The pattern run-length coding test data compression approach is extended by introducing don't care bit(x) propagation strategy into it.More than one core test sets for testing core-based System-on-Chip(SoC) are un...The pattern run-length coding test data compression approach is extended by introducing don't care bit(x) propagation strategy into it.More than one core test sets for testing core-based System-on-Chip(SoC) are unified into a single one,which is compressed by the extended coding technique.A reconfigurable scan test application mechanism is presented,in which test data for multiple cores are scanned and captured jointly to make SoC test application more efficient with low hardware overhead added.The proposed union test technique is applied to an academic SoC embedded by six large ISCAS'89 benchmarks,and to an ITC' 02 benchmark circuit.Experiment results show that compared with the existing schemes in which a core test set is compressed and applied independently of other cores,the proposed scheme can not only improve test data compression/decompression,but also reduce the redundant shift and capture cycles during scan testing,decreasing SoC test application time effectively.展开更多
Based on the asymptotic spectral distribution of Wigner matrices, a new normality test method is proposed via reforming the white noise sequence. In this work, the asymptotic cumulative distribution function (CDF) o...Based on the asymptotic spectral distribution of Wigner matrices, a new normality test method is proposed via reforming the white noise sequence. In this work, the asymptotic cumulative distribution function (CDF) of eigenvalues of the Wigner matrix is deduced. A numerical Kullback-Leibler divergence of the empiric-d spectral CDF based on test samples from the deduced asymptotic CDF is established, which is treated as the test statistic. For validating the superiority of our proposed normality test, we apply the method to weak SIPSK signal detection in the single-input single-output (SISO) system and the single-input multiple-output (SIMO) system. By comparing with other common normality tests and the existing signal detection methods, simulation results show that the proposed method is superior and robust.展开更多
[Objectives] This study was conducted to establish microbial limit test methods for traditional Chinese medicine preparations Yunpi Granules and Bupi Qiangli Paste. [Methods] According to General Rules of Part IV of C...[Objectives] This study was conducted to establish microbial limit test methods for traditional Chinese medicine preparations Yunpi Granules and Bupi Qiangli Paste. [Methods] According to General Rules of Part IV of Chinese Pharmacopoeia, applicability tests were conducted on microbial limit test methods for the above two traditional Chinese medicine preparations by the plate method. [Results] The established methods showed recovery values in the range of 0.5-2.0 for both experimental strains, and the control bacteria could be detected in the experimental group, but not in the negative control group. [Conclusions] The microbial limit test methods were reliable for the two traditional Chinese medicine preparations and could be used for quality control.展开更多
In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our databas...In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our database of carcinogeniclty and genotoxicity of chemicals demonstrates the uncertainty . of short- term tests ( STTs ) to predict carcinogens and the results of most routine STTs are statistically dependent. We recommend the sequential testing program combining STTs and carclnogenicity assay, the optimal STT batteries, the rules of the sequential discrimination and the preferal choices of STTs tor specific chemical class. For illustrative pmposes the carclnogenicity prediction of several sample chamicals is presented. The results of cost-effectiveness analysis suggest that this program has vast social-economic effectiveness.展开更多
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment...This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks.展开更多
Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of a...Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development.展开更多
At the beginning of the tests on application of ethanol gasoline in 2001, Chinese government promulgated a national standard, GB 18351-2001 "Ethanol Gasoline for Motor Vehicles". The standard specifies three kinds o...At the beginning of the tests on application of ethanol gasoline in 2001, Chinese government promulgated a national standard, GB 18351-2001 "Ethanol Gasoline for Motor Vehicles". The standard specifies three kinds of ethanol gasoline, namely E10 (90 RON), E10 (93 RON) and E10 (95 RON). There were ethanol gasoline grades (90 RON and 93 RON) and conventional unleaded gasoline(97 RON) available in the areas where tests were carried out. Vehicle owners were worded about the harmful action of ethanol to their vehicles because of lack of knowledge regarding ethanol fuel, and they only refueled their cars with conventional 97 RON unleaded gasoline. This idea might cause unnecessary costs to customers and could bring about difficulty to the tests as well. Besides, some other technical questions emerged during the experimental application of ethanol gasoline, such as water content, ethanol content in gasoline, etc. Based on the experiences accumulated during the application tests, the national standard GB 18351-2001 "Ethanol Gasoline for Motor Vehicles" was revised. The revised edition is designated as GB 18351-2004.展开更多
