems to be endless. This chapter presents internet of things network distributed data storage and access control to achieve large scale storage systems. This energy utilization, the storage space of wireless sensor nodes, life of the entire internet of things networks and impact on their operation has been tested by simulation. Copyright © 2016 American Scientific Publishers All rights reserved.


Zheng J.,Chengdu University of Technology | Liu H.,Sichuan Water Conservancy Vocational College | Wang K.,Chengdu University of Technology | You Z.,University of Adelaide
Journal of Natural Gas Science and Engineering | Year: 2017

The capillary pressure-saturation relation in traditional models is obtained by representing porous medium as a bundle of capillary tubes. The effect of pore connectivity is ignored, which leads to the evident deviation frequently observed between the measured data and model prediction near the breakthrough pressure region. In the present work, a new fractal-percolation-based capillary pressure model is developed. The proposed model accounts for the characteristics of pore size distribution in fractal media, and is based on the percentage of pore volume rather than that of pore number in conventional percolation theory. In the new model, a simple and yet sufficiently accurate relation between the allowed and accessible saturations is applied near the threshold saturation. It results in a high-accuracy prediction of capillary pressure, especially near the breakthrough pressure region. The new model is validated by experimental data. Parameter sensitivity analysis and comparison with the results from conventional fractal theory are presented. This new model is an extension to the conventional fractal theory, as it is consistent when the threshold saturation is equal to zero. © 2017 Elsevier B.V.


Chen H.-J.,Southwest University of Science and Technology | Chen H.-J.,Sichuan Water Conservancy Vocational College | Fan T.-H.,Southwest University of Science and Technology | Mu J.,Sichuan Agricultural University
Shenyang Gongye Daxue Xuebao/Journal of Shenyang University of Technology | Year: 2016

In order to solve the blindness problem existing in the numerical scheduling of network congestion, a numerical scheduling method for network congestion based on multi-objective resolution optimization was proposed. The modeling expression for the numerical scheduling problem of network congestion was carried out. In addition, the optimal problem of congestion process scheduling was decomposed into the multi-objective optimization problem at the same time, namely the optimal task allocation problem of channel and routing congestion scheduling problem. According to the particle swarm optimization (PSO) algorithm, the calculation for the optimal solution of channel allocation problem was performed. Meanwhile, the constraint model was designed, and the congestion scheduling problem was solved with the genetic algorithm (GA). Moreover, the numerical scheduling of network at the congestion state was realized. The results show that the congestion scheduling scheme in the proposed algorithm has good enforceability. © 2016, Editorial Department of Journal of Shenyang University of Technology. All right reserved.


PubMed | University of Sichuan, University of Saskatchewan, Research Institute Co., Sichuan Water Conservancy Vocational College and Sichuan Agricultural University
Type: Journal Article | Journal: Journal of environmental sciences (China) | Year: 2014

Estuaries have been described as one of the most difficult environments on Earth. It is difficult to know how to treat the combined wastewater in tidal rivers at the estuary, where the situation is very different from ordinary fresh water rivers. Waste oyster shell was used as the active filler in this study in a bio-contact oxidation tank to treat the combined wastewater at the Fengtang Tidal River. With a middle-experimental scale of 360 m3/day, the average removal efficiency of COD, BOD, NH3-N, TP and TSS was 80.05%, 85.02%, 86.59%, 50.58% and 85.32%, respectively, in this bio-contact oxidation process. The living microbes in the biofilms on the waste oyster shell in this bio-contact oxidation tank, which were mainly composed of zoogloea, protozoa and micro-metazoa species, revealed that waste oyster shell as the filler was suitable material for combined wastewater degradation. This treatment method using waste oyster shell as active filler was then applied in a mangrove demonstration area for water quality improvement near the experiment area, with a treatment volume of 5 x 10(3) m3/day. Another project was also successfully applied in a constructed wetland, with a wastewater treatment volume of 1 x 10(3) m3/day. This technology is therefore feasible and can easily be applied on a larger scale.


Xu L.-J.,Hydrochina Huadong Engineering Corporation | Xue Y.,Hydrochina Huadong Engineering Corporation | Zhang S.,Sichuan Water Conservancy Vocational College
Shiyan Liuti Lixue/Journal of Experiments in Fluid Mechanics | Year: 2013

The process of bubble formation is involved in a lot of gas-liquid reactors and process equipment. It is therefore important to understand bubble formation process and to develop computational models for the accurate prediction of the bubble formation characteristics in different bubbling regimes. Numerical simulation of bubble formation cycle on orifice were carried out using the combined level set and volume-of-fluid method and the predictions were experimentally validated, Effects of gas flow rate and orifice diameter on the bubbling regimes were discussed. Based on the simulation data and experimental data on the transition of bubble formation regimes, Froude and Bond numbers, the inlet gas velocity at orifice decreases with increase in the orifice diameter is presented.


Yang S.P.,Sichuan Water Conservancy Vocational College | Yu J.H.,Sichuan Water Conservancy Vocational College | Zhao Z.B.,Sichuan Water Conservancy Vocational College | Fu W.X.,University of Sichuan
Hydraulic Engineering III - Proceedings of the 3rd Technical Conference on Hydraulic Engineering, CHE 2014 | Year: 2015

In this study the disturbance factor in the general Hoek–Brown (HB) criterion is considered to be a gradually-attenuated variable from the excavation surface to the deep surrounding rocks. The elasto-plastic analytical solution is formulated for an axisymmetrical cavern model in which there exist a supported pressure at the wall of tunnel and a far-field pressure at infinity. The presented analytical model can well reflect the disturbance of the HB rock mass triggered by drilling and blasting excavation. © 2015 Taylor & Francis Group, London, UK.


Liu X.,Sichuan water conservancy vocational college
Metallurgical and Mining Industry | Year: 2015

In this paper, the author researches on the identity-related services and key technology application in Internet of Things (IoT). The paper summed up the characteristics of the Internet of Things (IOT) applications and current application situation from the perspectives of IOT application. IOT protocols and research work of organization are analyzed from the technical level which provides help for IOT architecture. This paper also focuses on several key technologies for the IOT applications, which includes the IOT service framework based on semantic, semantic annotation method for web service discovery, the context model and reasoning model based on ontology, the composition service of IOT and QoS, the design and implementation of smart middleware.

Loading Sichuan Water Conservancy Vocational College collaborators
Loading Sichuan Water Conservancy Vocational College collaborators