![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A Model for Liquid Slug Length Distribution in Vertical Gas-Liquid Slug Flow
The slug length and the trailing Taylor bubble velocity in an upward vertical slug flow were measured by using the optical probes and the EKTAPRO 1000 high speed motion analyzer. The correlation between the tr...
-
Chapter and Conference Paper
Community Detection Method of Complex Network Based on ACO Pheromone of TSP
Community detection method of complex network with a combination of TSP model and ant colony optimization is proposed in this paper. The topology relationship of network node is transformed into distance, thus...
-
Chapter and Conference Paper
Cascading Failures in Power Grid under Three Node Attack Strategies
This paper studies cascading failures of power grid under three node attack strategies based on the local preferential redistribution rule of the broken node’s load. The initial load of a node with degree k is k ...
-
Chapter and Conference Paper
Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing
Iming at the disaster regional association issues, a complex network construction method of disaster regional association based on compressive sensing is proposed in this paper. The disaster system dynamic equ...
-
Chapter and Conference Paper
Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid
This paper studies the suppressing effect of Dynamical distribution of capacities (DDC) strategy in cascading failure of power grid. This strategy is proposed based on load characteristics and transmission met...
-
Chapter and Conference Paper
A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing
The basic idea of quantum secret sharing is to share classical information through qu...
-
Chapter and Conference Paper
A New Signcryption Scheme Based on Elliptic Curves
Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a signcryption scheme with public verifiability and forward securi...
-
Article
A Novel E-payment Protocol Implented by Blockchain and Quantum Signature
Based on blockchain and quantum signature, a novel E-payment protocol is proposed in this paper. Our E-payment protocol could protect user’s anonymity as the traditional E-payment systems do, and also have unc...