The advantage of ATM technology for statistically multiplexing network resources by different users invokes the competition of network resources. This competition has some damaging effects on message transmitting.\;Th...The advantage of ATM technology for statistically multiplexing network resources by different users invokes the competition of network resources. This competition has some damaging effects on message transmitting.\;The research for testing methods and technology of ATM is important for us to develop ATM networks, to promote their construction, to ensure that various ATM devices provided by different providers interoperate properly and to provide excellent services for telecommunication users.\;After discussing the abstract testing method of conformance testing and the abstract description of protocol testing, the thesis puts forward a kind of abstract testing configuration for ATM testing and a kind of abstract description method for testing case.\;From the angle of application, the thesis discusses the basic rules for ATM testing. After that, the thesis points out that the ATM testing must be made from the four aspects of normal testing, conformance testing, performance testing and interoperability testing. The general testing methods, general configuration and connection for ATM testing and the selection of ATM testing items are discussed, respectively, in the four aspects.\;Combined with the characteristics of the traffics supported by ATM systems, the thesis discusses several kinds of traffic models for conducting ATM testing. On the basis of studying various traffic models, the author classifies traffic models for ATM testing as three kinds: periodic traffic models, stochastic traffic models and manual traffic models. The parameters of describing traffic models and their calculating method are discussed in the thesis. A new kind of periodic cell sequence traffic model is proposed in this thesis. The periodic cell sequence traffic model has excellent linearly descending characteristics in the cell interval. The traffic models discussed in this thesis can be applied to various ATM testing cases.\;From the point of normal testing, physical layer testing, ATM layer testing, AAL layer testing, network management testing and signaling testing, the thesis studies and normalizes actual ATM testing cases, testing methods and testing steps. Various kinds of testing cases and relative testing purposes, testing steps, testing configurations, testing connections and testing judging rules are also discussed and normalized in the paper.\;In the end, the selecting method of testing duration for bit error rate testing studied in the thesis according to the bit error rate criterion has been determined to the systems under testing. The judging method to determine bit error rate of the systems under testing is given with the results of bit error rate testing that has been conducted in the determined time duration in the past.展开更多
A scanning Hartmann test method is proposed and its measurement principle is described. The scanning Hartmann test setup is formed by modifying the Hartmann screen of the conventional Hartmann test setup. With the rot...A scanning Hartmann test method is proposed and its measurement principle is described. The scanning Hartmann test setup is formed by modifying the Hartmann screen of the conventional Hartmann test setup. With the rotation of the scanning Hartmann screen and the improved hole arrangement, the whole information of the lens to be tested in the full aperture can be obtained. The measurement accuracy of the aberration is improved and the local error of the lens can be got. In the method, no change of the Hartmann screen is needed for measuring the lenses of different aperture sizes. Experimental results of aberration measurements of two lenses are given to verify the usefulness of the setup.展开更多
Acoustic-pulse compression is obtained in systems with different timebandwidth products by applying the digital matched-filter technique to ultrasonic non-destructive testing. The signal is linearly frequency -modulat...Acoustic-pulse compression is obtained in systems with different timebandwidth products by applying the digital matched-filter technique to ultrasonic non-destructive testing. The signal is linearly frequency -modulated (LFM) pulse and the digitized electrical-excitation signal itself is used as a digital matched filter. Experimental results are in good agreement with theory. Suppressions of side lobes achieve -41.9 dB and -41.5 dB for the Hamming and Gaussian weighted signals respectively. It shows that the application of the digital matched-filter technique improves the performances of a ultrasonic testing system explicitly.展开更多
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft...Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.展开更多
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft...Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.展开更多
基金Supported by the National Natural Science Fund of China (No.60876028)the key Project of Natural Science Foundation of the Anhui Higher Education Institutions (No.KJ2010A280)
文摘The pattern run-length coding test data compression approach is extended by introducing don't care bit(x) propagation strategy into it.More than one core test sets for testing core-based System-on-Chip(SoC) are unified into a single one,which is compressed by the extended coding technique.A reconfigurable scan test application mechanism is presented,in which test data for multiple cores are scanned and captured jointly to make SoC test application more efficient with low hardware overhead added.The proposed union test technique is applied to an academic SoC embedded by six large ISCAS'89 benchmarks,and to an ITC' 02 benchmark circuit.Experiment results show that compared with the existing schemes in which a core test set is compressed and applied independently of other cores,the proposed scheme can not only improve test data compression/decompression,but also reduce the redundant shift and capture cycles during scan testing,decreasing SoC test application time effectively.
基金Supported by the National Natural Science Foundation of China under Grant No 61371170the Fundamental Research Funds for the Central Universities under Grant Nos NP2015404 and NS2016038+1 种基金the Aeronautical Science Foundation of China under Grant No 20152052028the Funding of Jiangsu Innovation Program for Graduate Education under Grant No KYLX15_0282
文摘Based on the asymptotic spectral distribution of Wigner matrices, a new normality test method is proposed via reforming the white noise sequence. In this work, the asymptotic cumulative distribution function (CDF) of eigenvalues of the Wigner matrix is deduced. A numerical Kullback-Leibler divergence of the empiric-d spectral CDF based on test samples from the deduced asymptotic CDF is established, which is treated as the test statistic. For validating the superiority of our proposed normality test, we apply the method to weak SIPSK signal detection in the single-input single-output (SISO) system and the single-input multiple-output (SIMO) system. By comparing with other common normality tests and the existing signal detection methods, simulation results show that the proposed method is superior and robust.
基金Supported by Science and Technology Planning Project of Guiyang CityGuizhou Province (ZKHT [2019]-9-4-15)+2 种基金Green Seedling Research Startup Foundation of The Second Affiliated Hospital of Guizhou University of Traditional Chinese Medicine (GZEYK-Y[2022]29)Research and Development CenterThe Second Affiliated Hospital of Guizhou University of Traditional Chinese Medicine(3040-04020001406)。
文摘[Objectives] This study was conducted to establish microbial limit test methods for traditional Chinese medicine preparations Yunpi Granules and Bupi Qiangli Paste. [Methods] According to General Rules of Part IV of Chinese Pharmacopoeia, applicability tests were conducted on microbial limit test methods for the above two traditional Chinese medicine preparations by the plate method. [Results] The established methods showed recovery values in the range of 0.5-2.0 for both experimental strains, and the control bacteria could be detected in the experimental group, but not in the negative control group. [Conclusions] The microbial limit test methods were reliable for the two traditional Chinese medicine preparations and could be used for quality control.
文摘In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our database of carcinogeniclty and genotoxicity of chemicals demonstrates the uncertainty . of short- term tests ( STTs ) to predict carcinogens and the results of most routine STTs are statistically dependent. We recommend the sequential testing program combining STTs and carclnogenicity assay, the optimal STT batteries, the rules of the sequential discrimination and the preferal choices of STTs tor specific chemical class. For illustrative pmposes the carclnogenicity prediction of several sample chamicals is presented. The results of cost-effectiveness analysis suggest that this program has vast social-economic effectiveness.
文摘This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks.
文摘Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development.
文摘At the beginning of the tests on application of ethanol gasoline in 2001, Chinese government promulgated a national standard, GB 18351-2001 "Ethanol Gasoline for Motor Vehicles". The standard specifies three kinds of ethanol gasoline, namely E10 (90 RON), E10 (93 RON) and E10 (95 RON). There were ethanol gasoline grades (90 RON and 93 RON) and conventional unleaded gasoline(97 RON) available in the areas where tests were carried out. Vehicle owners were worded about the harmful action of ethanol to their vehicles because of lack of knowledge regarding ethanol fuel, and they only refueled their cars with conventional 97 RON unleaded gasoline. This idea might cause unnecessary costs to customers and could bring about difficulty to the tests as well. Besides, some other technical questions emerged during the experimental application of ethanol gasoline, such as water content, ethanol content in gasoline, etc. Based on the experiences accumulated during the application tests, the national standard GB 18351-2001 "Ethanol Gasoline for Motor Vehicles" was revised. The revised edition is designated as GB 18351-2004.
文摘The advantage of ATM technology for statistically multiplexing network resources by different users invokes the competition of network resources. This competition has some damaging effects on message transmitting.\;The research for testing methods and technology of ATM is important for us to develop ATM networks, to promote their construction, to ensure that various ATM devices provided by different providers interoperate properly and to provide excellent services for telecommunication users.\;After discussing the abstract testing method of conformance testing and the abstract description of protocol testing, the thesis puts forward a kind of abstract testing configuration for ATM testing and a kind of abstract description method for testing case.\;From the angle of application, the thesis discusses the basic rules for ATM testing. After that, the thesis points out that the ATM testing must be made from the four aspects of normal testing, conformance testing, performance testing and interoperability testing. The general testing methods, general configuration and connection for ATM testing and the selection of ATM testing items are discussed, respectively, in the four aspects.\;Combined with the characteristics of the traffics supported by ATM systems, the thesis discusses several kinds of traffic models for conducting ATM testing. On the basis of studying various traffic models, the author classifies traffic models for ATM testing as three kinds: periodic traffic models, stochastic traffic models and manual traffic models. The parameters of describing traffic models and their calculating method are discussed in the thesis. A new kind of periodic cell sequence traffic model is proposed in this thesis. The periodic cell sequence traffic model has excellent linearly descending characteristics in the cell interval. The traffic models discussed in this thesis can be applied to various ATM testing cases.\;From the point of normal testing, physical layer testing, ATM layer testing, AAL layer testing, network management testing and signaling testing, the thesis studies and normalizes actual ATM testing cases, testing methods and testing steps. Various kinds of testing cases and relative testing purposes, testing steps, testing configurations, testing connections and testing judging rules are also discussed and normalized in the paper.\;In the end, the selecting method of testing duration for bit error rate testing studied in the thesis according to the bit error rate criterion has been determined to the systems under testing. The judging method to determine bit error rate of the systems under testing is given with the results of bit error rate testing that has been conducted in the determined time duration in the past.
文摘A scanning Hartmann test method is proposed and its measurement principle is described. The scanning Hartmann test setup is formed by modifying the Hartmann screen of the conventional Hartmann test setup. With the rotation of the scanning Hartmann screen and the improved hole arrangement, the whole information of the lens to be tested in the full aperture can be obtained. The measurement accuracy of the aberration is improved and the local error of the lens can be got. In the method, no change of the Hartmann screen is needed for measuring the lenses of different aperture sizes. Experimental results of aberration measurements of two lenses are given to verify the usefulness of the setup.
文摘Acoustic-pulse compression is obtained in systems with different timebandwidth products by applying the digital matched-filter technique to ultrasonic non-destructive testing. The signal is linearly frequency -modulated (LFM) pulse and the digitized electrical-excitation signal itself is used as a digital matched filter. Experimental results are in good agreement with theory. Suppressions of side lobes achieve -41.9 dB and -41.5 dB for the Hamming and Gaussian weighted signals respectively. It shows that the application of the digital matched-filter technique improves the performances of a ultrasonic testing system explicitly.
文摘Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.
文摘Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.