Zheng Lei

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Multiplied by constant on modulo 2n operation, a code link, is first used in the cipher algorithm Sosemanuk, which has been selected in the eSTREAM final portfolio. This code link is recognized as a permutation with strong nonlinear property and fine realization efficiency. But there is no published paper analyzed it with differential cryptanalysis. In this(More)
This paper describes experimental results using a scanning electron microscope (SEM) to observe the face of diamond-impregnated bit after its drilling engineering ceramic. Wear patterns and mechanisms were analyzed. The results show that several diamond wear patterns are found in the bit face including complete crystal shape, micro fragmentation, extensive(More)
With the increase of the fight flow on airport, the category of aircraft has a great influence on the effect of aircraft arrival and departure sequencing. The classification method based on trial whorl is a popular one, which divides all aircrafts into four types (Heavy, Large, Medium, Small). In this paper, a new classification method is presented, in(More)
In the course of flight, conflict in the air between aircraft happens sometimes with air transportation increase. It is an urgent problem to solve flight conflict for flight safety. In this paper, to increase overall air transport system efficiency and enhance safety, game theory has been considered as an effective method to optimize the conflict resolution(More)
  • 1