In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.展开更多
In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map op...In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map operations, we give some admissibility conditions for symbolic sequences and find some periodic properties of these symbolic sequences. Then we use these conditions to check the admissibility of periodic symbol sequences.展开更多
A family of array codes with a maximum distance separable(MDS) property, named L codes, is proposed. The greatest strength of L codes is that the number of rows(columns) in a disk array does not be restricted by t...A family of array codes with a maximum distance separable(MDS) property, named L codes, is proposed. The greatest strength of L codes is that the number of rows(columns) in a disk array does not be restricted by the prime number, and more disks can be dynamically appended in a running storage system. L codes can tolerate at least two disk erasures and some sector loss simultaneously, and can tolerate multiple disk erasures(greater than or equal to three) under a certain condition. Because only XOR operations are needed in the process of encoding and decoding, L codes have very high computing efficiency which is roughly equivalent to X codes. Analysis shows that L codes are particularly suitable for large-scale storage systems.展开更多
Failure of rock under impact loadings involves complex micro-fracturing and progressive damage. Strength increase and splitting failure have been observed during dynamic tests of rock materials. However, the failure m...Failure of rock under impact loadings involves complex micro-fracturing and progressive damage. Strength increase and splitting failure have been observed during dynamic tests of rock materials. However, the failure mechanism still remains unclear. In this work, based on laboratory tests, numerical simulations with the particle flow code(PFC) were carried out to reproduce the micro-fracturing process of granite specimens. Shear and tensile cracks were both recorded to investigate the failure mode of rocks under different loading conditions. At the same time, a dynamic damage model based on the Weibull distribution was established to predict the deformation and degradation behavior of specimens. It is found that micro-cracks play important roles in controlling the dynamic deformation and failure process of rock under impact loadings. The sharp increase in the number of cracks may be the reason for the strength increase of rock under high strain rates. Tensile cracks tend to be the key reason for splitting failure of specimens. Numerical simulation of crack propagation by PFC can give vivid description of the failure process. However, it is not enough for evaluation of material degradation. The dynamic damage model is able to predict the stress-strain relationship of specimens reasonably well, and can be used to explain the degradation of specimens under impact loadings at macro-scale. Crack and damage can describe material degradation at different scales and can be used together to reveal the failure mechanism of rocks.展开更多
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a cou...Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.展开更多
Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business ha...Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business handling process,low efficiency of ticket inspection and high cost of usage and management.This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally.The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.Design/methodology/approach–Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system,the grid-oriented passenger service record(PSR)data storage model,efficient access to massive PSR data under high concurrency condition,the linkage between face recognition service platforms and various terminals in large scenarios,and two-factor authentication of the e-ticket identification code based on the key and the user identity information.Focusing on the key technologies and architecture the of existing ticketing system,multiple service resources are expanded and developed such as electronic ticket clusters,PSR clusters,face recognition clusters and electronic ticket identification code clusters.Findings–The proportion of paper ticket printed has dropped to 20%,saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide.The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds,significantly improving the efficiency of passenger transport organization.Meanwhile,problems of paper ticket counterfeiting,reselling and loss have been generally eliminated.Originality/value–E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.展开更多
As social interest in the environmental conservation and ecological restoration has recently increased, more research works have been done to resolve problems concerning environmental management of estuaries. In this ...As social interest in the environmental conservation and ecological restoration has recently increased, more research works have been done to resolve problems concerning environmental management of estuaries. In this study, a three-dimensional numerical model, Environmental Fluid Dynamics Code (EFDC) was used in the analysis of the salinity intrusion characteristics in the downstream of Geum River. The numerical simulation was performed to investigate the influence range for salinity intrusion when the gates were fully opened. The conditions used for simulation were the four flow regimes in Geum River Basin, Korea. Results indicated that the ranges of salinity intrusion from the barrage were 50.72 km (drought flow), 48.87 km (low flow), 46.56 km (normal flow) and 42.10 km (flood flow). These results indicated that the EFDC model used for numerical simulation has high accuracy. The result concluded in this study can be used as a basis in understanding the extent of salinity intrusion effects at different flow rates.展开更多
