The pedestrian protection technology must be used in automotive design if China-made automotives want to compete and grow strong in the world in the future. In this paper, a CAE simulation analysis is made for a domes...The pedestrian protection technology must be used in automotive design if China-made automotives want to compete and grow strong in the world in the future. In this paper, a CAE simulation analysis is made for a domestic sedan car hood to check whether it meet the pedestrian safety protection laws and regulations. Results show that the original car cannot meet the demands of the rules. In order to meet the standards of the pedustrian protection rules, the car hood should undergo structural improvements. Tested again by CAE simulation analysis, the car after a series of improved design can reached the 3-star class EuroNCAP( Euro New Car Assessment Program)standard of the car pedestrian safety protection laws and regulations.展开更多
In order to improve the safety protection performance of the rehabilitation robot,an active safety protection method is proposed in the rehabilitation scene.The oxyhemoglobin concentration information and RGB-D inform...In order to improve the safety protection performance of the rehabilitation robot,an active safety protection method is proposed in the rehabilitation scene.The oxyhemoglobin concentration information and RGB-D information are combined in this method,which aims to realize the comprehensive monitoring of the invasion target,the patient’s brain function movement state,and the joint angle in the rehabilitation scene.The main focus is to study the fusion method of the oxyhemoglobin concentration information and RGB-D information in the rehabilitation scene.Frequency analysis of brain functional connectivity coefficient was used to distinguish the basic motion states.The human skeleton recognition algorithm was used to realize the angle monitoring of the upper limb joint combined with the depth information.Compared with speed and separation monitoring,the protection method of multi-information fusion is safer and more comprehensive for stroke patients.By building the active safety protection platform of the upper limb rehabilitation robot,the performance of the system in different safety states is tested,and the safety protection performance of the method in the upper limb rehabilitation scene is verified.展开更多
Incorporation of biomolecular epitopes to malarial antigens should be explored in the development of straintranscending malarial vaccines.The present study sought to determine safety,immunogenicity and cross-species e...Incorporation of biomolecular epitopes to malarial antigens should be explored in the development of straintranscending malarial vaccines.The present study sought to determine safety,immunogenicity and cross-species efficacy of Plasmodium falciparum serine repeat antigen 5 polypeptide co-expressed with epitopes of BacilleCalmette Guerin(BCG),tetanus toxoid(TT) and a chemokine gene.Olive baboons and BALB/c mice were randomly assigned into vaccine and control groups.The vaccine group animals were primed and boosted twice with pIRES plasmids encoding the SERA5 + BCG + TT alone,or with either CCL5 or CCL20 and the control group with pIRES plasmid vector backbone.Mice and baboons were challenged with P.berghei ANKA and P.knowlesi H strain parasites,respectively.Safety was determined by observing for injection sites reactogenicities,hematology and clinical chemistry.Parasitaemia and survivorship profiles were used to determine cross-species efficacy,and T cell phenotypes,Th1-,Th2-type,T-regulatory immune responses and antibody responses were assessed to determine vaccine immunogenicity.The pSeBCGTT plasmid DNA vaccines were safe and induced Thl-,Th2-type,and Tregulatory responses vaccinated animals showed enhanced CD4~+(P〈0.01),CD 8~+ T cells(P〈 0.001) activation and IgG anti-SE36 antibodies responses(P〈 0.001) at week 4 and 8 post vaccination compared to the control group.Vaccinated mice had a 31.45-68.69%cumulative parasite load reduction and 60%suppression in baboons(P〈0.05)and enhanced survivorship(P〈 0.001) with no clinical signs of malaria compared to the control group.The results showed that the vaccines were safe,immunogenic and conferred partial cross-species protection.展开更多
The research progress of deep and ultra-deep drilling fluid technology systematically reviewed,the key problems existing are analyzed,and the future development direction is proposed.In view of the high temperature,hi...The research progress of deep and ultra-deep drilling fluid technology systematically reviewed,the key problems existing are analyzed,and the future development direction is proposed.In view of the high temperature,high pressure and high stress,fracture development,wellbore instability,drilling fluid lost circulation and other problems faced in the process of deep and ultra-deep complex oil and gas drilling,scholars have developed deep and ultra-deep high-temperature and high-salt resistant water-based drilling fluid technology,high-temperature resistant oil-based/synthetic drilling fluid technology,drilling fluid technology for reservoir protection and drilling fluid lost circulation control technology.However,there are still some key problems such as insufficient resistance to high temperature,high pressure and high stress,wellbore instability and serious lost circulation.Therefore,the development direction of deep and ultra-deep drilling fluid technology in the future is proposed:(1)The technology of high-temperature and high-salt resistant water-based drilling fluid should focus on improving high temperature stability,improving rheological properties,strengthening filtration control and improving compatibility with formation.(2)The technology of oil-based/synthetic drilling fluid resistant to high temperature should further study in the aspects of easily degradable environmental protection additives with low toxicity such as high temperature stabilizer,rheological regulator and related supporting technologies.(3)The drilling fluid technology for reservoir protection should be devoted to the development of new high-performance additives and materials,and further improve the real-time monitoring technology by introducing advanced sensor networks and artificial intelligence algorithms.(4)The lost circulation control of drilling fluid should pay more attention to the integration and application of intelligent technology,the research and application of high-performance plugging materials,the exploration of diversified plugging techniques and methods,and the improvement of environmental protection and production safety awareness.展开更多
In this paper, a disturbance observer-based safe tracking control scheme is proposed for a medium-scale unmanned helicopter with rotor flapping dynamics in the presence of partial state constraints and unknown externa...In this paper, a disturbance observer-based safe tracking control scheme is proposed for a medium-scale unmanned helicopter with rotor flapping dynamics in the presence of partial state constraints and unknown external disturbances. A safety protection algorithm is proposed to keep the constrained states within the given safe-set. A second-order disturbance observer technique is utilized to estimate the external disturbances. It is shown that the desired tracking performance of the controlled unmanned helicopter can be achieved with the application of the backstepping approach, dynamic surface control technique, and Lyapunov method. Finally, the availability of the proposed control scheme has been shown by simulation results.展开更多
The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these...The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.展开更多
Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ...Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.展开更多
Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and ...Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises.展开更多
We report the secondary X(γ)radiation from the accelerator in a normal operating state and activated X(γ)radiation from the accelerator devices when the accelerator stops operating in the cancer treatment facility o...We report the secondary X(γ)radiation from the accelerator in a normal operating state and activated X(γ)radiation from the accelerator devices when the accelerator stops operating in the cancer treatment facility of the Shanghai Proton and Heavy Ion Center(SPHIC).These radiation measurements show us the structural radiation distribution along the beam lines and devices inside the accelerator room when the beam is on and off and can support the radiation protection design of the accelerator facility used for cancer treatment and help evaluate the accumulated radiation dose in the case of an emergency,such as a personal safety system failure or a radiation accident.The radiation dose rate measured in this facility shows that the facility is safe from the radiation protection point.After shooting the quality assurance(QA)beam,the radiation dose rate in the treatment room was also measured to investigate the radiation dose space distribution and decay time dependence.In addition,the time period before safely entering the treatment room after determining the shooting of the QA beam is recommended to be approximately 5 min.展开更多
Aiming at acute characteristics of flammability,explosibility,causticity and leakiness of high sour natural gas,giving full consideration to local natural conditions in Sichuan Province and starting with purification ...Aiming at acute characteristics of flammability,explosibility,causticity and leakiness of high sour natural gas,giving full consideration to local natural conditions in Sichuan Province and starting with purification process,the paper analyzed process configurations,energy utilization and conservation,safety and environment protection measures. The integrated technology and engineering scheme for high sour natural gas purification was established and successfully used in industrial application.展开更多
In 1995, the total output of motor vehicles in China was around 1.45 million units, ranking the 11th in the world; the total motorcycle output 7.83 million, ranking the first in the world. As for the vehicle populatio...In 1995, the total output of motor vehicles in China was around 1.45 million units, ranking the 11th in the world; the total motorcycle output 7.83 million, ranking the first in the world. As for the vehicle population in China, there are about 10.50 million automobiles, 18 million motorcycles, and nearly 10 million展开更多
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste...Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode.展开更多
文摘The pedestrian protection technology must be used in automotive design if China-made automotives want to compete and grow strong in the world in the future. In this paper, a CAE simulation analysis is made for a domestic sedan car hood to check whether it meet the pedestrian safety protection laws and regulations. Results show that the original car cannot meet the demands of the rules. In order to meet the standards of the pedustrian protection rules, the car hood should undergo structural improvements. Tested again by CAE simulation analysis, the car after a series of improved design can reached the 3-star class EuroNCAP( Euro New Car Assessment Program)standard of the car pedestrian safety protection laws and regulations.
