Major mineral hazard identifications should consider perilous types of fatal accidents in collieries from its definition, and then set existent hazardous objects and their relevant amount as referenced factors. Elimin...Major mineral hazard identifications should consider perilous types of fatal accidents in collieries from its definition, and then set existent hazardous objects and their relevant amount as referenced factors. Eliminating hazards in systems and decreasing risks are their essential purposes with help of hazard identification, risk evaluation and management. By pre-control on major hazards, fatal accidents are avoided, stuffs' safety and healthy are protected, levels of safe management are enhanced, and perpetual systems are built up finally. However, choosing the proper identification and evaluation is a problem all along. Based on specific condition in Jiangou Coal Mine, method of LEC was applied for hazard identification and evaluation in the pre-blasting process within horizontal section top-coal mechanized caving of steep seams. And control measures to of each hazard were put forward. The identification method combining qualitative and quantitative analysis. So, it is practical and operable for the method to develop the given scientific research and has a distinctive impact on high efficiency and safety products for pre-blasting in horizontal section top-coal mechanized caving of steep seams.展开更多
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provabl...The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.展开更多
基金Supported by the National Natural Science Foundation of China (1100202 l) the Doctoral Subject Foundation of the Ministry of Education of China (20070008012) the National High Technology Research and Development Program (2008AA062104)
文摘Major mineral hazard identifications should consider perilous types of fatal accidents in collieries from its definition, and then set existent hazardous objects and their relevant amount as referenced factors. Eliminating hazards in systems and decreasing risks are their essential purposes with help of hazard identification, risk evaluation and management. By pre-control on major hazards, fatal accidents are avoided, stuffs' safety and healthy are protected, levels of safe management are enhanced, and perpetual systems are built up finally. However, choosing the proper identification and evaluation is a problem all along. Based on specific condition in Jiangou Coal Mine, method of LEC was applied for hazard identification and evaluation in the pre-blasting process within horizontal section top-coal mechanized caving of steep seams. And control measures to of each hazard were put forward. The identification method combining qualitative and quantitative analysis. So, it is practical and operable for the method to develop the given scientific research and has a distinctive impact on high efficiency and safety products for pre-blasting in horizontal section top-coal mechanized caving of steep seams.
文摘The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.