The integration of water quality analysis simulation program (WASP) with a geographical information system (GIS) is presented.This integration was undertaken to enhance the data analysis and management ability of the ...The integration of water quality analysis simulation program (WASP) with a geographical information system (GIS) is presented.This integration was undertaken to enhance the data analysis and management ability of the widely used water quality model.Different types of data involved in WASP modeling were converted and integrated into GIS using a database method.The spatial data modeling and analysis capability of GIS were used in the operation of the model.The WASP water quality model was coupled with the environmental fluid dynamics code (EFDC) hydrodynamic model.A case study of the Lower Charles River Basin (Massachusetts,USA) water quality model system was conducted to demonstrate the integration process.The results showed that high efficiency of the data process and powerful function of data analysis could be achieved in the integrated model,which would significantly improve the application of WASP model in water quality management.展开更多
With the current rapid economic growth, heavy metal pollution has become one of the key issues in the Taihu Lake. Although heavy metal pollution levels and distributions of the Taihu Lake have previously been describe...With the current rapid economic growth, heavy metal pollution has become one of the key issues in the Taihu Lake. Although heavy metal pollution levels and distributions of the Taihu Lake have previously been described, an effective model to describe the transport process of heavy metals between the water column and sediment bed for this lake is not available. It is known that heavy metals in the water column can be related to the resuspension of sediment in the lake bed. In this study, we set up a cou- pled model of relating hydrodynamics, sediment and heavy metals based on Environmental Fluid Dynamics Code (EFDC), and app- lied it to Taihu Lake, China. For calibration and validation of the model, we employed two series of field sampling data taken all over Taihu Lake during April and July of 2009. The results show that the hydrodynamics simulations of the coupled model agree with the observations reasonably well and the sediment and heavy metal model shows similar variation trends during the simulation. Our results indicate that the model can be used for simulating the sediment and heavy metal transport process in the Taihu Lake and here we provide an effective tool for water quality management at small time scales.展开更多
基金the financial support received from NATO under the Emerging Security Challenges Division programthe support received from NPRP (10-0105-17017) from the Qatar National Research Fund (a member of Qatar Foundation)+1 种基金the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programssupported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND)。
文摘In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
基金Project supported by National Natural Science Foundation of Chi-na (Grant No .10471087) ,and Shanghai Municipal Commission ofEducation (Grant No .03AK33)
文摘In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map operations, we give some admissibility conditions for symbolic sequences and find some periodic properties of these symbolic sequences. Then we use these conditions to check the admissibility of periodic symbol sequences.
基金supported by the National Natural Science Foundation of China under Grant No.61202250
文摘A family of array codes with a maximum distance separable(MDS) property, named L codes, is proposed. The greatest strength of L codes is that the number of rows(columns) in a disk array does not be restricted by the prime number, and more disks can be dynamically appended in a running storage system. L codes can tolerate at least two disk erasures and some sector loss simultaneously, and can tolerate multiple disk erasures(greater than or equal to three) under a certain condition. Because only XOR operations are needed in the process of encoding and decoding, L codes have very high computing efficiency which is roughly equivalent to X codes. Analysis shows that L codes are particularly suitable for large-scale storage systems.
基金Projects(51274254,51322403)supported by the National Natural Science Foundation of ChinaProject(NCET-11-0528)supported by theProgram for New Century Excellent Talents in University,ChinaProject(2013SK2011)supported by Hunan Province Science andTechnology Plan,China
文摘Failure of rock under impact loadings involves complex micro-fracturing and progressive damage. Strength increase and splitting failure have been observed during dynamic tests of rock materials. However, the failure mechanism still remains unclear. In this work, based on laboratory tests, numerical simulations with the particle flow code(PFC) were carried out to reproduce the micro-fracturing process of granite specimens. Shear and tensile cracks were both recorded to investigate the failure mode of rocks under different loading conditions. At the same time, a dynamic damage model based on the Weibull distribution was established to predict the deformation and degradation behavior of specimens. It is found that micro-cracks play important roles in controlling the dynamic deformation and failure process of rock under impact loadings. The sharp increase in the number of cracks may be the reason for the strength increase of rock under high strain rates. Tensile cracks tend to be the key reason for splitting failure of specimens. Numerical simulation of crack propagation by PFC can give vivid description of the failure process. However, it is not enough for evaluation of material degradation. The dynamic damage model is able to predict the stress-strain relationship of specimens reasonably well, and can be used to explain the degradation of specimens under impact loadings at macro-scale. Crack and damage can describe material degradation at different scales and can be used together to reveal the failure mechanism of rocks.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60971104)the Basic Research Foundation of Sichuan Province,China (Grant No. 2006J013-011)+1 种基金the Outstanding Young Researchers Foundation of Sichuan Province,China (Grant No. 09ZQ026-091)the Research Fund for the Doctoral Program of Higher Education of China(Grant No. 20090184110008)
文摘Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.
基金supported by the National Key R&D Program of China(No.2020YFF0304101).
文摘Purpose–With the yearly increase of mileage and passenger volume in China’s high-speed railway,the problems of traditional paper railway tickets have become increasingly prominent,including complexity of business handling process,low efficiency of ticket inspection and high cost of usage and management.This paper aims to make extensive references to successful experiences of electronic ticket applications both domestically and internationally.The research on key technologies and system implementation of railway electronic ticket with Chinese characteristics has been carried out.Design/methodology/approach–Research in key technologies is conducted including synchronization technique in distributed heterogeneous database system,the grid-oriented passenger service record(PSR)data storage model,efficient access to massive PSR data under high concurrency condition,the linkage between face recognition service platforms and various terminals in large scenarios,and two-factor authentication of the e-ticket identification code based on the key and the user identity information.Focusing on the key technologies and architecture the of existing ticketing system,multiple service resources are expanded and developed such as electronic ticket clusters,PSR clusters,face recognition clusters and electronic ticket identification code clusters.Findings–The proportion of paper ticket printed has dropped to 20%,saving more than 2 billion tickets annually since the launch of the application of E-ticketing nationwide.The average time for passengers to pass through the automatic ticket gates has decreased from 3 seconds to 1.3 seconds,significantly improving the efficiency of passenger transport organization.Meanwhile,problems of paper ticket counterfeiting,reselling and loss have been generally eliminated.Originality/value–E-ticketing has laid a technical foundation for the further development of railway passenger transport services in the direction of digitalization and intelligence.
文摘As social interest in the environmental conservation and ecological restoration has recently increased, more research works have been done to resolve problems concerning environmental management of estuaries. In this study, a three-dimensional numerical model, Environmental Fluid Dynamics Code (EFDC) was used in the analysis of the salinity intrusion characteristics in the downstream of Geum River. The numerical simulation was performed to investigate the influence range for salinity intrusion when the gates were fully opened. The conditions used for simulation were the four flow regimes in Geum River Basin, Korea. Results indicated that the ranges of salinity intrusion from the barrage were 50.72 km (drought flow), 48.87 km (low flow), 46.56 km (normal flow) and 42.10 km (flood flow). These results indicated that the EFDC model used for numerical simulation has high accuracy. The result concluded in this study can be used as a basis in understanding the extent of salinity intrusion effects at different flow rates.
基金Project supported by the National Basic Research Program (973) (No.2007CB407306)the National Major Projects on Control and Rectification of Water Body Pollution (No.2008ZX07314-004-002),China and the China Scholar Council
文摘The integration of water quality analysis simulation program (WASP) with a geographical information system (GIS) is presented.This integration was undertaken to enhance the data analysis and management ability of the widely used water quality model.Different types of data involved in WASP modeling were converted and integrated into GIS using a database method.The spatial data modeling and analysis capability of GIS were used in the operation of the model.The WASP water quality model was coupled with the environmental fluid dynamics code (EFDC) hydrodynamic model.A case study of the Lower Charles River Basin (Massachusetts,USA) water quality model system was conducted to demonstrate the integration process.The results showed that high efficiency of the data process and powerful function of data analysis could be achieved in the integrated model,which would significantly improve the application of WASP model in water quality management.
基金supported by the National Key Basic Research Development Program of China (973 Program, Grant No.2010CB429006)the Basic Research Project of Jiangsu Provi-nce (Grant No. BK2012037)the Fundamental Research Funds for the Central Universities (Grant No. 2012B06314)
文摘With the current rapid economic growth, heavy metal pollution has become one of the key issues in the Taihu Lake. Although heavy metal pollution levels and distributions of the Taihu Lake have previously been described, an effective model to describe the transport process of heavy metals between the water column and sediment bed for this lake is not available. It is known that heavy metals in the water column can be related to the resuspension of sediment in the lake bed. In this study, we set up a cou- pled model of relating hydrodynamics, sediment and heavy metals based on Environmental Fluid Dynamics Code (EFDC), and app- lied it to Taihu Lake, China. For calibration and validation of the model, we employed two series of field sampling data taken all over Taihu Lake during April and July of 2009. The results show that the hydrodynamics simulations of the coupled model agree with the observations reasonably well and the sediment and heavy metal model shows similar variation trends during the simulation. Our results indicate that the model can be used for simulating the sediment and heavy metal transport process in the Taihu Lake and here we provide an effective tool for water quality management at small time scales.