In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib...In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.展开更多
An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming a...An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they...Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they cannot make the reliability adequately explicable. Therefore, a mathematical tool, the unascertained measure, was introduced. First, the basic knowledge of the unascertained sets was introduced briefly. Second, the unascertained measure was defined and credible identification was set up. The method has been introduced into the fields for safety assessment of a jacket loadout procedure. Engineering practices showed that it can complete the safety assessment systematically and scientifically without any assumption. The work should have significance in theory and practice for offshore engineering.展开更多
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ...Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.展开更多
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing...Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.展开更多
1 Introduction In-stent restenosis (ISR), characterized by neointimal proliferation and/or neoatherosclerosis in the vessel of the stent, can cause a reduction in lumen diameter after stent implantation, which can d...1 Introduction In-stent restenosis (ISR), characterized by neointimal proliferation and/or neoatherosclerosis in the vessel of the stent, can cause a reduction in lumen diameter after stent implantation, which can directly induce the recurrence of angina symptoms or an acute coronary syndrome in patients and is usually life-threatening.展开更多
In underground mining, machine design is predominantly dictated by mine conditions and individual customer desires. In partnership with Foresight Energy, J. H. Fletcher & Company was tasked to design and manufactu...In underground mining, machine design is predominantly dictated by mine conditions and individual customer desires. In partnership with Foresight Energy, J. H. Fletcher & Company was tasked to design and manufacture a new roof bolting machine with six independent drilling apparatus on board capable of drilling and bolting the roof and ribs with material handling. The objective was to produce a machine capable of drilling and installing six bolts simultaneously with a limited number of operators. The goal of the mine is to decrease the time to bolt a cut to improve the safety level of the current roof bolting method, improve efficiency and to improve the bottom line cost of entry development. The customer wanted four drills at the front of the machine dedicated to installing roof bolts and then another two drills behind them dedicated to rib bolts. This dictated the requirement of latched controls, which would allow the operator to start drilling one hole and then latch the controls to be able to move on to the next.The result of the design is a machine with a single platform and six independent masts with drillheads:four masts strictly for drilling and installing roof bolts on the front of the platform and two masts on the back of the platform for rib bolts. The controls at each operator's station include a latch control for drilling. The six-head roof bolter allows fewer operators to drill and install roof and rib bolts, which in turn lowers the miners' roof exposure per cut. This design reduces the operator's exposure from the inherent pinch points and rotary hazards once he has engaged the latch drilling. Therefore, the machine will help to decrease the time to bolt a cut, improving productivity while enhancing the ability to operate the machine safely.展开更多
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo...With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance.展开更多
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de...With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices.展开更多
文摘In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.
基金Supported by the Open Foundation of the State Key Lab for Ocean Engineering of Shanghai Jiao Tong University under Grant No.0602
文摘An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
基金the National Natural Science Foundation of China (505079047)
文摘Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they cannot make the reliability adequately explicable. Therefore, a mathematical tool, the unascertained measure, was introduced. First, the basic knowledge of the unascertained sets was introduced briefly. Second, the unascertained measure was defined and credible identification was set up. The method has been introduced into the fields for safety assessment of a jacket loadout procedure. Engineering practices showed that it can complete the safety assessment systematically and scientifically without any assumption. The work should have significance in theory and practice for offshore engineering.
基金supported by National Key Technology Support Program(No.2013BAD17B06)Major Program of National Social Science Fund(No.15ZDB154)
文摘Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.
文摘Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.
文摘1 Introduction In-stent restenosis (ISR), characterized by neointimal proliferation and/or neoatherosclerosis in the vessel of the stent, can cause a reduction in lumen diameter after stent implantation, which can directly induce the recurrence of angina symptoms or an acute coronary syndrome in patients and is usually life-threatening.
文摘In underground mining, machine design is predominantly dictated by mine conditions and individual customer desires. In partnership with Foresight Energy, J. H. Fletcher & Company was tasked to design and manufacture a new roof bolting machine with six independent drilling apparatus on board capable of drilling and bolting the roof and ribs with material handling. The objective was to produce a machine capable of drilling and installing six bolts simultaneously with a limited number of operators. The goal of the mine is to decrease the time to bolt a cut to improve the safety level of the current roof bolting method, improve efficiency and to improve the bottom line cost of entry development. The customer wanted four drills at the front of the machine dedicated to installing roof bolts and then another two drills behind them dedicated to rib bolts. This dictated the requirement of latched controls, which would allow the operator to start drilling one hole and then latch the controls to be able to move on to the next.The result of the design is a machine with a single platform and six independent masts with drillheads:four masts strictly for drilling and installing roof bolts on the front of the platform and two masts on the back of the platform for rib bolts. The controls at each operator's station include a latch control for drilling. The six-head roof bolter allows fewer operators to drill and install roof and rib bolts, which in turn lowers the miners' roof exposure per cut. This design reduces the operator's exposure from the inherent pinch points and rotary hazards once he has engaged the latch drilling. Therefore, the machine will help to decrease the time to bolt a cut, improving productivity while enhancing the ability to operate the machine safely.
文摘With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance.
文摘With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices.