The exact shape and size of the gasification channel during underground coal gasification(UGC) are of vital importance for the safety and stability of the upper parts of the geological formation.In practice existing g...The exact shape and size of the gasification channel during underground coal gasification(UGC) are of vital importance for the safety and stability of the upper parts of the geological formation.In practice existing geological measurements are insufficient to obtain such information because the coal seam is typically deeply buried and the geological conditions are often complex.This paper introduces a cylindrical model for the gasification channel.The rock and soil masses are assumed to be homogeneous and isotropic and the effect of seepage on the temperature field was neglected.The theory of heat conduction was used to write the equation predicting the temperature field around the gasification channel.The idea of an excess temperature was introduced to solve the equations.Applying this model to UCG in the field for an influence radius,r,of 70 m gave the model parameters,u1,2,3...,of 2.4,5.5,8.7...By adjusting the radius(2,4,or 6 m) reasonable temperatures of the gasification channel were found for 4 m.The temperature distribution in the vertical direction,and the combustion volume,were also calculated.Comparison to field measurements shows that the results obtained from the proposed model are very close to practice.展开更多
Objective To explore three-dimensional relations of pedicle screw channel (PSC) ,screw entry point and lateral surface of cervical vertebral body by digital techniques. Methods CT scan images of cervical
Distributed acoustic sensing(DAS) is one recently developed seismic acquisition technique that is based on fiber-optic sensing. DAS provides dense spatial spacing that is useful to image shallow structure with surface...Distributed acoustic sensing(DAS) is one recently developed seismic acquisition technique that is based on fiber-optic sensing. DAS provides dense spatial spacing that is useful to image shallow structure with surface waves.To test the feasibility of DAS in shallow structure imaging,the PoroTomo team conducted a DAS experiment with the vibroseis truck T-Rex in Brady’s Hot Springs, Nevada, USA.The Rayleigh waves excited by the vertical mode of the vibroseis truck were analyzed with the Multichannel Analysis of Surface Waves(MASW) method. Phase velocities between5 and 20 Hz were successfully extracted for one segment of cable and were employed to build a shear-wave velocity model for the top 50 meters. The dispersion curves obtained with DAS agree well with the ones extracted from co-located geophones data and from the passive source Noise Correlation Functions(NCF). Comparing to the co-located geophone array, the higher sensor density that DAS arrays provides help reducing aliasing in dispersion analysis, and separating different surface wave modes. This study demonstrates the feasibility and advantage of DAS in imaging shallow structure with surface waves.展开更多
Ultraviolet (UV) and visible impurity spectra (200-750 nm) are commonly used to study plasma and wall interactions in magnetic fusion plasmas. Two optical multi-channel analysis (OMA) systems have been installed...Ultraviolet (UV) and visible impurity spectra (200-750 nm) are commonly used to study plasma and wall interactions in magnetic fusion plasmas. Two optical multi-channel analysis (OMA) systems have been installed for the UV-visible spectrum measurement on EAST. These two OMA systems are both equipped with the Czerny-Turner (C-T) type spectrometer. The upper vacuum vessel and inner divertor baffle can be viewed simultaneously through two optical lenses. The OMA1 system is mainly used for multi-impurity lines radiation measurement. A 280 nm wavelength range can be covered by a 300 mm focal length spectrometer equipped with a 300 grooves/mm grating. The Da/Ha line shapes can be resolved by the OMA2 system. The focal length is 750 mm. The spectral resolution can be up to 0.01 nm using a 1800 grooves/mm grating. The impurity behaviour and hydrogen ratio evolution after boroniztion, lithium coating, and siliconization are compared. Lithium coating has shown beneficial effects on the reduction of edge recycling and low Z impurity (C, O) influx. The impurity expelling effect of the divertor configuration is also briefly discussed through multi-channels observation of OMA1 system.展开更多
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu...Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.展开更多
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif...Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.展开更多
Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large num...Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.展开更多
The average bit-error rate (ABER) performance of free-space optical (FSO) communication links is investigated for space-shift keying (SSK) over log-normal and negative-exponential atmospheric turbulence channels...The average bit-error rate (ABER) performance of free-space optical (FSO) communication links is investigated for space-shift keying (SSK) over log-normal and negative-exponential atmospheric turbulence channels. SSK is compared with repetition codes and a single-input single-output system using multiple pulse amplitude mod- ulations. Simulation results show that the signal-to-noise ratio gain of SSK largely increases with greater spectral efficiencies and/or higher turbulence effects. A tight bound for ABER is derived based on an exact moment generation function (MGF) for negative-exponential channel and an approximate MGF for log-normal channel. Finally, extensive Monte Carlo simulations are run to validate the analytical analysis.展开更多
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an...Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.展开更多
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec...Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.展开更多
基金supported by a grant from the Major State Basic Research and Development Program of China (No. 2007CB714102)sponsored by the Fundamental Research Funds for the Central Universities (No. 2009B00714)
文摘The exact shape and size of the gasification channel during underground coal gasification(UGC) are of vital importance for the safety and stability of the upper parts of the geological formation.In practice existing geological measurements are insufficient to obtain such information because the coal seam is typically deeply buried and the geological conditions are often complex.This paper introduces a cylindrical model for the gasification channel.The rock and soil masses are assumed to be homogeneous and isotropic and the effect of seepage on the temperature field was neglected.The theory of heat conduction was used to write the equation predicting the temperature field around the gasification channel.The idea of an excess temperature was introduced to solve the equations.Applying this model to UCG in the field for an influence radius,r,of 70 m gave the model parameters,u1,2,3...,of 2.4,5.5,8.7...By adjusting the radius(2,4,or 6 m) reasonable temperatures of the gasification channel were found for 4 m.The temperature distribution in the vertical direction,and the combustion volume,were also calculated.Comparison to field measurements shows that the results obtained from the proposed model are very close to practice.
