With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit...With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.展开更多
For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can b...For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can be completely absorbed or dissipated for the aim of safety. Two composite structures(circumscribed circle structure and inscribed circle structure) were constructed. In addition, comparison and optimization of the crashworthy characteristic of the two structures were carried out based on the method of explicit finite element analysis(FEA) and Kriging surrogate model. According to the result of Kriging surrogate model, conclusions can be safely drawn that the specific energy absorption(SEA) and ratio of specific energy absorption to initial peak force(REAF) of circumscribed circle structure are lager than those of inscribed circle structure under the same design parameters. In other words, circumscribed circle structure has better performances with higher energy-absorbing ability and lower initial peak force. Besides, error analysis was adopted and the result of which indicates that the Kriging surrogate model has high nonlinear fitting precision. What is more, the SEA and REAF optimum values of the two structures have been obtained through analysis, and the crushing results have been illustrated when the two structures reach optimum SEA and REAF.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
Since the reform and opening up, the construction in all aspects of our country has achieved a rapid development, and especially the development of the industrial construction is also more prominent, so that each big ...Since the reform and opening up, the construction in all aspects of our country has achieved a rapid development, and especially the development of the industrial construction is also more prominent, so that each big city rapidly moves forward. But in the development at the same time, some of the issues are inevitable. The rapid development of the cities has attracted a large population, and there are more and more large factories, so that there is more and more pollution in the life and production, which brings greater security risks to the human life and health, and let the cities more difficult to manage. So how to solve these problems and make the cities develop better is a problem worth pondering.展开更多
Field work to survey and investigate the Anhui Yaoluoping Macrofungi Nature Reserve was undertaken in order to understand and rationally develop macrofungi resources. The results showed that there are, in total, 101 m...Field work to survey and investigate the Anhui Yaoluoping Macrofungi Nature Reserve was undertaken in order to understand and rationally develop macrofungi resources. The results showed that there are, in total, 101 macro-fungal species and varieties, including 59 kinds of edible mushroom, 20 kinds of medicinal mushroom, and 8 kinds of toadstools, grouped according to their economic values. The species belong to 5 classes, 13 orders, 43 families and 67 genera, Another 14 species are unknown fungus food or medicine and remains to be further de- veloped. They are widely distributed in broad-leaved forests, mixed forests, coniferous forests, bamboo forests, wastelands and areas with other vegetation types. Large fungi resources are abundant; some varieties are rare and very valuable to develop. Among those of value are some edible and medicinal mushrooms, anti-cancer sulfur bacteria, morchella, gold equivalent cow bacilli, pine mushrooms, etc. Some species and species resources have still not been fully investigated. These large fungi can be domesticated and cultivated, and have very good commercial development prospects.展开更多
文摘With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.
基金Projects(51405516,U1334208)supported by the National Natural Science Foundation of ChinaProject(2013GK2001)supported by the Science and Technology Program for Hunan Provincial Science and Technology Department,ChinaProject(2013zzts040)supported by the Graduate Degree Thesis Innovation Foundation of Central South University,China
文摘For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can be completely absorbed or dissipated for the aim of safety. Two composite structures(circumscribed circle structure and inscribed circle structure) were constructed. In addition, comparison and optimization of the crashworthy characteristic of the two structures were carried out based on the method of explicit finite element analysis(FEA) and Kriging surrogate model. According to the result of Kriging surrogate model, conclusions can be safely drawn that the specific energy absorption(SEA) and ratio of specific energy absorption to initial peak force(REAF) of circumscribed circle structure are lager than those of inscribed circle structure under the same design parameters. In other words, circumscribed circle structure has better performances with higher energy-absorbing ability and lower initial peak force. Besides, error analysis was adopted and the result of which indicates that the Kriging surrogate model has high nonlinear fitting precision. What is more, the SEA and REAF optimum values of the two structures have been obtained through analysis, and the crushing results have been illustrated when the two structures reach optimum SEA and REAF.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
文摘Since the reform and opening up, the construction in all aspects of our country has achieved a rapid development, and especially the development of the industrial construction is also more prominent, so that each big city rapidly moves forward. But in the development at the same time, some of the issues are inevitable. The rapid development of the cities has attracted a large population, and there are more and more large factories, so that there is more and more pollution in the life and production, which brings greater security risks to the human life and health, and let the cities more difficult to manage. So how to solve these problems and make the cities develop better is a problem worth pondering.
基金Ministry of Education,“Anhui University-Yaoluoping National Reserve practical education base for natural sciences”Item number TS1Z163
文摘Field work to survey and investigate the Anhui Yaoluoping Macrofungi Nature Reserve was undertaken in order to understand and rationally develop macrofungi resources. The results showed that there are, in total, 101 macro-fungal species and varieties, including 59 kinds of edible mushroom, 20 kinds of medicinal mushroom, and 8 kinds of toadstools, grouped according to their economic values. The species belong to 5 classes, 13 orders, 43 families and 67 genera, Another 14 species are unknown fungus food or medicine and remains to be further de- veloped. They are widely distributed in broad-leaved forests, mixed forests, coniferous forests, bamboo forests, wastelands and areas with other vegetation types. Large fungi resources are abundant; some varieties are rare and very valuable to develop. Among those of value are some edible and medicinal mushrooms, anti-cancer sulfur bacteria, morchella, gold equivalent cow bacilli, pine mushrooms, etc. Some species and species resources have still not been fully investigated. These large fungi can be domesticated and cultivated, and have very good commercial development prospects.