In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select...In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions.展开更多
Due to the fact that there is no protected signal phase for right turns at most signalized intersections, the conflict between pedestrians and right-turning vehicles is one of the most common conflict types for pedest...Due to the fact that there is no protected signal phase for right turns at most signalized intersections, the conflict between pedestrians and right-turning vehicles is one of the most common conflict types for pedestrians. A pedestrian safety analysis of the common right-turn mode at four-phase signalized intersections is presented. Relative risk is used as a measure of the effect of behaviors. The analysis mainly includes five pedestrian factors that affect the conflict process between pedestrians and right-turning vehicles. Pedestrians tend to have a higher risk of being involved in conflicts in the following six situations: crossing with others, running over the crossing, entering the intersection, being near the exit lane, crossing in the middle or at the end of a green light when the right-turn lane is shared, crossing at the beginning of a green light or red period when the right-turn lane is exclusive. It is easier for pedestrians to get priority when crossing the street in the following situations: running over a crossing, entering the intersection, being near the entrance lane, and not using the crosswalk. However, pedestrians are more inclined to yield to right-turning vehicles when pedestrians are crossing in the middle of the green light time. Some measures to alleviate the conflict are put forward according to the conclusion. Video observations also indicate that a clear pedestrian waiting area must be marked for both pedestrian safety and right-turning vehicle efficiency at major flat intersections, particularly when the arms cover the lateral dividing strips.展开更多
Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phospho...Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phosphorus mines encounters great challenges. For this purpose, a man-machine-environment system composed of evaluation indexes was established, and the grading standards of indexes were defined. Firstly, the measurements of 39 qualitative indexes were obtained through the survey data. According to the measured values of 31 quantitative indexes, the measurements of quantitative indexes were calculated by linear measurement function(LM) and other three functions. Then the singleindex measurement evaluation matrixes were established. Secondly, the entropy weight method was used to determine the weights of each index directly. The analytic hierarchy process(AHP) was also applied to calculate the weights of index and index factor hierarchies after the established hierarchical model. The weights of system hierarchies were given by the grid-based fuzzy Borda method(GFB). The comprehensive weights were determined by the combination method of AHP and GFB(CAG). Furthermore, the multi-index comprehensive measurement evaluation vectors were obtained.Thirdly, the vectors were evaluated by the credible degree recognition(CDR) and the maximum membership(TMM)criteria. Based on the above functions, methods, and criteria, 16 combination evaluation methods were recommended.Finally, the clean and safe production grade of Kaiyang phosphate mine in China was evaluated. The results show that the LM-CAG-CDR is the most reasonable method, which can not only determine the clean and safe production grade of phosphorus mines, but also improve the development level of clean and safe mining of phosphorus mines for guidance.In addition, some beneficial suggestions and measures were also proposed to advance the clean and safe production grade of Kaiyang phosphorus mine.展开更多
Objectives:This study was conducted to investigate the current status of handoffs,perception of patient safety culture,and degrees of handoff evaluation in small and medium-sized hospitals and identified factors that ...Objectives:This study was conducted to investigate the current status of handoffs,perception of patient safety culture,and degrees of handoff evaluation in small and medium-sized hospitals and identified factors that make a difference in handoff evaluation.Methods:This is a descriptive study.425 nurses who work at small and medium-sized hospitals in South Korea were included in our study.They completed a set of self-reporting questionnaires that evaluated demographic data,handoff-related characteristics,perception of patient safety culture,and handoff evaluation.Results:Results showed that the overall score of awareness of a patient safety culture was 3.65±0.45,the level was moderate.The score of handoff evaluation was 5.24±0.85.Most nurses experienced errors in handoff and most nurses had no guidelines and checklist in the ward.Handoff evaluation differed significantly according to the level of education,work patterns,duration of hospital employment,handoff method,degree of satisfaction with the current handoff method,errors occurring at the time of handoff,handoff guidelines,and appropriateness of handoff education time(P<0.05).Conclusion:For handoff improvement,guidelines and standards should be established.It is necessary to develop a structured handoff education system.And formal handoff education should be implemented to spread knowledge uniformly.展开更多
High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control sy...High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.展开更多
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ...Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.展开更多
The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being t...The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population.展开更多
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ...Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient.展开更多
With the increase of global population,grain-population relationship has attracted great attention worldwide.In China,grain-population relationship has become an increasingly important economic concern.Of central impo...With the increase of global population,grain-population relationship has attracted great attention worldwide.In China,grain-population relationship has become an increasingly important economic concern.Of central importance to the food security debate in China is the geography of grain supply and demand.This paper uses a grain demand and supply index (DSR) to analyze the spatial-temporal relationship between population and grain in China from 1949 to 2007 at national and provincial scales.The results are examined in three periods.(1) From 1949 to 2007,with the increase of grain production,the relationship between population and grain of China improved considerably.(2) Over the past 35 years (1970-2005),on the whole the grain producing areas have had grain surplus and contributed to the nation by providing grain,but the ability to provide sufficient grain is not stable.(3) Over the past 15 years (1990-2005),decreases in planting area brought pressure on national grain food security.The paper concludes that the key to providing more food for the main food producing provinces is increasing yield on the basis of steady plant area.展开更多
In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed an...In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed and simulated in this paper which makes the UAV satisfy requirements of different missions. At first, the digital map information is processed vdth an integrated terrain smoothing algorithm, and a safe flight surface which integrates the vehicle dynamic is built and added on the terrain, and then, models of the complicated threats are established and integrated into the digital terrain. At last, an improved A * algorithm is used to plan the three-dimension path on the safe sur- face, and then smooth the path. Simulation results indicate that the approach has a good perform- ance in creating an optimal path in the three-dimension environment and the path planning algorithm is more simple, efficient and easily realized in the engineering field.展开更多
Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presen...Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presented. The subsystem is divided into three layers in its logic architecture: interactive monitor layer, collaborative control layer and real-time control layer. The safety problems and the related strategy are clarified by detailed analysis of each layer and relationship among the layers. So we can obtain a high performance MOMR teleoperation system with multi-layer safety architecture.展开更多
The inherent complexity and uncertainty of multi-operator multi-robot (MOMR) tele-operation system make its safeguard an essential problem. Hazardous factors in the system are analyzed using fault tree analysis(FTA...The inherent complexity and uncertainty of multi-operator multi-robot (MOMR) tele-operation system make its safeguard an essential problem. Hazardous factors in the system are analyzed using fault tree analysis(FTA) technology, and three-layer interactive safety architecture with information flow is designed in modules to control the factors according to the holistic control mode. After that, distributed virtual environment (DVE) including the characteristics of virtual guide (VG) technology is discussed to help the operators achieve some tasks through the visibility of control commands, time-delay, movement collision and operators' intentions. Finally an experiment is implemented to test the efficiency of safety control architecture by using two robots to place some building blocks in the same workspace.展开更多
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio...A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts.展开更多
This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of ca...This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered.展开更多
Vegetation changes and human influences on natural environments since 5 000 a BP were discussed based on the pollen data supported by radiocarbon dating from Cangumiao and Yujiawa profiles in Qian'an Basin, th...Vegetation changes and human influences on natural environments since 5 000 a BP were discussed based on the pollen data supported by radiocarbon dating from Cangumiao and Yujiawa profiles in Qian'an Basin, the southern area of Yanshan Mountain. The research indicates that (1) from 4 600 to 3 100 a BP, deciduous broad_leaved forests dominated by Quercus grew in the Basin, (2) after 3 100 a BP, broad_leaved species reduced and Pinus increased, in response to the cooling climate, (3) since 1 600 a BP, forests had been destroyed seriously due to the increase of agricultural activities, and (4) pollen analysis showed that Castanea trees had been cultivated for 1 600 years, and Oryza had been planted for 700 years in Qian'an Basin.展开更多
