The problem of water preservation in mining and the prevention of water-bursts has been one of the more important issues in deep mining. Based on the concept of water-resisting key strata, the mechanics model of the k...The problem of water preservation in mining and the prevention of water-bursts has been one of the more important issues in deep mining. Based on the concept of water-resisting key strata, the mechanics model of the key strata is established given the structural characteristics and the mechanical properties of the roof rock layers of the working face in a particular coal mine. Four other models were derived from this model by rearranging the order of the layers in the key strata. The distribution characteristics of stress, deformation, pore pressure and the flow vector of all the models are computed using the analytical module of fluid-structure interaction in the FLAC software and the corresponding risks of a water-burst are analyzed. The results indicate that the water-insulating ability of the key strata is related to the arrangement of soft and hard rocks. The water-insulating ability of the compound water-resisting key strata (CWKS) with a hard-hard-soft-hard-soft compounding order is the best under the five given simulated conditions.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Water-preserved mining is one of the important parts of the ‘Green Mining’ technological system. The purpose of wa-ter-preserved mining is to prevent water from bursting out in coal mines and thus to protect water r...Water-preserved mining is one of the important parts of the ‘Green Mining’ technological system. The purpose of wa-ter-preserved mining is to prevent water from bursting out in coal mines and thus to protect water resources. The principle of wa-ter-resisting key strata (WKS) is proposed to establish a model capable of guiding and developing water-preserved mining technol-ogy. The experimental model of the WKS is constructed following requirements of the Data Image Correlative Method (DICM). Five experimental schemes are designed according to different combined patterns of the WKS. The water-resisting performance of the WKS is analyzed from observation of structural stability. All of them provide referential value for water-preserved mining.展开更多
In order to study the permeability and water-resisting ability of the strata on the top of the Ordovician in Longgu Coal Mine, this paper tested the permeability and porosity of the strata, investigated the fracture a...In order to study the permeability and water-resisting ability of the strata on the top of the Ordovician in Longgu Coal Mine, this paper tested the permeability and porosity of the strata, investigated the fracture and pore structure features of the strata, and identified the main channels which govern the permeability and water-resisting ability of the strata. The permeability of the upper, central and lower strata shows as 2.0504 × 10^-3-2.782762× 10^-3, 4.1092 × 10^-3 -7.3387 × 10^-3 and 2.0891 ×10^-3-3.2705 × 10-3 μm^2, respectively, and porosity of that is 0.6786-0.9197%, 0.3109-0.3951% and 0.9829-1.8655%, respectively. The results indicate that: (I) the main channels of the relative water-resisting layer are the pore throats with a diameter more than 6 μm; (2) the major proportion of pore throats in the vertical flow channel and the permeability first increases and then sharply decreases; (3) the fractures occurring from the top to 20 m in depth of the strata were filled and there occurred almost no fracture under the depth of 40 m; and (4) the ratio of turning point of the main flow channel in the strata on top of Ordovician can be used to confirm the thickness of filled water-resisting lavers.展开更多
Given previous research and prototypical geological conditions of a mining workface,we simulated fis-sure development in clay layers at the bottom of Quaternary strata and above bedrock,sand and water inrush during mi...Given previous research and prototypical geological conditions of a mining workface,we simulated fis-sure development in clay layers at the bottom of Quaternary strata and above bedrock,sand and water inrush during mining by model experiments. The results show that V-shaped fissures usually occur in the bottom clay layer at the front top of the active face and that the position of these fissures changes periodically with ground pressure intervals. These fissures occur exactly in the area where the horizontal strain is concentrated. The results also demonstrate that the permeability coefficient of the cracked clay decreases while fissures tend to close. The permeability of the cracked bottom clay layer increases rapidly after a turning point in the permeability coefficient-water head curve (K-H curve) under a certain vertical load. Under static water pressure,the permeability coefficient of cracked clay decreases when load increases. A turning point in the K-H curve showed up and can be seen as a cutoff point to de-cide water inrush under a certain load level. Under an instantaneous water head,the greatest ability of the cracked clay to avoid drastic water inflow is a little higher than that under static conditions.展开更多
Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing pas...Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing passive prevention and governance of water disasters to active conservation and utilization of groundwater resources and thus obtaining coal and water simultaneously in mining.The concept of water-resistant key strata further enriches the content of the key stratum theory and provides a theoretical basis for water-preservation mining.In order to realize the idea of water-resistant key strata as a guideline in the design of water-preservation mining and engineering applications,the conditions for discrimination in the process of water-resistant key strata,we have presented a mechanical model,as well as its corresponding computer program,based on a large number of theoretical analyses and field measurements,as well as on a comprehensive consideration of the position,structural stability and seepage stability of key strata.Practical engineering applications indicate that this discrimination method and its corresponding computer program on water-resistant key strata are accurate and reliable and can satisfy the actual design needs of water-preservation mining and thus have instructional importance for water-preservation mining in mining areas lacking water.展开更多
[Objective] This paper aimed to solve the problems existing in commercial layers breeding. [Method] Key points of culture were summarized. [ Result] The timing of purchasing chickenens, comprehensive epidemic preventi...[Objective] This paper aimed to solve the problems existing in commercial layers breeding. [Method] Key points of culture were summarized. [ Result] The timing of purchasing chickenens, comprehensive epidemic prevention, decisively cleaning out predicted low-yield chickenen flock or layers, chickenens quality, control of chickenens' breeding skills, sufficient drinking water, feed quality, timely elimination of layer flock, correctly adjusting production rhythm, proper scale and other aspects should be paid attention to. [Condusion] Breeding commercial layers could get significant economic benefits through above measures.展开更多
A numerical simulation is performed to find out a key vortical structure in the laminar-turbulent transition. A low-speed streak is generated inside a laminar boundary layer using an isolated cuboid roughness, aimed a...A numerical simulation is performed to find out a key vortical structure in the laminar-turbulent transition. A low-speed streak is generated inside a laminar boundary layer using an isolated cuboid roughness, aimed at providing an environment unstable to outer disturbances. Then, a short duration jet is issued into the boundary layer. When the jet velocity is low, some vortices appear in the boundary layer, but the transition of the boundary layer does not take place.However, when the jet velocity exceeds a certain threshold, two vortices newly appear above the elongated legs of a V-shaped vortex and only one of them is stretched and survives. After that,vortices are generated one after another around the survived one. By comparing the decayed and the survived vortices, it is found that the difference in their heights is the key characteristic which leads to the transition.展开更多
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-...Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes.展开更多
Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient a...Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient and reliable communication performance,as well as to support a mobile environment with a higher transmisison rate. As an amendment to IEEE 802.16d (for fixed broadband wireless access systems),IEEE 802.16e (for mobile broadband wireless access systems) introduces the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO) technologies into the PHY,doubling the transmission rate while supporting a certain degree of mobility. In the future,more advanced Air Interface (AI) technology is to be applied in the IEEE 802.16m standard.展开更多
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro...As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda...The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory.展开更多
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi...A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test.展开更多
In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-m...In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-middle(MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks.展开更多
Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wirele...Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR.展开更多
A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange prot...A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
A water-resistant key strata model of a goaf floor prior to main roof weighting was developed to explore the relationship between water inrush from the floor and main roof weighting. The stress distribution,broken cha...A water-resistant key strata model of a goaf floor prior to main roof weighting was developed to explore the relationship between water inrush from the floor and main roof weighting. The stress distribution,broken characteristics, and the risk area for water inrush of the water-resistant key strata were analysed using elastic thin plate theory. The formula of the maximum water pressure tolerated by the waterresistant key strata was deduced. The effects of the caved load of the goaf, the goaf size prior to main roof weighting, the advancing distance of the workface or weighting step, and the thickness of the waterresistant key strata on the breaking and instability of the water-resistant key strata were analysed.The results indicate that the water inrush from the floor can be predicted and prevented by controlling the initial or periodic weighting step with measures such as artificial forced caving, thus achieving safe mining conditions above confined aquifers. The findings provide an important theoretical basis for determining water inrush from the floor when mining above confined aquifers.展开更多
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t...Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).展开更多
基金Projects 50490270 supported by the National Natural Science Foundation of China, 50634050 the National Natural Science Foundation of China and 2006A038 SR Foundation of China University of Mining & Technology
文摘The problem of water preservation in mining and the prevention of water-bursts has been one of the more important issues in deep mining. Based on the concept of water-resisting key strata, the mechanics model of the key strata is established given the structural characteristics and the mechanical properties of the roof rock layers of the working face in a particular coal mine. Four other models were derived from this model by rearranging the order of the layers in the key strata. The distribution characteristics of stress, deformation, pore pressure and the flow vector of all the models are computed using the analytical module of fluid-structure interaction in the FLAC software and the corresponding risks of a water-burst are analyzed. The results indicate that the water-insulating ability of the key strata is related to the arrangement of soft and hard rocks. The water-insulating ability of the compound water-resisting key strata (CWKS) with a hard-hard-soft-hard-soft compounding order is the best under the five given simulated conditions.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金Projects 2007CB209400 supported by the National Basic Research Program of China (973)50574090 and 50634050 by the National Natural Science Foundation of China
文摘Water-preserved mining is one of the important parts of the ‘Green Mining’ technological system. The purpose of wa-ter-preserved mining is to prevent water from bursting out in coal mines and thus to protect water resources. The principle of wa-ter-resisting key strata (WKS) is proposed to establish a model capable of guiding and developing water-preserved mining technol-ogy. The experimental model of the WKS is constructed following requirements of the Data Image Correlative Method (DICM). Five experimental schemes are designed according to different combined patterns of the WKS. The water-resisting performance of the WKS is analyzed from observation of structural stability. All of them provide referential value for water-preserved mining.
基金Financial supports for this work provided by the National Basic Research Program of China(2013CB227900)the Innovation of Graduate Student Training Project in Jiangsu Province of China(CXZZ13_0934)
文摘In order to study the permeability and water-resisting ability of the strata on the top of the Ordovician in Longgu Coal Mine, this paper tested the permeability and porosity of the strata, investigated the fracture and pore structure features of the strata, and identified the main channels which govern the permeability and water-resisting ability of the strata. The permeability of the upper, central and lower strata shows as 2.0504 × 10^-3-2.782762× 10^-3, 4.1092 × 10^-3 -7.3387 × 10^-3 and 2.0891 ×10^-3-3.2705 × 10-3 μm^2, respectively, and porosity of that is 0.6786-0.9197%, 0.3109-0.3951% and 0.9829-1.8655%, respectively. The results indicate that: (I) the main channels of the relative water-resisting layer are the pore throats with a diameter more than 6 μm; (2) the major proportion of pore throats in the vertical flow channel and the permeability first increases and then sharply decreases; (3) the fractures occurring from the top to 20 m in depth of the strata were filled and there occurred almost no fracture under the depth of 40 m; and (4) the ratio of turning point of the main flow channel in the strata on top of Ordovician can be used to confirm the thickness of filled water-resisting lavers.
基金Projects 40372123 supported by the National Natural Science Foundation of China0F4467 by the Science and Technology Foundation of China University of Mining & Technology
文摘Given previous research and prototypical geological conditions of a mining workface,we simulated fis-sure development in clay layers at the bottom of Quaternary strata and above bedrock,sand and water inrush during mining by model experiments. The results show that V-shaped fissures usually occur in the bottom clay layer at the front top of the active face and that the position of these fissures changes periodically with ground pressure intervals. These fissures occur exactly in the area where the horizontal strain is concentrated. The results also demonstrate that the permeability coefficient of the cracked clay decreases while fissures tend to close. The permeability of the cracked bottom clay layer increases rapidly after a turning point in the permeability coefficient-water head curve (K-H curve) under a certain vertical load. Under static water pressure,the permeability coefficient of cracked clay decreases when load increases. A turning point in the K-H curve showed up and can be seen as a cutoff point to de-cide water inrush under a certain load level. Under an instantaneous water head,the greatest ability of the cracked clay to avoid drastic water inflow is a little higher than that under static conditions.
基金supported by the National Natural Science Foundation of China (No.50874103)the National Basic Research Program of China (Nos.2006CB202210 and 2007CB209408)+1 种基金the Natural Science Foundation of Jiangsu Province (No.KB2008135)the Qinglan Project of Jiangsu Province
文摘Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing passive prevention and governance of water disasters to active conservation and utilization of groundwater resources and thus obtaining coal and water simultaneously in mining.The concept of water-resistant key strata further enriches the content of the key stratum theory and provides a theoretical basis for water-preservation mining.In order to realize the idea of water-resistant key strata as a guideline in the design of water-preservation mining and engineering applications,the conditions for discrimination in the process of water-resistant key strata,we have presented a mechanical model,as well as its corresponding computer program,based on a large number of theoretical analyses and field measurements,as well as on a comprehensive consideration of the position,structural stability and seepage stability of key strata.Practical engineering applications indicate that this discrimination method and its corresponding computer program on water-resistant key strata are accurate and reliable and can satisfy the actual design needs of water-preservation mining and thus have instructional importance for water-preservation mining in mining areas lacking water.
基金supported by Qinhuangdao Science&Technology Support Program
文摘[Objective] This paper aimed to solve the problems existing in commercial layers breeding. [Method] Key points of culture were summarized. [ Result] The timing of purchasing chickenens, comprehensive epidemic prevention, decisively cleaning out predicted low-yield chickenen flock or layers, chickenens quality, control of chickenens' breeding skills, sufficient drinking water, feed quality, timely elimination of layer flock, correctly adjusting production rhythm, proper scale and other aspects should be paid attention to. [Condusion] Breeding commercial layers could get significant economic benefits through above measures.
文摘A numerical simulation is performed to find out a key vortical structure in the laminar-turbulent transition. A low-speed streak is generated inside a laminar boundary layer using an isolated cuboid roughness, aimed at providing an environment unstable to outer disturbances. Then, a short duration jet is issued into the boundary layer. When the jet velocity is low, some vortices appear in the boundary layer, but the transition of the boundary layer does not take place.However, when the jet velocity exceeds a certain threshold, two vortices newly appear above the elongated legs of a V-shaped vortex and only one of them is stretched and survives. After that,vortices are generated one after another around the survived one. By comparing the decayed and the survived vortices, it is found that the difference in their heights is the key characteristic which leads to the transition.
基金supported in part by the National Natural Science Foundation of China(No.U22A2001)the National Key Research and Development Program of China(No.2022YFB2902202,No.2022YFB2902205)。
文摘Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes.
文摘Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient and reliable communication performance,as well as to support a mobile environment with a higher transmisison rate. As an amendment to IEEE 802.16d (for fixed broadband wireless access systems),IEEE 802.16e (for mobile broadband wireless access systems) introduces the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO) technologies into the PHY,doubling the transmission rate while supporting a certain degree of mobility. In the future,more advanced Air Interface (AI) technology is to be applied in the IEEE 802.16m standard.
基金supported by the National Natural Science Foundation of China under Grant No.60772110.
文摘As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金funded by the National Key R&D Program of China under Grant 2017YFB0801903the National Natural Science Foundation of China under Grant 61871404,61701538,61521003Doctoral Fund of Ministry of Education of China under Grant 2019M663994。
文摘The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory.
基金supported by National Natural Science Foundation of China(61521003,61501516,61471396,61401510)Postdoctoral Science Foundation of China(2016M592990)
文摘A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test.
基金supported in part by National Natural Science Foundation of China under Grants No.61601514, 61401510, 61379006Project funded by China Postdoctoral Science Foundation: 2016M592990
文摘In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-middle(MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks.
基金supported by the China National Key R&D Program(No.2018YFB0803600)Natural Science Foundation of China(No.61801008)+3 种基金Scientific Research Common Program of Beijing Municipal Education Commission(No.KM201910005025)the Chinese Postdoctoral Science Foundation(No.2020M670074)Key Project of Hunan Provincial,Department of Education(No.26420A205)The Construct Program of Applied Characteristics Discipline in Hunan University of Science and Engineering.
文摘Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR.
文摘A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
基金supported by the National Natural Science Foundation of China (Nos. 51404013 and 51674008)the Open Projects of State Key Laboratory of Coal Resources and Safe Mining at the China University of Mining and Technology (No. 13KF01)the Natural Science Foundation of Anhui Province (Nos. 1508085ME77 and 1508085QE89)
文摘A water-resistant key strata model of a goaf floor prior to main roof weighting was developed to explore the relationship between water inrush from the floor and main roof weighting. The stress distribution,broken characteristics, and the risk area for water inrush of the water-resistant key strata were analysed using elastic thin plate theory. The formula of the maximum water pressure tolerated by the waterresistant key strata was deduced. The effects of the caved load of the goaf, the goaf size prior to main roof weighting, the advancing distance of the workface or weighting step, and the thickness of the waterresistant key strata on the breaking and instability of the water-resistant key strata were analysed.The results indicate that the water inrush from the floor can be predicted and prevented by controlling the initial or periodic weighting step with measures such as artificial forced caving, thus achieving safe mining conditions above confined aquifers. The findings provide an important theoretical basis for determining water inrush from the floor when mining above confined aquifers.
基金supported by Natural Science Foundation of China(61801008)The China National Key R&D Program(No.2018YFB0803600)+1 种基金Scientific Research Common Program of Beijing Municipal Commission of Education(No.KM201910005025)Chinese Postdoctoral Science Foundation(No.2020M670074).
文摘Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).