Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In ord...Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In order to resolve this problem, after the problem formulation, a validation theorem on the cross iteration is proposed, and the proof of the theorem is given under the cross iteration circumstance. Meanwhile, applying the proposed theorem, the credibility calculation algorithm is provided, and the solvent of the defect tracing is explained. Further, based on the validation theorem on the cross iteration, a validation method for simulation models with the cross iteration is proposed, which is illustrated by a flowchart step by step. Finally, a validation example of a sixdegree of freedom (DOF) flight vehicle model is provided, and the validation process is performed by using the validation method. The result analysis shows that the method is effective to obtain the credibility of the model and accomplish the defect tracing of the validation.展开更多
This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/si...This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.展开更多
保密电子投票是目前信息化时代广为使用的选举投票方案,可以提高选举的安全性、可靠性和公正性,以及增加选民的参与度。虽然保密电子投票方案具有许多潜在优点,如提高投票效率和方便性,但也面临着一些挑战,如信息安全问题、技术难题、...保密电子投票是目前信息化时代广为使用的选举投票方案,可以提高选举的安全性、可靠性和公正性,以及增加选民的参与度。虽然保密电子投票方案具有许多潜在优点,如提高投票效率和方便性,但也面临着一些挑战,如信息安全问题、技术难题、隐私保护问题以及系统的信任度问题等。本研究针对这些问题,结合门限公开秘密体制(Number Theory Research Unit,NTRU)加密算法、向量编码方法,提出了一种基于安全多方计算的高效保密电子投票方案。为验证所提出协议的安全性,采用模拟范例方法进行了安全性证明。通过理论分析和实验仿真展示了本文提出方案的高效性,本方案具有实用价值,为解决电子投票过程中隐私保护问题提供了可行且高效的解决方案。展开更多
基金supported by the National Natural Science Foundation of China(61374164)
文摘Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In order to resolve this problem, after the problem formulation, a validation theorem on the cross iteration is proposed, and the proof of the theorem is given under the cross iteration circumstance. Meanwhile, applying the proposed theorem, the credibility calculation algorithm is provided, and the solvent of the defect tracing is explained. Further, based on the validation theorem on the cross iteration, a validation method for simulation models with the cross iteration is proposed, which is illustrated by a flowchart step by step. Finally, a validation example of a sixdegree of freedom (DOF) flight vehicle model is provided, and the validation process is performed by using the validation method. The result analysis shows that the method is effective to obtain the credibility of the model and accomplish the defect tracing of the validation.
文摘This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.
文摘保密电子投票是目前信息化时代广为使用的选举投票方案,可以提高选举的安全性、可靠性和公正性,以及增加选民的参与度。虽然保密电子投票方案具有许多潜在优点,如提高投票效率和方便性,但也面临着一些挑战,如信息安全问题、技术难题、隐私保护问题以及系统的信任度问题等。本研究针对这些问题,结合门限公开秘密体制(Number Theory Research Unit,NTRU)加密算法、向量编码方法,提出了一种基于安全多方计算的高效保密电子投票方案。为验证所提出协议的安全性,采用模拟范例方法进行了安全性证明。通过理论分析和实验仿真展示了本文提出方案的高效性,本方案具有实用价值,为解决电子投票过程中隐私保护问题提供了可行且高效的解决方案。