Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Parallel disposal of nephogram display based on visualization ToolKit and message passing interface
LIU Weihui, TANG Peng, SONG Anping, LIU Zhixiang, XU Lei, ZHANG Wu
Journal of Computer Applications    2015, 35 (11): 3178-3181.   DOI: 10.11772/j.issn.1001-9081.2015.11.3178
Abstract566)      PDF (738KB)(461)       Save
Visual pipeline mechanism and basic structure of the parallel program were discussed based on the characteristics of Visualization ToolKit (VTK). Since the problem of visualization post-processing in computational fluid dynamics, VTK color mapping algorithm was introduced and a program of showing nephogram was written. In order to reduce the running time, a parallel algorithm was proposed. The proposed algorithm made full use of the parallelism between the VTK tasks, reduced the program running time and improved the running efficiency. Finally the speedup ratios of files of different sizes were compared and analyzed. The results show that the requirements of visualization post-processing is satisfied by visualization technology based on VTK and the good parallel effect is obtained with Message Passing Interface (MPI).
Reference | Related Articles | Metrics
Proxy signature scheme based on braid group
ZUO Li-ming TANG Peng-zhi LIU Er-gen
Journal of Computer Applications    2011, 31 (11): 2979-2982.   DOI: 10.3724/SP.J.1087.2011.02979
Abstract1009)      PDF (617KB)(439)       Save
The braid group is a new candidate platform for constructing quantum attack-resistant public key encryption system. The proxy signature allows a proxy signer to sign messages on behalf of an original signer who delegates his signing power to the proxy signer. A proxy signature based on root finding problem over braid group was put forward, the analysis of its correctness, security, efficiency and parameter choice were subsequently presented, and afterwards the detailed formal security proofs in the Random Oracle Model (ROM) were given. The new scheme can resist current known attacks.
Related Articles | Metrics