Aim A model of human errors is given. His reliability of action is also determined. Safety countermeasures to prevent human errors are put forward. Methods\ Human system is regarded as a maintainable Markov system. O...Aim A model of human errors is given. His reliability of action is also determined. Safety countermeasures to prevent human errors are put forward. Methods\ Human system is regarded as a maintainable Markov system. On the basis of Markov method, the deduction and calculation in practice are made. Results\ Human errors are the chief factors leading to accidents, and may appear in different models. There are two kinds of states the normal and error state in a process of work. The process of state transfer human system is a Markov process. Human action reliability will be decreased with the continuation of time. Conclusion\ Human errors are described in the quantified form. It will have some significance in terms of theory in the study of the relationship between human action and accidents. Thus helping us in the preven tion of accident occurrence. The safety of a system can be improved in this way.展开更多
A new safety assessment method for parallel routes is presented. From the aspects of safety guard system of air traffic control(ATC) and considering the flight conflict as causing event of air collision accidents, t...A new safety assessment method for parallel routes is presented. From the aspects of safety guard system of air traffic control(ATC) and considering the flight conflict as causing event of air collision accidents, this paper fosters a four-layer safety guard of controller command, short-term conflict alerts (STCAs), pilot visual avoidance, and traffic alert collision avoidance system(TCAS). Then, the problem of parallel routes collision risk is divided into two parts:the calculation of potential flight conflict and the analysis of failure probability of the four-layer safety guard. A calculation model for controller interference times is induced. By using cognitive reliability and error analysis method(CREAM),the calculation problem to failure probability of controller sequencing flight conflicts is solved and a fault tree model of guard failure of STCA and TCAS is established. Finally, the Beijing-Shanghai parallel routes are taken as an example to be calculated and the collision risk of the parallel routes is obtained under the condition of radar control. Results show that the parallel routes can satisfy the safety demands.展开更多
Rockfall poses a great threat to buildings and personal security. To understand the dynamic characteristics of rockfalls is a prerequisite for disaster prevention and assessment. Models for rockfalls in different form...Rockfall poses a great threat to buildings and personal security. To understand the dynamic characteristics of rockfalls is a prerequisite for disaster prevention and assessment. Models for rockfalls in different forms are established based on the theory of rigid body motion. The equivalent velocity considering the rotational effect is determined by the energy ratio. Besides, considering plastic deformation and nonlinear hardening, the maximum impact force is estimated based on the Hertz contact theory. Then, a case study is carried out to illustrate the applicability of the model and sensitive analyses on some affecting parameters are also made. Calculation results show that the maximum impact force increases with the increasing of incident velocity, angle and slope gradient reflected by the changing of energy ratio. Moreover, the model for the estimation of maximum impact force is validated by two different scales of experiments and compared with other theoretical models. Simulated maximum impact forces agree well with the experiments.展开更多
基金The National Natural Science Foundation of China(No.61271207,61372104)the Science and Technology Project of SGCC(No.SGRIXTKJ[2015]349)
文摘In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions.
基金The National Natural Science Foundation of China(No.51278220)
文摘Due to the fact that there is no protected signal phase for right turns at most signalized intersections, the conflict between pedestrians and right-turning vehicles is one of the most common conflict types for pedestrians. A pedestrian safety analysis of the common right-turn mode at four-phase signalized intersections is presented. Relative risk is used as a measure of the effect of behaviors. The analysis mainly includes five pedestrian factors that affect the conflict process between pedestrians and right-turning vehicles. Pedestrians tend to have a higher risk of being involved in conflicts in the following six situations: crossing with others, running over the crossing, entering the intersection, being near the exit lane, crossing in the middle or at the end of a green light when the right-turn lane is shared, crossing at the beginning of a green light or red period when the right-turn lane is exclusive. It is easier for pedestrians to get priority when crossing the street in the following situations: running over a crossing, entering the intersection, being near the entrance lane, and not using the crosswalk. However, pedestrians are more inclined to yield to right-turning vehicles when pedestrians are crossing in the middle of the green light time. Some measures to alleviate the conflict are put forward according to the conclusion. Video observations also indicate that a clear pedestrian waiting area must be marked for both pedestrian safety and right-turning vehicle efficiency at major flat intersections, particularly when the arms cover the lateral dividing strips.
基金Project(51974362) supported by the National Natural Science Foundation of ChinaProject(2282020cxqd055) supported by the Fundamental Research Funds for the Central Universities,ChinaProject(2021-QYC-10050-25631) supported by the Department of Emergency Management of Hunan Province,China。
文摘Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phosphorus mines encounters great challenges. For this purpose, a man-machine-environment system composed of evaluation indexes was established, and the grading standards of indexes were defined. Firstly, the measurements of 39 qualitative indexes were obtained through the survey data. According to the measured values of 31 quantitative indexes, the measurements of quantitative indexes were calculated by linear measurement function(LM) and other three functions. Then the singleindex measurement evaluation matrixes were established. Secondly, the entropy weight method was used to determine the weights of each index directly. The analytic hierarchy process(AHP) was also applied to calculate the weights of index and index factor hierarchies after the established hierarchical model. The weights of system hierarchies were given by the grid-based fuzzy Borda method(GFB). The comprehensive weights were determined by the combination method of AHP and GFB(CAG). Furthermore, the multi-index comprehensive measurement evaluation vectors were obtained.Thirdly, the vectors were evaluated by the credible degree recognition(CDR) and the maximum membership(TMM)criteria. Based on the above functions, methods, and criteria, 16 combination evaluation methods were recommended.Finally, the clean and safe production grade of Kaiyang phosphate mine in China was evaluated. The results show that the LM-CAG-CDR is the most reasonable method, which can not only determine the clean and safe production grade of phosphorus mines, but also improve the development level of clean and safe mining of phosphorus mines for guidance.In addition, some beneficial suggestions and measures were also proposed to advance the clean and safe production grade of Kaiyang phosphorus mine.
基金supported by the National Research Foundation of Korea(NRF-2019R1I1A3A01059093)。
文摘Objectives:This study was conducted to investigate the current status of handoffs,perception of patient safety culture,and degrees of handoff evaluation in small and medium-sized hospitals and identified factors that make a difference in handoff evaluation.Methods:This is a descriptive study.425 nurses who work at small and medium-sized hospitals in South Korea were included in our study.They completed a set of self-reporting questionnaires that evaluated demographic data,handoff-related characteristics,perception of patient safety culture,and handoff evaluation.Results:Results showed that the overall score of awareness of a patient safety culture was 3.65±0.45,the level was moderate.The score of handoff evaluation was 5.24±0.85.Most nurses experienced errors in handoff and most nurses had no guidelines and checklist in the ward.Handoff evaluation differed significantly according to the level of education,work patterns,duration of hospital employment,handoff method,degree of satisfaction with the current handoff method,errors occurring at the time of handoff,handoff guidelines,and appropriateness of handoff education time(P<0.05).Conclusion:For handoff improvement,guidelines and standards should be established.It is necessary to develop a structured handoff education system.And formal handoff education should be implemented to spread knowledge uniformly.
基金Sponsored by the National High Technology Research and Development Program of China(Grant No.2002AA420110 -2).
文摘High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.
基金Supported by the National Natural Science Foundation of China (No. 60970111, 61133014, 60903189, 60903020).
文摘Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.
文摘The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population.
基金supported by National Natural Science Foundation of China(Grant Nos.60873191,60903152,61003286,60821001)
文摘Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient.
基金financial support from Education Bureau of Shandong for the research as visiting scholar in the University of Sydney
文摘With the increase of global population,grain-population relationship has attracted great attention worldwide.In China,grain-population relationship has become an increasingly important economic concern.Of central importance to the food security debate in China is the geography of grain supply and demand.This paper uses a grain demand and supply index (DSR) to analyze the spatial-temporal relationship between population and grain in China from 1949 to 2007 at national and provincial scales.The results are examined in three periods.(1) From 1949 to 2007,with the increase of grain production,the relationship between population and grain of China improved considerably.(2) Over the past 35 years (1970-2005),on the whole the grain producing areas have had grain surplus and contributed to the nation by providing grain,but the ability to provide sufficient grain is not stable.(3) Over the past 15 years (1990-2005),decreases in planting area brought pressure on national grain food security.The paper concludes that the key to providing more food for the main food producing provinces is increasing yield on the basis of steady plant area.
文摘In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed and simulated in this paper which makes the UAV satisfy requirements of different missions. At first, the digital map information is processed vdth an integrated terrain smoothing algorithm, and a safe flight surface which integrates the vehicle dynamic is built and added on the terrain, and then, models of the complicated threats are established and integrated into the digital terrain. At last, an improved A * algorithm is used to plan the three-dimension path on the safe sur- face, and then smooth the path. Simulation results indicate that the approach has a good perform- ance in creating an optimal path in the three-dimension environment and the path planning algorithm is more simple, efficient and easily realized in the engineering field.
