-
Experimental and numerical investigation on folding stable state of bistable deployable composite boom
Authors:
Tian-Wei Liu,
Jiang-Bo Bai,
Hao-Tian Xi,
Nicholas Fantuzzi,
Guang-Yu Bu,
Yan Shi
Abstract:
The bistable deployable composite boom (Bi-DCB) can realize the bistable function by storing and releasing strain energy, which has a good application prospect in the aerospace field. In this paper, the folding stable state of the Bi-DCB was investigated using experimental and numerical approaches. Using the vacuum bag method, six Bi-DCB specimens were prepared. Bistable experiments of Bi-DCB spec…
▽ More
The bistable deployable composite boom (Bi-DCB) can realize the bistable function by storing and releasing strain energy, which has a good application prospect in the aerospace field. In this paper, the folding stable state of the Bi-DCB was investigated using experimental and numerical approaches. Using the vacuum bag method, six Bi-DCB specimens were prepared. Bistable experiments of Bi-DCB specimens were conducted and linear fitting with Archimedes' helix was performed to determine the folding stable configuration. In addition, two Finite Element Models (FEMs) were established for predicting the folding stable state of the Bi-DCB. Two classical failure criteria were utilized to analyze the stress level of the folding stable state of the Bi-DCB. Numerical results of two FEMs agreed well with experimental results, including the bistable deformation process and the folding stable state.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Resilience of IOTA Consensus
Authors:
Hamed Mamache,
Gabin Mazué,
Osama Rashid,
Gewu Bu,
Maria Potop-Butucaru
Abstract:
Blockchains are appealing technologies with various applications ranging from banking to networking. IOTA blockchain is one of the most prominent blockchain specifically designed for IoT environments. In this paper we investigate the convergence of IOTA consensus algorithms: Fast Probabilistic Consensus and Cellular Consensus, when run on top of various topologies. Furthermore, we investigate thei…
▽ More
Blockchains are appealing technologies with various applications ranging from banking to networking. IOTA blockchain is one of the most prominent blockchain specifically designed for IoT environments. In this paper we investigate the convergence of IOTA consensus algorithms: Fast Probabilistic Consensus and Cellular Consensus, when run on top of various topologies. Furthermore, we investigate their resilience to various types of adversaries. Our extensive simulations show that both Cellular Consensus and Fast Probabilistic Consensus have poor convergence rates even under low power adversaries and have poor scaling performances except for the case of Watts Strogatz topologies. Our study points out that the design of IOTs dedicated blockchains is still an open research problem and gives hints design.
△ Less
Submitted 29 April, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
Generalizing the Sokolov-Ternov effect for radiative polarization in intense laser fields
Authors:
X. S. Geng,
Z. G. Bu,
Y. T. Wu,
Q. Q. Han,
C. Y. Qin,
W. Q. Wang,
X. Yan,
L. G. Zhang,
B. F. Shen,
L. L. Ji
Abstract:
A consistent description of the radiative polarization for relativistic electrons in intense laser fields is derived by generalizing the Sokolov-Ternov effect in general field structure. The new form together with the spin-dependent radiation-reaction force provides a complete set of dynamical equations for electron momentum and spin in strong fields. When applied to varying intense fields, e.g. t…
▽ More
A consistent description of the radiative polarization for relativistic electrons in intense laser fields is derived by generalizing the Sokolov-Ternov effect in general field structure. The new form together with the spin-dependent radiation-reaction force provides a complete set of dynamical equations for electron momentum and spin in strong fields. When applied to varying intense fields, e.g. the laser fields, the generalized Sokolov-Ternov effect allows electrons to gain or lose polarization in any directions other than along the magnetic field in the rest frame of the electron. The generalized theory is applied to the collision process between initially polarized/unpolarized high energy electrons with linearly polarized ultra-intense laser pulse, showing results that eliminate the dependence on specific choices of a quantization axis and spin initialization existing in spin-projection models.
△ Less
Submitted 11 March, 2020; v1 submitted 8 December, 2019;
originally announced December 2019.