基金the Interdisciplinary Program of Shanghai Jiao Tong University(No.YG2019QNA25)。
文摘In order to improve the safety protection performance of the rehabilitation robot,an active safety protection method is proposed in the rehabilitation scene.The oxyhemoglobin concentration information and RGB-D information are combined in this method,which aims to realize the comprehensive monitoring of the invasion target,the patient’s brain function movement state,and the joint angle in the rehabilitation scene.The main focus is to study the fusion method of the oxyhemoglobin concentration information and RGB-D information in the rehabilitation scene.Frequency analysis of brain functional connectivity coefficient was used to distinguish the basic motion states.The human skeleton recognition algorithm was used to realize the angle monitoring of the upper limb joint combined with the depth information.Compared with speed and separation monitoring,the protection method of multi-information fusion is safer and more comprehensive for stroke patients.By building the active safety protection platform of the upper limb rehabilitation robot,the performance of the system in different safety states is tested,and the safety protection performance of the method in the upper limb rehabilitation scene is verified.
基金Gene Art for engineering the vaccine constructs and the Uganda Council of Science and Technology (UCST)/World Bank for providing the funds for the work
文摘Incorporation of biomolecular epitopes to malarial antigens should be explored in the development of straintranscending malarial vaccines.The present study sought to determine safety,immunogenicity and cross-species efficacy of Plasmodium falciparum serine repeat antigen 5 polypeptide co-expressed with epitopes of BacilleCalmette Guerin(BCG),tetanus toxoid(TT) and a chemokine gene.Olive baboons and BALB/c mice were randomly assigned into vaccine and control groups.The vaccine group animals were primed and boosted twice with pIRES plasmids encoding the SERA5 + BCG + TT alone,or with either CCL5 or CCL20 and the control group with pIRES plasmid vector backbone.Mice and baboons were challenged with P.berghei ANKA and P.knowlesi H strain parasites,respectively.Safety was determined by observing for injection sites reactogenicities,hematology and clinical chemistry.Parasitaemia and survivorship profiles were used to determine cross-species efficacy,and T cell phenotypes,Th1-,Th2-type,T-regulatory immune responses and antibody responses were assessed to determine vaccine immunogenicity.The pSeBCGTT plasmid DNA vaccines were safe and induced Thl-,Th2-type,and Tregulatory responses vaccinated animals showed enhanced CD4~+(P〈0.01),CD 8~+ T cells(P〈 0.001) activation and IgG anti-SE36 antibodies responses(P〈 0.001) at week 4 and 8 post vaccination compared to the control group.Vaccinated mice had a 31.45-68.69%cumulative parasite load reduction and 60%suppression in baboons(P〈0.05)and enhanced survivorship(P〈 0.001) with no clinical signs of malaria compared to the control group.The results showed that the vaccines were safe,immunogenic and conferred partial cross-species protection.
基金Supported by the Projects of National Natural Science Foundation of China(52288101,52174014,52374023)。
文摘The research progress of deep and ultra-deep drilling fluid technology systematically reviewed,the key problems existing are analyzed,and the future development direction is proposed.In view of the high temperature,high pressure and high stress,fracture development,wellbore instability,drilling fluid lost circulation and other problems faced in the process of deep and ultra-deep complex oil and gas drilling,scholars have developed deep and ultra-deep high-temperature and high-salt resistant water-based drilling fluid technology,high-temperature resistant oil-based/synthetic drilling fluid technology,drilling fluid technology for reservoir protection and drilling fluid lost circulation control technology.However,there are still some key problems such as insufficient resistance to high temperature,high pressure and high stress,wellbore instability and serious lost circulation.Therefore,the development direction of deep and ultra-deep drilling fluid technology in the future is proposed:(1)The technology of high-temperature and high-salt resistant water-based drilling fluid should focus on improving high temperature stability,improving rheological properties,strengthening filtration control and improving compatibility with formation.(2)The technology of oil-based/synthetic drilling fluid resistant to high temperature should further study in the aspects of easily degradable environmental protection additives with low toxicity such as high temperature stabilizer,rheological regulator and related supporting technologies.(3)The drilling fluid technology for reservoir protection should be devoted to the development of new high-performance additives and materials,and further improve the real-time monitoring technology by introducing advanced sensor networks and artificial intelligence algorithms.(4)The lost circulation control of drilling fluid should pay more attention to the integration and application of intelligent technology,the research and application of high-performance plugging materials,the exploration of diversified plugging techniques and methods,and the improvement of environmental protection and production safety awareness.