文摘Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presented. The subsystem is divided into three layers in its logic architecture: interactive monitor layer, collaborative control layer and real-time control layer. The safety problems and the related strategy are clarified by detailed analysis of each layer and relationship among the layers. So we can obtain a high performance MOMR teleoperation system with multi-layer safety architecture.
文摘The inherent complexity and uncertainty of multi-operator multi-robot (MOMR) tele-operation system make its safeguard an essential problem. Hazardous factors in the system are analyzed using fault tree analysis(FTA) technology, and three-layer interactive safety architecture with information flow is designed in modules to control the factors according to the holistic control mode. After that, distributed virtual environment (DVE) including the characteristics of virtual guide (VG) technology is discussed to help the operators achieve some tasks through the visibility of control commands, time-delay, movement collision and operators' intentions. Finally an experiment is implemented to test the efficiency of safety control architecture by using two robots to place some building blocks in the same workspace.
基金National Natural Science Foundation ofChina (No.90104029)
文摘A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts.
文摘This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered.
文摘Vegetation changes and human influences on natural environments since 5 000 a BP were discussed based on the pollen data supported by radiocarbon dating from Cangumiao and Yujiawa profiles in Qian'an Basin, the southern area of Yanshan Mountain. The research indicates that (1) from 4 600 to 3 100 a BP, deciduous broad_leaved forests dominated by Quercus grew in the Basin, (2) after 3 100 a BP, broad_leaved species reduced and Pinus increased, in response to the cooling climate, (3) since 1 600 a BP, forests had been destroyed seriously due to the increase of agricultural activities, and (4) pollen analysis showed that Castanea trees had been cultivated for 1 600 years, and Oryza had been planted for 700 years in Qian'an Basin.
文摘Aim A model of human errors is given. His reliability of action is also determined. Safety countermeasures to prevent human errors are put forward. Methods\ Human system is regarded as a maintainable Markov system. On the basis of Markov method, the deduction and calculation in practice are made. Results\ Human errors are the chief factors leading to accidents, and may appear in different models. There are two kinds of states the normal and error state in a process of work. The process of state transfer human system is a Markov process. Human action reliability will be decreased with the continuation of time. Conclusion\ Human errors are described in the quantified form. It will have some significance in terms of theory in the study of the relationship between human action and accidents. Thus helping us in the preven tion of accident occurrence. The safety of a system can be improved in this way.
基金Supported by the National High Technology Research and Development Program of China("863"Program)(2006AA12A105)~~
文摘A new safety assessment method for parallel routes is presented. From the aspects of safety guard system of air traffic control(ATC) and considering the flight conflict as causing event of air collision accidents, this paper fosters a four-layer safety guard of controller command, short-term conflict alerts (STCAs), pilot visual avoidance, and traffic alert collision avoidance system(TCAS). Then, the problem of parallel routes collision risk is divided into two parts:the calculation of potential flight conflict and the analysis of failure probability of the four-layer safety guard. A calculation model for controller interference times is induced. By using cognitive reliability and error analysis method(CREAM),the calculation problem to failure probability of controller sequencing flight conflicts is solved and a fault tree model of guard failure of STCA and TCAS is established. Finally, the Beijing-Shanghai parallel routes are taken as an example to be calculated and the collision risk of the parallel routes is obtained under the condition of radar control. Results show that the parallel routes can satisfy the safety demands.
基金supported by the National Natural Science Foundation of China (41472272)the Youth Science and Technology Fund of Sichuan Province (2016JQ0011)
文摘Rockfall poses a great threat to buildings and personal security. To understand the dynamic characteristics of rockfalls is a prerequisite for disaster prevention and assessment. Models for rockfalls in different forms are established based on the theory of rigid body motion. The equivalent velocity considering the rotational effect is determined by the energy ratio. Besides, considering plastic deformation and nonlinear hardening, the maximum impact force is estimated based on the Hertz contact theory. Then, a case study is carried out to illustrate the applicability of the model and sensitive analyses on some affecting parameters are also made. Calculation results show that the maximum impact force increases with the increasing of incident velocity, angle and slope gradient reflected by the changing of energy ratio. Moreover, the model for the estimation of maximum impact force is validated by two different scales of experiments and compared with other theoretical models. Simulated maximum impact forces agree well with the experiments.