Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight...Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.展开更多
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ...The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.展开更多
To evaluate the treatment safety of Tenghuangjiangu tablet on osteoarthritis,3365 osteoarthritis patients whose prescription included Tenghuangjiangu tablet from 15 hospitals were involved in the prospective and multi...To evaluate the treatment safety of Tenghuangjiangu tablet on osteoarthritis,3365 osteoarthritis patients whose prescription included Tenghuangjiangu tablet from 15 hospitals were involved in the prospective and multi-center clinical trial.Tenghuangjiangu tablet dosage was decided by instruction or doctors’experience.The course of treatment and observation was 4 weeks.The adverse drug reactions were observed in the treatment process.Results showed male and female patients were 1018(30.25%)and 2347(69.75%),respectively,and 528 patients had allergic history.The patients’average age was 58.30±8.99 years,and the average disease course was 33.29±37.40 months.The average score of WOMAC scale was 95.07±42.42,which indicated the light conditions.2275 patients were treated with combined drug regimen.There were two adverse drug reactions in this research.One reaction was skin rashes with itching and the interventions were stopped original drugs and give antianaphylactic treatment.The other reaction was stomach discomfort with disgusting and the intervention was stopped the original drugs temporarily,then continued to take two drugs after 3 days and the reaction didn’t appear.The accident rate of adverse drug reaction was 0.059%.The safety of Tenghuangjiangu tablet clinical application was good,and the mechanism of adverse drug reaction should be researched in-depth.展开更多
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
Causality Diagram (CD) is a new graphical knowledge representation based on probability theory. The application of this methodology in the safety analysis of the gas explosion in collieries was discussed in this paper...Causality Diagram (CD) is a new graphical knowledge representation based on probability theory. The application of this methodology in the safety analysis of the gas explosion in collieries was discussed in this paper, and the Minimal Cut Set, the Minimal Path Set and the Importance were introduced to develop the methodology. These concepts are employed to analyze the influence each event has on the top event ? the gas explosion, so as to find out about the defects of the system and accordingly help to work out the emphasis of the precautionary work and some preventive measures as well. The results of the safety analysis are in accordance with the practical requirements; therefore the preventive measures are certain to work effectively. In brief, according to the research CD is so effective in the safety analysis and the safety assessment that it can be a qualitative and quantitative method to predict the accident as well as offer some effective measures for the investigation, the prevention and the control of the accident.展开更多
IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose ...IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec.展开更多
According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are ...According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained.展开更多
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptio...Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.展开更多
Since 1999, shutdown policy has been one of the most important industrial policies in China 'S coal mining industry. There have been many controversies surrounding this policy and its effect on coal mine safety. This...Since 1999, shutdown policy has been one of the most important industrial policies in China 'S coal mining industry. There have been many controversies surrounding this policy and its effect on coal mine safety. This paper summarizes, analyzes and tests two contradicting views of the effects of shutdown policy on the mortality rate of township-and-village-owned coal mines. One view, or the regulative view, believes that shutdown policy induces firms to increase safety input, thus decreasing mortality. The opposing view, or the property rights view, argues that shutdown policy disturbs property rights stability and actually increases mortality. We built a simple theoretical model to analyze these contrasting rationales. The model uses the difference-in-difference method and provincial panel data from 1995 to 2005 to empirically test the policy's effects. Our findings are that shutdown policy significantly decreases output while also increasing mortality in township-and-village coal mines. This result is consistent with the property rights view.展开更多
文摘Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.
文摘The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.
文摘To evaluate the treatment safety of Tenghuangjiangu tablet on osteoarthritis,3365 osteoarthritis patients whose prescription included Tenghuangjiangu tablet from 15 hospitals were involved in the prospective and multi-center clinical trial.Tenghuangjiangu tablet dosage was decided by instruction or doctors’experience.The course of treatment and observation was 4 weeks.The adverse drug reactions were observed in the treatment process.Results showed male and female patients were 1018(30.25%)and 2347(69.75%),respectively,and 528 patients had allergic history.The patients’average age was 58.30±8.99 years,and the average disease course was 33.29±37.40 months.The average score of WOMAC scale was 95.07±42.42,which indicated the light conditions.2275 patients were treated with combined drug regimen.There were two adverse drug reactions in this research.One reaction was skin rashes with itching and the interventions were stopped original drugs and give antianaphylactic treatment.The other reaction was stomach discomfort with disgusting and the intervention was stopped the original drugs temporarily,then continued to take two drugs after 3 days and the reaction didn’t appear.The accident rate of adverse drug reaction was 0.059%.The safety of Tenghuangjiangu tablet clinical application was good,and the mechanism of adverse drug reaction should be researched in-depth.
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Supported by the Natural Science Foundation of China (No. 59677009) the National Research Foundation for the Doctoral Program of Higher Education of China (No.99061116)
文摘Causality Diagram (CD) is a new graphical knowledge representation based on probability theory. The application of this methodology in the safety analysis of the gas explosion in collieries was discussed in this paper, and the Minimal Cut Set, the Minimal Path Set and the Importance were introduced to develop the methodology. These concepts are employed to analyze the influence each event has on the top event ? the gas explosion, so as to find out about the defects of the system and accordingly help to work out the emphasis of the precautionary work and some preventive measures as well. The results of the safety analysis are in accordance with the practical requirements; therefore the preventive measures are certain to work effectively. In brief, according to the research CD is so effective in the safety analysis and the safety assessment that it can be a qualitative and quantitative method to predict the accident as well as offer some effective measures for the investigation, the prevention and the control of the accident.
基金supported by the national key research and development program under grant 2017YFB0802301Guangxi cloud computing and large data Collaborative Innovation Center Project
文摘IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec.
基金Sponsored by the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20020213017).
文摘According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
基金Project(2010B14814) supported by the Fundamental Research Funds for the Central Universities of ChinaProject(200801133) supported by the Ministry of Water Resources of China for Public Welfare ProfessionProject(50809023) supported by the National Natural Science Foundation of China
文摘Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.
文摘Since 1999, shutdown policy has been one of the most important industrial policies in China 'S coal mining industry. There have been many controversies surrounding this policy and its effect on coal mine safety. This paper summarizes, analyzes and tests two contradicting views of the effects of shutdown policy on the mortality rate of township-and-village-owned coal mines. One view, or the regulative view, believes that shutdown policy induces firms to increase safety input, thus decreasing mortality. The opposing view, or the property rights view, argues that shutdown policy disturbs property rights stability and actually increases mortality. We built a simple theoretical model to analyze these contrasting rationales. The model uses the difference-in-difference method and provincial panel data from 1995 to 2005 to empirically test the policy's effects. Our findings are that shutdown policy significantly decreases output while also increasing mortality in township-and-village coal mines. This result is consistent with the property rights view.