基金supported in part by the National Natural ScienceFoundation of China (U2013201)the National Science Fund for Distinguished Young Scholars (61825302)the Postgraduate Research&Practice Innovation Program of Jiangsu Province (KYCX20_0208)。
文摘In this paper, a disturbance observer-based safe tracking control scheme is proposed for a medium-scale unmanned helicopter with rotor flapping dynamics in the presence of partial state constraints and unknown external disturbances. A safety protection algorithm is proposed to keep the constrained states within the given safe-set. A second-order disturbance observer technique is utilized to estimate the external disturbances. It is shown that the desired tracking performance of the controlled unmanned helicopter can be achieved with the application of the backstepping approach, dynamic surface control technique, and Lyapunov method. Finally, the availability of the proposed control scheme has been shown by simulation results.
基金This work was supported by Research on the Influences of Network Security Threat Intelligence on Sichuan Government and Enterprises and the Development Countermeasure(Project ID 2018ZR0220)Research on Key Technologies of Network Security Protection in Intelligent Vehicle Based on(Project ID 2018JY0510)+3 种基金the Research on Abnormal Behavior Detection Technology of Automotive CAN Bus Based on Information Entropy(Project ID 2018Z105)the Research on the Training Mechanism of Driverless Network Safety Talents for Sichuan Auto Industry Based on Industry-University Synergy(Project ID 18RKX0667),Research and implementation of traffic cooperative perception and traffic signal optimization of main road(Project ID 2018YF0500707SN)Research and implementation of intelligent traffic control and monitoring system(Project ID 2019YGG0201)Remote upgrade system of intelligent vehicle software(Project ID 2018GZDZX0011).
文摘The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.
基金This work is funded by the National Key Research and Development Plan(Grant No.2018YFB0803504)the National Natural Science Foundation of China(Nos.61702223,61702220,61871140,U1636215)the Opening Project of Shanghai Trusted Industrial Control Platform.
文摘Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.
文摘Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises.
文摘We report the secondary X(γ)radiation from the accelerator in a normal operating state and activated X(γ)radiation from the accelerator devices when the accelerator stops operating in the cancer treatment facility of the Shanghai Proton and Heavy Ion Center(SPHIC).These radiation measurements show us the structural radiation distribution along the beam lines and devices inside the accelerator room when the beam is on and off and can support the radiation protection design of the accelerator facility used for cancer treatment and help evaluate the accumulated radiation dose in the case of an emergency,such as a personal safety system failure or a radiation accident.The radiation dose rate measured in this facility shows that the facility is safe from the radiation protection point.After shooting the quality assurance(QA)beam,the radiation dose rate in the treatment room was also measured to investigate the radiation dose space distribution and decay time dependence.In addition,the time period before safely entering the treatment room after determining the shooting of the QA beam is recommended to be approximately 5 min.
文摘Aiming at acute characteristics of flammability,explosibility,causticity and leakiness of high sour natural gas,giving full consideration to local natural conditions in Sichuan Province and starting with purification process,the paper analyzed process configurations,energy utilization and conservation,safety and environment protection measures. The integrated technology and engineering scheme for high sour natural gas purification was established and successfully used in industrial application.
文摘In 1995, the total output of motor vehicles in China was around 1.45 million units, ranking the 11th in the world; the total motorcycle output 7.83 million, ranking the first in the world. As for the vehicle population in China, there are about 10.50 million automobiles, 18 million motorcycles, and nearly 10 million
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA012200)Henan Province Science and Technology Funding Projects ( SP09JH11158)
文摘Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode.