Proton-rich nuclei are synthesized via photodisintegration and reverse reactions.To examine this mechanism and reproduce the observed p-nucleus abundances,it is crucial to know the reaction rates and thereby the react...Proton-rich nuclei are synthesized via photodisintegration and reverse reactions.To examine this mechanism and reproduce the observed p-nucleus abundances,it is crucial to know the reaction rates and thereby the reaction cross sections of many isotopes.Given that the number of experiments on the reactions in astrophysical energy regions is very rare,the reaction cross sections are determined by theoretical methods whose accuracy should be tested.In this study,given that ^(121)Sb is a stable seed isotope located in the region of medium-mass p-nuclei,we investigated the cross sections and reaction rates of the ^(121)Sb(α,γ)^(125)I reaction using the TALYS computer code with 432 different combinations of input parameters(OMP,LDM,and SFM).The optimal model combinations were determined using the threshold logic unit method.The theoretical reaction cross-sectional results were compared with the experimental results reported in the literature.The reaction rates were determined using the two input parameter sets most compatible with the measurements,and they were compared with the reaction rate databases:STARLIB and REACLIB.展开更多
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ...The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.展开更多
With the development of railway construction in China,the computing demand of the train control system is increasing day by day.The application of cloud computing technology on the rail transit signal system has becom...With the development of railway construction in China,the computing demand of the train control system is increasing day by day.The application of cloud computing technology on the rail transit signal system has become a research hotspot in recent years.How to improve the safety and availability of the safety computer platform in the cloud computing environment is the key problem when applying cloud computing to the train operation control system.Since the cloud platform is in an open network environment,fac-ing many security vulnerabilities and malicious network attacks,it is necessary to monitor the operation of computer programmes through edge safety nodes.Firstly,this paper encrypts the logical monitoring method,and then proposes a secure computer de fence model based on the dynamic heterogeneous redundancy structure.Then the continuous time Markov chain(CTMC)is used to quantitatively solve the stable probability of the system,and the influence of different logical monitoring methods on the anti-attack performance of the system is analysed.Finally,the experiment proves that the dynamic heterogeneous redundancy structure composed of encryption logic monitoring can guarantee the safe and stable operation of the safety computer more effectively.展开更多
With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years....With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.How to improve the safety and availability of private cloud safety computers is the key problem when applying cloud computing to train operation control systems.Because the cloud computing platform is in an open network environment,it can face many security loopholes and malicious network at-tacks.Therefore,it is necessary to change the existing safety computer platform structure to improve the attack resistance of the private cloud safety computer platform,thereby enhancing its safety and reliability.Firstly,a private cloud safety computer platform architecture based on dynamic heterogeneous redundant(DHR)structure is proposed,and a dynamic migration mechanism for heterogeneous executives is designed.Then,a generalized stochastic Petri net(GSPN)model of a private cloud safety computer platform based on DHR is established,and its steady-state probability is solved by using its isomorphism with the continuous-time Markov model(CTMC)to analyse the impact of different system structures and executive migration mechanisms on the system's anti-attack performance.Finally,through experimental verifcation,the system structure proposed in this paper can improve the anti-attack capability of the private cloud safety computer platform,thereby improving its safety and reliability.展开更多
After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable ...After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable machine proofs for geometry theorems which include search methods, coordinate-free methods, and formal logic methods. Some critical issues about these approaches are also discussed. Furthermore, the authors propose three further research directions for the readable machine proofs for geometry theorems, including geometry inequalities, intelligent geometry softwares and machine learning.展开更多
In this work, a systematic approach is presented to obtain the input-output equations of a single loop 4-bar spatial mechanisms. The dialytic method along with Denavit-Hartenberg parameters can be used to obtain these...In this work, a systematic approach is presented to obtain the input-output equations of a single loop 4-bar spatial mechanisms. The dialytic method along with Denavit-Hartenberg parameters can be used to obtain these equations efficiently. A genetic algorithm (GA) has been used to solve the problem of spatial mechanisms synthesis. Two types of mechanisms, e.g., RSCR and RSPC (R: revolute; S: spherical; C: cylindrical; P: prismatic), have illustrated the application of the GA to solve the problem of function generation and path generation. In some cases, the GA method becomes trapped in a local minimum. A combined GA-fuzzy logic (GA-FL) method is then used to improve the final result. The results show that GAs, combined with an adequate description of the mechanism, are well suited for spatial mechanism synthesis problems and have neither difficulties inherent to the choice of the initial feasible guess, nor a problem of convergence, as it is the case for deterministic methods.展开更多
Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control. In this paper, the fuzzy logic based decision method is adopted for queue scheduling in order to enfor...Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control. In this paper, the fuzzy logic based decision method is adopted for queue scheduling in order to enforce some level of control for traffic of different quality of service requirements using predetermined values. The fuzzy scheduler proposed in this paper takes into account the dynamic nature of the Internet traffic with respect to its time-varying packet arrival process that affects the network states and performance. Three queues are defined, viz low, medium and high priority queues. The choice of prioritizing packets influences how queues are served. The fuzzy scheduler not only utilizes queue priority in the queue scheduling scheme, but also considers packet drop susceptibility and queue limit. Through simulation it is shown that the fuzzy scheduler is more appropriate for the dynamic nature of Internet traffic in a packet-switched system as compared with some existing queue scheduling methods. Results show that the scheduling strategy of the proposed fuzzy scheduler reduces packet drop, provides good link utilization and minimizes queue delay as compared with the priority queuing (PQ), first-in-first-out (FIFO), and weighted fair queuing (WFQ).展开更多
A new method of solving Horn logic with equality,the goal-type driven method,is presented, which considers explicitly the unification operator as a goal and merged it into the resolution process. The method has the fo...A new method of solving Horn logic with equality,the goal-type driven method,is presented, which considers explicitly the unification operator as a goal and merged it into the resolution process. The method has the following advantages.The resolution and the unification have been integrated in a uniform way.The architectures of the inference engines based on Horn logic with equality are simplified. Any techniques of exploiting AND/ OR parallelism to solve goals can also be applied to unification at the same time.The method can be used to integrate the styles of functional language and logic lan- guage by a uniform framework.It can also deal with infinite data structures.展开更多
文摘Proton-rich nuclei are synthesized via photodisintegration and reverse reactions.To examine this mechanism and reproduce the observed p-nucleus abundances,it is crucial to know the reaction rates and thereby the reaction cross sections of many isotopes.Given that the number of experiments on the reactions in astrophysical energy regions is very rare,the reaction cross sections are determined by theoretical methods whose accuracy should be tested.In this study,given that ^(121)Sb is a stable seed isotope located in the region of medium-mass p-nuclei,we investigated the cross sections and reaction rates of the ^(121)Sb(α,γ)^(125)I reaction using the TALYS computer code with 432 different combinations of input parameters(OMP,LDM,and SFM).The optimal model combinations were determined using the threshold logic unit method.The theoretical reaction cross-sectional results were compared with the experimental results reported in the literature.The reaction rates were determined using the two input parameter sets most compatible with the measurements,and they were compared with the reaction rate databases:STARLIB and REACLIB.
基金the National Natural Science Foundation of China (No.60573036).
文摘The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.
基金funded by the National Natural Science Foundation of China (Grant No.U1934219)the National Science Fund for Excellent Young Scholars (Grant No.52022010)the Technological Research and Development Program of China Railway Corporation under grants (Grant No.L2021G008).
文摘With the development of railway construction in China,the computing demand of the train control system is increasing day by day.The application of cloud computing technology on the rail transit signal system has become a research hotspot in recent years.How to improve the safety and availability of the safety computer platform in the cloud computing environment is the key problem when applying cloud computing to the train operation control system.Since the cloud platform is in an open network environment,fac-ing many security vulnerabilities and malicious network attacks,it is necessary to monitor the operation of computer programmes through edge safety nodes.Firstly,this paper encrypts the logical monitoring method,and then proposes a secure computer de fence model based on the dynamic heterogeneous redundancy structure.Then the continuous time Markov chain(CTMC)is used to quantitatively solve the stable probability of the system,and the influence of different logical monitoring methods on the anti-attack performance of the system is analysed.Finally,the experiment proves that the dynamic heterogeneous redundancy structure composed of encryption logic monitoring can guarantee the safe and stable operation of the safety computer more effectively.
基金supported by the National Natural Science Foundation of China(Grant No.U1934219)the National Science Fund for Excellent Young Scholars(Grant No.52022010).
文摘With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.How to improve the safety and availability of private cloud safety computers is the key problem when applying cloud computing to train operation control systems.Because the cloud computing platform is in an open network environment,it can face many security loopholes and malicious network at-tacks.Therefore,it is necessary to change the existing safety computer platform structure to improve the attack resistance of the private cloud safety computer platform,thereby enhancing its safety and reliability.Firstly,a private cloud safety computer platform architecture based on dynamic heterogeneous redundant(DHR)structure is proposed,and a dynamic migration mechanism for heterogeneous executives is designed.Then,a generalized stochastic Petri net(GSPN)model of a private cloud safety computer platform based on DHR is established,and its steady-state probability is solved by using its isomorphism with the continuous-time Markov model(CTMC)to analyse the impact of different system structures and executive migration mechanisms on the system's anti-attack performance.Finally,through experimental verifcation,the system structure proposed in this paper can improve the anti-attack capability of the private cloud safety computer platform,thereby improving its safety and reliability.
基金supported by the Funds of the Chinese Academy of Sciences for Key Topics in Innovation Engineering under Grant No.KJCX2-YW-S02
文摘After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable machine proofs for geometry theorems which include search methods, coordinate-free methods, and formal logic methods. Some critical issues about these approaches are also discussed. Furthermore, the authors propose three further research directions for the readable machine proofs for geometry theorems, including geometry inequalities, intelligent geometry softwares and machine learning.
基金Project supported by the CPER (Contrats de Projets Etat Région) Poitou-Charentes 2007-2013 (Program Project 10 "Imageset interactivités")the Tunisian Secretary of State of Scientific Research and Technology (SERST) through the contract LAB-MA 05
文摘In this work, a systematic approach is presented to obtain the input-output equations of a single loop 4-bar spatial mechanisms. The dialytic method along with Denavit-Hartenberg parameters can be used to obtain these equations efficiently. A genetic algorithm (GA) has been used to solve the problem of spatial mechanisms synthesis. Two types of mechanisms, e.g., RSCR and RSPC (R: revolute; S: spherical; C: cylindrical; P: prismatic), have illustrated the application of the GA to solve the problem of function generation and path generation. In some cases, the GA method becomes trapped in a local minimum. A combined GA-fuzzy logic (GA-FL) method is then used to improve the final result. The results show that GAs, combined with an adequate description of the mechanism, are well suited for spatial mechanism synthesis problems and have neither difficulties inherent to the choice of the initial feasible guess, nor a problem of convergence, as it is the case for deterministic methods.
基金supported by the Ministry of Science and Teknologi Malaysia Science under Grant No. 4S034 managed by Research Management Centre of Universiti Teknologi Malaysia
文摘Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control. In this paper, the fuzzy logic based decision method is adopted for queue scheduling in order to enforce some level of control for traffic of different quality of service requirements using predetermined values. The fuzzy scheduler proposed in this paper takes into account the dynamic nature of the Internet traffic with respect to its time-varying packet arrival process that affects the network states and performance. Three queues are defined, viz low, medium and high priority queues. The choice of prioritizing packets influences how queues are served. The fuzzy scheduler not only utilizes queue priority in the queue scheduling scheme, but also considers packet drop susceptibility and queue limit. Through simulation it is shown that the fuzzy scheduler is more appropriate for the dynamic nature of Internet traffic in a packet-switched system as compared with some existing queue scheduling methods. Results show that the scheduling strategy of the proposed fuzzy scheduler reduces packet drop, provides good link utilization and minimizes queue delay as compared with the priority queuing (PQ), first-in-first-out (FIFO), and weighted fair queuing (WFQ).
文摘A new method of solving Horn logic with equality,the goal-type driven method,is presented, which considers explicitly the unification operator as a goal and merged it into the resolution process. The method has the following advantages.The resolution and the unification have been integrated in a uniform way.The architectures of the inference engines based on Horn logic with equality are simplified. Any techniques of exploiting AND/ OR parallelism to solve goals can also be applied to unification at the same time.The method can be used to integrate the styles of functional language and logic lan- guage by a uniform framework.It can also deal with infinite data structures.