文摘Objective To explore three-dimensional relations of pedicle screw channel (PSC) ,screw entry point and lateral surface of cervical vertebral body by digital techniques. Methods CT scan images of cervical
基金partially supported by the Geothermal Technologies Office of the USA Department of Energy (No. DE-EE0006760)the State Key Laboratory of Geodesy and Earth’s Dynamics, Institute of Geodey and Geophysics, Chinese Academy of Sciences (No. SKLGED2019-5-4-E)
文摘Distributed acoustic sensing(DAS) is one recently developed seismic acquisition technique that is based on fiber-optic sensing. DAS provides dense spatial spacing that is useful to image shallow structure with surface waves.To test the feasibility of DAS in shallow structure imaging,the PoroTomo team conducted a DAS experiment with the vibroseis truck T-Rex in Brady’s Hot Springs, Nevada, USA.The Rayleigh waves excited by the vertical mode of the vibroseis truck were analyzed with the Multichannel Analysis of Surface Waves(MASW) method. Phase velocities between5 and 20 Hz were successfully extracted for one segment of cable and were employed to build a shear-wave velocity model for the top 50 meters. The dispersion curves obtained with DAS agree well with the ones extracted from co-located geophones data and from the passive source Noise Correlation Functions(NCF). Comparing to the co-located geophone array, the higher sensor density that DAS arrays provides help reducing aliasing in dispersion analysis, and separating different surface wave modes. This study demonstrates the feasibility and advantage of DAS in imaging shallow structure with surface waves.
基金supported by National Natural Science Foundation of China (Nos. 10975155, 10990212, and 11175208) National Magnetic Confinement Fusion Science Program (Nos. 2011GB101004, 2011GB107000, and 2012GB101001) and the Scientific Instrument Development Project of Chinese Academy of Sciences (No. YZ200922)
文摘Ultraviolet (UV) and visible impurity spectra (200-750 nm) are commonly used to study plasma and wall interactions in magnetic fusion plasmas. Two optical multi-channel analysis (OMA) systems have been installed for the UV-visible spectrum measurement on EAST. These two OMA systems are both equipped with the Czerny-Turner (C-T) type spectrometer. The upper vacuum vessel and inner divertor baffle can be viewed simultaneously through two optical lenses. The OMA1 system is mainly used for multi-impurity lines radiation measurement. A 280 nm wavelength range can be covered by a 300 mm focal length spectrometer equipped with a 300 grooves/mm grating. The Da/Ha line shapes can be resolved by the OMA2 system. The focal length is 750 mm. The spectral resolution can be up to 0.01 nm using a 1800 grooves/mm grating. The impurity behaviour and hydrogen ratio evolution after boroniztion, lithium coating, and siliconization are compared. Lithium coating has shown beneficial effects on the reduction of edge recycling and low Z impurity (C, O) influx. The impurity expelling effect of the divertor configuration is also briefly discussed through multi-channels observation of OMA1 system.
基金supported by the Special Funds for Basic Scientific Research Business Expenses of Central Universities No. 2014GCYY0the Beijing Natural Science Foundation No. 4163076the Fundamental Research Funds for the Central Universities No. 328201801
文摘Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60873216Scientific and Technological Research Priority Projects of Sichuan Province under Grant No. 2012GZ0017Basic Research of Application Fund Project of Sichuan Province under Grant No. 2011JY0100
文摘Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.
基金supported by the National High-Tech R&D Program(863 Program 2015AA01A705)
文摘Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.
文摘The average bit-error rate (ABER) performance of free-space optical (FSO) communication links is investigated for space-shift keying (SSK) over log-normal and negative-exponential atmospheric turbulence channels. SSK is compared with repetition codes and a single-input single-output system using multiple pulse amplitude mod- ulations. Simulation results show that the signal-to-noise ratio gain of SSK largely increases with greater spectral efficiencies and/or higher turbulence effects. A tight bound for ABER is derived based on an exact moment generation function (MGF) for negative-exponential channel and an approximate MGF for log-normal channel. Finally, extensive Monte Carlo simulations are run to validate the analytical analysis.
基金the Natural Science Foundation of Beijing (Grant No. 4052016)the National Natural Science Foundation of China (Grant No. 60573042)the National Grand Fundamental Research 973 Program of China (Grant No. G1999035802)
文摘Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.
基金Project supported by the Major Program of the Ministry of Industry and Information Technology of China(No.2017ZX01030301)the Beijing Natural Science Foundation of China(No.4162053)
文摘Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.