To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
Based on the active failure mechanism and passive failure mechanism for a pressurized tunnel face, the analytical solutions of the minimum collapse pressure and maximum blowout pressure that could maintain the stabili...Based on the active failure mechanism and passive failure mechanism for a pressurized tunnel face, the analytical solutions of the minimum collapse pressure and maximum blowout pressure that could maintain the stability of pressurized tunnel faces were deduced using limit analysis in conjunction with nonlinear failure criterion under the condition of pore water pressure. Due to the objective existence of the parameter randomness of soil, the statistical properties of random variables were determined by the maximum entropy principle, and the Monte Carlo method was employed to calculate the failure probability of a pressurized tunnel. The results show that the randomness of soil parameters exerts great influence on the stability of a pressurized tunnel, which indicates that the research should be done on the topic of determination of statistical distribution for geotechnical parameters and the level of variability. For the failure probability of a pressurized tunnel under multiple failure modes, the corresponding safe retaining pressures and optimal range of safe retaining pressures are calculated by introducing allowable failure probability and minimum allowable failure probability. The results can provide practical use in the pressurized tunnel engineering.展开更多
Based on the theory of grey system, established GM (1, 1) grey catastrophe predict model for the first time in order to forecast the catastrophe periods of mine water inflowing (not the volume of water inflowing)....Based on the theory of grey system, established GM (1, 1) grey catastrophe predict model for the first time in order to forecast the catastrophe periods of mine water inflowing (not the volume of water inflowing). After establishing the grey predict system of the catastrophe regularity of 10 month-average volume of water inflowing, the grey forewarning for mine water inflowing catastrophe periods was established which was used to analyze water disaster in 400 meter level of Wennan Colliery. Based on residual analysis, it shows that the result of grey predict system is almost close to the actual value. And the scene actual result also shows the reliability of prediction. Both the theoretical analysis and the scene actual result indicate feasibility and reliability of the method of grey catastrophe predict system.展开更多
This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate pol...This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate policy, concludes that the security supervision department is inclined to increase or decrease the security transaction tax rate, thus points out ways for supervision department to surmount this difficulty.展开更多
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.展开更多
Coal and gas outburst is one of the most serious natural calamities in collieries. And protective layer mining is an effective regional method for preventing and controlling coal outburst. However, how to rationally d...Coal and gas outburst is one of the most serious natural calamities in collieries. And protective layer mining is an effective regional method for preventing and controlling coal outburst. However, how to rationally determine the mining safety range in coal mining of protective layer with quantitative analysis is a difficult problem in rock mechanics and mining engineering so far. Then in this paper applied solid gas interaction mechanics for gas leakage flow, the solid gas interaction analysis for the safety range of up protective layer mining has been achieved with the results of experimental research and in situ measurements so that the result of numerical simulation for the difficult problem is closer to reality. Furthermore, the safety range of up protective layer mining can be determined with time dependent based on the result of numerical simulation.展开更多
By using the continuous exploration system with multi-pipeline in the borehole, the failure cracks of cover strata (specially, the small cracks developing) after the combined mining of 16, 17 thin seams of the 4th min...By using the continuous exploration system with multi-pipeline in the borehole, the failure cracks of cover strata (specially, the small cracks developing) after the combined mining of 16, 17 thin seams of the 4th mining block in Zhaopo Mine is explored. After that, the researching result is considered as the output and the testing result of rock mechanics parameters is considered as the verifying data, the back analysis is made with the conception of the point safety degree. The relative height of the crack developing is obtaied. So, the evaluating of the safety of 16, 17 seams combined mining under the gob water with extreme distance is made and the mining has been safety. The scientific basis is provided for the evaluating of the mining safety with the similar conditions.展开更多
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
基金Project(2013CB036004)supported by the National Basic Research Program of ChinaProject(51378510)supported by the National Natural Science Foundation of China
文摘Based on the active failure mechanism and passive failure mechanism for a pressurized tunnel face, the analytical solutions of the minimum collapse pressure and maximum blowout pressure that could maintain the stability of pressurized tunnel faces were deduced using limit analysis in conjunction with nonlinear failure criterion under the condition of pore water pressure. Due to the objective existence of the parameter randomness of soil, the statistical properties of random variables were determined by the maximum entropy principle, and the Monte Carlo method was employed to calculate the failure probability of a pressurized tunnel. The results show that the randomness of soil parameters exerts great influence on the stability of a pressurized tunnel, which indicates that the research should be done on the topic of determination of statistical distribution for geotechnical parameters and the level of variability. For the failure probability of a pressurized tunnel under multiple failure modes, the corresponding safe retaining pressures and optimal range of safe retaining pressures are calculated by introducing allowable failure probability and minimum allowable failure probability. The results can provide practical use in the pressurized tunnel engineering.
文摘Based on the theory of grey system, established GM (1, 1) grey catastrophe predict model for the first time in order to forecast the catastrophe periods of mine water inflowing (not the volume of water inflowing). After establishing the grey predict system of the catastrophe regularity of 10 month-average volume of water inflowing, the grey forewarning for mine water inflowing catastrophe periods was established which was used to analyze water disaster in 400 meter level of Wennan Colliery. Based on residual analysis, it shows that the result of grey predict system is almost close to the actual value. And the scene actual result also shows the reliability of prediction. Both the theoretical analysis and the scene actual result indicate feasibility and reliability of the method of grey catastrophe predict system.
文摘This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate policy, concludes that the security supervision department is inclined to increase or decrease the security transaction tax rate, thus points out ways for supervision department to surmount this difficulty.
基金supported by the National Key R&D Program of China (2016YFF0204001)the National Key Technology Support Program (2015BAH08F02)+3 种基金the CCF-Venustech Hongyan Research Initiative (2016-009)the PAPD fundthe CICAEET fundthe Guizhou Provincial Key Laboratory of Public Big Data Program
文摘Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
文摘Coal and gas outburst is one of the most serious natural calamities in collieries. And protective layer mining is an effective regional method for preventing and controlling coal outburst. However, how to rationally determine the mining safety range in coal mining of protective layer with quantitative analysis is a difficult problem in rock mechanics and mining engineering so far. Then in this paper applied solid gas interaction mechanics for gas leakage flow, the solid gas interaction analysis for the safety range of up protective layer mining has been achieved with the results of experimental research and in situ measurements so that the result of numerical simulation for the difficult problem is closer to reality. Furthermore, the safety range of up protective layer mining can be determined with time dependent based on the result of numerical simulation.
文摘By using the continuous exploration system with multi-pipeline in the borehole, the failure cracks of cover strata (specially, the small cracks developing) after the combined mining of 16, 17 thin seams of the 4th mining block in Zhaopo Mine is explored. After that, the researching result is considered as the output and the testing result of rock mechanics parameters is considered as the verifying data, the back analysis is made with the conception of the point safety degree. The relative height of the crack developing is obtaied. So, the evaluating of the safety of 16, 17 seams combined mining under the gob water with extreme distance is made and the mining has been safety. The scientific basis is provided for the evaluating of the mining safety with the similar conditions.