-
Metamorphic IOTA
Authors:
Gewu Bu,
Wassim Hana,
Maria Potop-Butucaru
Abstract:
IOTA opened recently a new line of research in distributed ledgers area by targeting algorithms that ensure a high throughput for the transactions generated in IoT systems. Transactions are continuously appended to an acyclic structure called tangle and each new transaction selects as parents two existing transactions (called tips) that it approves. G-IOTA, a very recent improvement of IOTA, targe…
▽ More
IOTA opened recently a new line of research in distributed ledgers area by targeting algorithms that ensure a high throughput for the transactions generated in IoT systems. Transactions are continuously appended to an acyclic structure called tangle and each new transaction selects as parents two existing transactions (called tips) that it approves. G-IOTA, a very recent improvement of IOTA, targets to protect tips left behind offering hence a good confidence level. However, this improvement had a cost: the use of an additional tip selection mechanism which may be critical in IoT systems since it needs additional energy consumption. In this paper we propose a new metamorphic algorithm for tip selection that offers the best guaranties of both IOTA and G-IOTA. Our contribution is two fold. First, we propose a parameterized algorithm, E-IOTA, for tip selection which targets to reduce the number of random walks executed in previous versions (IOTA and G-IOTA) while maintaining the same security guaranties as IOTA and the same confidence level and fairness with respect to tips selection as G-IOTA. Then we propose a formal analysis of the security guaranties offered by E-IOTA against various attacks mentioned in the original IOTA proposal (e.g. large weight attack, parasite chain attack and splitting attack). Interestingly, to the best of our knowledge this is the first formal analysis of the security guaranties of IOTA and its derivatives.
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
HyperPubSub: Blockchain based Publish/Subscribe
Authors:
Gewu Bu,
Thanh Son Lam Nguyen,
Maria Potop-Butucaru,
Kim Thai
Abstract:
In this paper we describe the architecture and the implementation of a broker based publish/subscribe system where the broker role is played by a private blockchain, Hy-perledger Fabric. We show the effectiveness of our architecture by implementing and deploying a photo trading plateform. Interestingly, our architecture is generic enough to be adapted to any digital asset trading.
In this paper we describe the architecture and the implementation of a broker based publish/subscribe system where the broker role is played by a private blockchain, Hy-perledger Fabric. We show the effectiveness of our architecture by implementing and deploying a photo trading plateform. Interestingly, our architecture is generic enough to be adapted to any digital asset trading.
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
Markovian model for Broadcast in Wireless Body Area Networks
Authors:
Bruno Baynat,
Gewu Bu,
Maria Potop-Butucaru
Abstract:
Wireless body area networks became recently a vast field of investigation. A large amount of research in this field is dedicated to the evaluation of various communication protocols, e.g., broadcast or convergecast, against human body mobility. Most of the time this evaluation is done via simulations and in many situations only synthetic data is used for the human body mobility. In this paper we p…
▽ More
Wireless body area networks became recently a vast field of investigation. A large amount of research in this field is dedicated to the evaluation of various communication protocols, e.g., broadcast or convergecast, against human body mobility. Most of the time this evaluation is done via simulations and in many situations only synthetic data is used for the human body mobility. In this paper we propose for the first time in Wireless Body Area Networks a Markovian analytical model specifically designed for WBAN networks. The main objective of the model is to evaluate the efficiency of a multi-hop transmission in the case of a diffusion-based broadcast protocol, with respect to various performance parameters (e.g., cover probability, average cover number, hitting probability or average cover time). We validate our model by comparing its results to simulation and show its accuracy. Finally, but not least, we show how our model can be used to analytically evaluate the trade-off between transmission power and redundancy, when the same message is broadcasted several times in order to increase the broadcast reliability while maintaining a low transmission power.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
G-IOTA: Fair and confidence aware tangle
Authors:
Gewu Bu,
Önder Gürcan,
Maria Potop-Butucaru
Abstract:
This paper proposes strategies to improve the IOTA tangle in terms of resilience to splitting attacks. Our contribution is two fold. First, we define the notion of confidence fairness for tips selection algorithms to guarantee the first approval for all honest tips. Then, we analyze IOTA-tangle from the point of view of confidence fairness and identify its drawbacks. Second, we propose a new selec…
▽ More
This paper proposes strategies to improve the IOTA tangle in terms of resilience to splitting attacks. Our contribution is two fold. First, we define the notion of confidence fairness for tips selection algorithms to guarantee the first approval for all honest tips. Then, we analyze IOTA-tangle from the point of view of confidence fairness and identify its drawbacks. Second, we propose a new selection mechanism, G-IOTA, that targets to protect tips left behind. G-IOTA therefore has a good confidence fairness. G-IOTA lets honest transactions increase their confidence efficiently. Furthermore, G-IOTA includes an incentive mechanism for users who respect the algorithm and punishes conflicting transactions. Additionally, G-IOTA provides a mutual supervision mechanism that reduces the benefits of speculative and lazy behaviours.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
Wireless Broadcast with short labelling
Authors:
Gewu Bu,
Maria Potop-Butucaru,
Mikael Rabie
Abstract:
In this paper, we study the broadcast problem in wireless networks when the broadcast is helped by a labelling scheme. We focus on two variants of broadcast: broadcast without acknowledgment (i.e. the initiator of the broadcast is not notified at the end of broadcast) and broadcast with acknowledgment. Our contribution is threefold. First, we improve in terms of memory complexity a recent labellin…
▽ More
In this paper, we study the broadcast problem in wireless networks when the broadcast is helped by a labelling scheme. We focus on two variants of broadcast: broadcast without acknowledgment (i.e. the initiator of the broadcast is not notified at the end of broadcast) and broadcast with acknowledgment. Our contribution is threefold. First, we improve in terms of memory complexity a recent labelling-based broadcast scheme with acknowledgment designed for arbitrary networks.Second, we propose label optimal broadcast algorithms in Level Separable Networks (a class of networks issued from recent studies in Wireless Body Area Networks). In this class of networks we propose an acknowledgment-free broadcast strategy using 1-bit labels and broadcast with acknowledgment using 2-bits labels. In the class of level-separable networks, our algorithms finish within 2D rounds, where D is the eccentricity of the broadcast initiator. Interestingly, the time complexity of broadcast in the case of level-separable networks does not depend on the size of the network but rather on the initiator eccentricity which makes this class of graphs interesting for further investigation. Finally, we study the hardness of determining that a graph is level separable. Our study shows that even though checking that a separation is a level separation can be done in polynomial time, determining that a graph has the level separable property is NP-complete. This result opens interesting independent research directions.
△ Less
Submitted 29 January, 2020; v1 submitted 25 January, 2019;
originally announced January 2019.
-
BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks
Authors:
Gewu Bu,
Maria Potop-Butucaru
Abstract:
BANZKP is the best to date Zero Knowledge Proof (ZKP) based secure lightweight and energy efficient authentication scheme designed for Wireless Area Network (WBAN). It is vulnerable to several security attacks such as the replay attack, Distributed Denial-of-Service (DDoS) attacks at sink and redundancy information crack. However, BANZKP needs an end-to-end authentication which is not compliant wi…
▽ More
BANZKP is the best to date Zero Knowledge Proof (ZKP) based secure lightweight and energy efficient authentication scheme designed for Wireless Area Network (WBAN). It is vulnerable to several security attacks such as the replay attack, Distributed Denial-of-Service (DDoS) attacks at sink and redundancy information crack. However, BANZKP needs an end-to-end authentication which is not compliant with the human body postural mobility. We propose a new scheme BAN-GZKP. Our scheme improves both the security and postural mobility resilience of BANZKP. Moreover, BAN-GZKP uses only a three-phase authentication which is optimal in the class of ZKP protocols. To fix the security vulnerabilities of BANZKP, BAN-GZKP uses a novel random key allocation and a Hop-by-Hop authentication definition. We further prove the reliability of our scheme to various attacks including those to which BANZKP is vulnerable. Furthermore, via extensive simulations we prove that our scheme, BAN-GZKP, outperforms BANZKP in terms of reliability to human body postural mobility for various network parameters (end-to-end delay, number of packets exchanged in the network, number of transmissions). We compared both schemes using representative convergecast strategies with various transmission rates and human postural mobility. Finally, it is important to mention that BAN-GZKP has no additional cost compared to BANZKP in terms memory, computational complexity or energy consumption.
