Using GIS, GPS and GPRS, a dynamic management system of ore blending in an open pit mine has been designed and developed. A linear program was established in a practical application. The system is very good at automat...Using GIS, GPS and GPRS, a dynamic management system of ore blending in an open pit mine has been designed and developed. A linear program was established in a practical application. The system is very good at automatically drawing up a daily production plan of ore blending and monitors and controls the process of mining production in real time. Experiments under real conditions show that the performance of this system is stable and can satisfy production standards of ore blending in open pit mines.展开更多
Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be...Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.展开更多
A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simul...A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simultaneously. To enhance the immunity, the values of capacitance and inductance should be increased, which are actually limited by coal mine explosion-proof standards. Hence, for the first time, an active filter was applied in an electromagnetic interference (EMI) output filter. As a result, the interference within 30 MHz clearly weakened, but the frequency spectrum had a wide range. An EMI input filter and ferrite beads were adopted to restrain higher frequency interference. An output interference spectrogram of the substation was obtained with an analyzer. The results indicate that the improved complex filtering markedly help to control interference. With the support of improved complex filtering and other enhancing immunity means about I/O ports, the substation managed to pass both the EFT/B immunity test and the explosion-proof test synchronously. We conclude that improved complex filtering is of vital importance in enhancing the electromagnetic compatibilitv (EMC) of the coal mine monitoring system.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat...This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).展开更多
The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects....The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects. The authors summarize comprehensively the problems of buildings construetion safety in China at present based on grasping the whole safety status of buildings construction, and the synthetic countermeasures including the systems about laws, management, technology and education civilization for buildings construction safety management are brought up based on the viewpoint of safety system theory. Then it is thought that huilding scientific management mechanisms and popularizing effective management methods and measures are the fundamental ways for improving further the level of safety management for buildings construction in China at present.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high ...In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high seismic inten- sity, large-seale landslide and high dam and huge reservoirs with dam types such as concrete surface rock-fill, asphalt concrete core, roller compacted concrete (RCC) arch dam and so on. From several aspects, including risk response measures for high dam, strengthening safety awareness for high dam design and construction, improving high dam con- struetion technique, intelligent dam safety management system based on IT, developing dam rehabilitation and mainte- nance technologies, useful dam safety and coping strategy is proposed.展开更多
Public education as well as tourism and leisure are the two important functions of national wetland park, and tourist behaviors act as the guiding factor in the national wetland park construction and management.As the...Public education as well as tourism and leisure are the two important functions of national wetland park, and tourist behaviors act as the guiding factor in the national wetland park construction and management.As the first national wetland park in China, Xixi National Wetland Park, located in Hangzhou City, Zhejiang Province, will give constructive instructions to the construction and management of other wetland parks and ecotourism resorts.This paper analyzed the tourist behaviors in Xixi National Wetland Park.By the observation, in-depth interview and questionnaire, the results show that tourists in wetland parks are different from those in the other common destinations, and they are also different from those strict eco-tourists.In fact, the tourists in wetland park have unique characteristics, such as the intense perception to the functions of wetland ecosystem and the environment impact behaviors.Those tourists are preferred to natural landscapes in their motivations and expectations.Wetland landscapes are the main image to those tourists in the Xixi National Wetland Park.Tourist expectation, experience and satisfaction are all critical factors for the success of the planning and management in national wetland parks.Based on the results, some measures for the sustainable development of wetland parks, including to optimize wetland theme landscape and tourism products, to improve tourist facilities and services, to enhance quality of visitor experiences, and to implement total quality management based on tourist characteristics, are given to national wetland park ecotourism.展开更多
In order to enable both manufacturers and suppliers to be profitable on today’s highly competitive markets, manufacturers and suppliers must be quick in selecting best partners establishing strategic relationship, an...In order to enable both manufacturers and suppliers to be profitable on today’s highly competitive markets, manufacturers and suppliers must be quick in selecting best partners establishing strategic relationship, and collaborating with each other so that they can satisfy the changing competitive manufacturing requirements. A web-based supplier relationships (SR) framework is therfore proposed using multi-agent systems and linear programming technique to reduce supply cost, increase flexibility and shorten response time. Web-based SR approach is an ideal platform for information exchange that helps buyers and suppliers to maintain the availability of materials in the right quantity, at the right place, and at the right time, and keep the customer-supplier relationship more transparent. A multi-agent system prototype was implemented by simulation, which shows the feasibility of the proposed architecture.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
Geographic information systems (GIS) are a widely used tool in urban planning and management. More and more cities and decision-makers require its attributes of promptness, precision and visualization. But the applica...Geographic information systems (GIS) are a widely used tool in urban planning and management. More and more cities and decision-makers require its attributes of promptness, precision and visualization. But the application of GIS in urban environmental management is still a new field and relevant researches are getting on tardily. As a subsystem of GIS, an urban environmental management geographic information system (UEMGIS) should be a complex multi-discipline and multi-objective tool to perform quantitative multi-dimension analysis and to transfer the results into an expression legible to an ordinary user. It should be a dynamic system of prompt functions based on upgradable databases, and be composed of many subsystems respectively specialized in items about water, air, waste and noise as well as relative standards and regulations. However, existing UEMGISs mostly rely on the basic GIS too much to design the actual requirements of applications and managements in themselves, and the unavailability of sufficient fundamental data has retarded their improvement. In the design of a UEMGIS, the standardization of data classification should be taken into consideration to make the data exchangeable and shareable among its subsystems and within every subsystem, and the applicable error limits for input data should be defined in accordance with the user抯 required precision of data out. Data acquisition can be easy and quick if remote sensing, global positioning system (GPS) and other technologies are combined with GIS. Rapidly progressing information technologies have been giving a bright prospect for the melioration of UEMGIS that will have great potential and wide application in environmental conservation.展开更多
文摘Using GIS, GPS and GPRS, a dynamic management system of ore blending in an open pit mine has been designed and developed. A linear program was established in a practical application. The system is very good at automatically drawing up a daily production plan of ore blending and monitors and controls the process of mining production in real time. Experiments under real conditions show that the performance of this system is stable and can satisfy production standards of ore blending in open pit mines.
基金Project 2002CB412705 supported by the Major State Basic Research Development Program (973) of China
文摘Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.
基金Project 50674093 supported by the National Natural Science Foundation of China
文摘A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simultaneously. To enhance the immunity, the values of capacitance and inductance should be increased, which are actually limited by coal mine explosion-proof standards. Hence, for the first time, an active filter was applied in an electromagnetic interference (EMI) output filter. As a result, the interference within 30 MHz clearly weakened, but the frequency spectrum had a wide range. An EMI input filter and ferrite beads were adopted to restrain higher frequency interference. An output interference spectrogram of the substation was obtained with an analyzer. The results indicate that the improved complex filtering markedly help to control interference. With the support of improved complex filtering and other enhancing immunity means about I/O ports, the substation managed to pass both the EFT/B immunity test and the explosion-proof test synchronously. We conclude that improved complex filtering is of vital importance in enhancing the electromagnetic compatibilitv (EMC) of the coal mine monitoring system.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).
基金A Project Supported by Scientific Research Fund of Hunan Provincial Education Department(06C309)
文摘The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects. The authors summarize comprehensively the problems of buildings construetion safety in China at present based on grasping the whole safety status of buildings construction, and the synthetic countermeasures including the systems about laws, management, technology and education civilization for buildings construction safety management are brought up based on the viewpoint of safety system theory. Then it is thought that huilding scientific management mechanisms and popularizing effective management methods and measures are the fundamental ways for improving further the level of safety management for buildings construction in China at present.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
文摘In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high seismic inten- sity, large-seale landslide and high dam and huge reservoirs with dam types such as concrete surface rock-fill, asphalt concrete core, roller compacted concrete (RCC) arch dam and so on. From several aspects, including risk response measures for high dam, strengthening safety awareness for high dam design and construction, improving high dam con- struetion technique, intelligent dam safety management system based on IT, developing dam rehabilitation and mainte- nance technologies, useful dam safety and coping strategy is proposed.
基金Under the auspices of Forest Science and Technique Support during the 11th Five-Year Plan Period of China (No.2006BAD03A19)National Wetland Park Model Project of State Forestry Administration,P. R. ChinaHangzhou City Government (No.xixi2006-1-12)
文摘Public education as well as tourism and leisure are the two important functions of national wetland park, and tourist behaviors act as the guiding factor in the national wetland park construction and management.As the first national wetland park in China, Xixi National Wetland Park, located in Hangzhou City, Zhejiang Province, will give constructive instructions to the construction and management of other wetland parks and ecotourism resorts.This paper analyzed the tourist behaviors in Xixi National Wetland Park.By the observation, in-depth interview and questionnaire, the results show that tourists in wetland parks are different from those in the other common destinations, and they are also different from those strict eco-tourists.In fact, the tourists in wetland park have unique characteristics, such as the intense perception to the functions of wetland ecosystem and the environment impact behaviors.Those tourists are preferred to natural landscapes in their motivations and expectations.Wetland landscapes are the main image to those tourists in the Xixi National Wetland Park.Tourist expectation, experience and satisfaction are all critical factors for the success of the planning and management in national wetland parks.Based on the results, some measures for the sustainable development of wetland parks, including to optimize wetland theme landscape and tourism products, to improve tourist facilities and services, to enhance quality of visitor experiences, and to implement total quality management based on tourist characteristics, are given to national wetland park ecotourism.
文摘In order to enable both manufacturers and suppliers to be profitable on today’s highly competitive markets, manufacturers and suppliers must be quick in selecting best partners establishing strategic relationship, and collaborating with each other so that they can satisfy the changing competitive manufacturing requirements. A web-based supplier relationships (SR) framework is therfore proposed using multi-agent systems and linear programming technique to reduce supply cost, increase flexibility and shorten response time. Web-based SR approach is an ideal platform for information exchange that helps buyers and suppliers to maintain the availability of materials in the right quantity, at the right place, and at the right time, and keep the customer-supplier relationship more transparent. A multi-agent system prototype was implemented by simulation, which shows the feasibility of the proposed architecture.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
基金Funded by National Nature Science Foundation of China (Nos. 59978054 and 59838300)
文摘Geographic information systems (GIS) are a widely used tool in urban planning and management. More and more cities and decision-makers require its attributes of promptness, precision and visualization. But the application of GIS in urban environmental management is still a new field and relevant researches are getting on tardily. As a subsystem of GIS, an urban environmental management geographic information system (UEMGIS) should be a complex multi-discipline and multi-objective tool to perform quantitative multi-dimension analysis and to transfer the results into an expression legible to an ordinary user. It should be a dynamic system of prompt functions based on upgradable databases, and be composed of many subsystems respectively specialized in items about water, air, waste and noise as well as relative standards and regulations. However, existing UEMGISs mostly rely on the basic GIS too much to design the actual requirements of applications and managements in themselves, and the unavailability of sufficient fundamental data has retarded their improvement. In the design of a UEMGIS, the standardization of data classification should be taken into consideration to make the data exchangeable and shareable among its subsystems and within every subsystem, and the applicable error limits for input data should be defined in accordance with the user抯 required precision of data out. Data acquisition can be easy and quick if remote sensing, global positioning system (GPS) and other technologies are combined with GIS. Rapidly progressing information technologies have been giving a bright prospect for the melioration of UEMGIS that will have great potential and wide application in environmental conservation.