△ Less
Submitted 20 February, 2018;
originally announced February 2018.
-
Automated Low-cost Terrestrial Laser Scanner for Measuring Diameters at Breast Height and Heights of Forest Trees
Authors:
Pei Wang,
Guochao Bu,
Ronghao Li,
Rui Zhao
Abstract:
Terrestrial laser scanner is a kind of fast, high-precision data acquisition device, which had been more and more applied to the research areas of forest inventory. In this study, a kind of automated low-cost terrestrial laser scanner was designed and implemented based on a two-dimensional laser radar sensor SICK LMS-511 and a stepper motor. The new scanner was named as BEE, which can scan the for…
▽ More
Terrestrial laser scanner is a kind of fast, high-precision data acquisition device, which had been more and more applied to the research areas of forest inventory. In this study, a kind of automated low-cost terrestrial laser scanner was designed and implemented based on a two-dimensional laser radar sensor SICK LMS-511 and a stepper motor. The new scanner was named as BEE, which can scan the forest trees in three dimension. The BEE scanner and its supporting software are specifically designed for forest inventory. The experiments have been performed by using the BEE scanner in an artificial ginkgo forest which was located in Haidian district of Bei**g. Four square plots were selected to do the experiments. The BEE scanner scanned in the four plots and acquired the single scan data respectively. The DBH, tree height and tree position of trees in the four plots were estimated and analyzed. For comparison, the manual measured data was also collected in the four plots. The tree stem detection rate for all four plots was 92.75%; the root mean square error of the DBH estimation was 1.27cm; the root mean square error of the tree height estimation was 0.24m; the tree position estimation was in line with the actual position. Experimental results show that the BEE scanner can efficiently estimate the structure parameters of forest trees and has a good potential in practical application of forest inventory.
△ Less
Submitted 8 May, 2017; v1 submitted 7 February, 2017;
originally announced February 2017.
-
Total Order Reliable Convergecast in WBAN
Authors:
Gewu Bu,
Maria Potop-Butucaru
Abstract:
This paper is the first extensive work on total order reliable convergecast in multi-hop Wireless Body Area Networks (WBAN). Convergecast is a many-to-one cooperative scheme where each node of the network transmits data towards the same sink. Our contribution is threefold. First, we stress existing WBAN convergecast strategies with respect to their capacity to be reliable and to ensure the total o…
▽ More
This paper is the first extensive work on total order reliable convergecast in multi-hop Wireless Body Area Networks (WBAN). Convergecast is a many-to-one cooperative scheme where each node of the network transmits data towards the same sink. Our contribution is threefold. First, we stress existing WBAN convergecast strategies with respect to their capacity to be reliable and to ensure the total order delivery at sink. That is, packets sent in a specific order should be received in the same order by the sink. When stressed with transmission rates up to 500 packets per second the performances of these strategies decrease dramatically (more than 90% of packets lost). Secondly, we propose a new posture-centric model for WBAN. This model offers a good characterization of the path availability which is further used to fine tune the retransmission rate thresholds. Third, based on our model we propose a new mechanism for reliability and a new converge-cast strategy that outperforms WBAN dedicated strategies but also strategies adapted from DTN and WSN areas. Our extensive performance evaluations use essential parameters for WBAN: packet lost, total order reliability (messages sent in a specific order should be delivered in that specific order) and various human body postures. In particular, our strategy ensures zero packet order inversions for various transmission rates and mobility postures. Interestingly, our strategy respects this property without the need of additional energy-guzzler mechanisms.
△ Less
Submitted 22 September, 2016;
originally announced September 2016.