Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety contr...Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety control technology of cadmium in rice grain was summarized in this paper. We hoped to lay a foundation for the safety production of rice.展开更多
Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the soc...Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the social responsibility and play the role in solving the global problems like food security from the developmental status and potential of plant science and technology. Moreover,by working with agronomists, ecologists and environmental experts,plant scientists do provide novel ideas and technologies for developing low carbon agriculture,for breeding new crop varieties with high yield and quality and stress resistance,for developing new type of energy plants,for supplying healthy foods and drugs,reasonably using land and water resources,and for ameliorating environment,making better contribution to the sustainable development of the globe and human being ourselves.展开更多
In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal m...In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results.展开更多
In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Instit...In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Institute of Nuclear Energy Safety Technology,was selected as the reference reactor for ADS development,as well as for the technology development of the Generation IV lead-cooled fast reactor.The conceptual design of CLEAR-I with 10 MW thermal power has been completed.KYLIN series lead-bismuth eutectic experimental loops have been constructed to investigate the technologies of the coolant,key components,structural materials,fuel assembly,operation,and control.In order to validate and test the key components and integrated operating technology of the lead-based reactor,the lead alloy-cooled non-nuclear reactor CLEAR-S,the lead-based zero-power nuclear reactor CLEAR-0,and the lead-based virtual reactor CLEAR-V are under realization.展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to bette...Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to better evaluate the performance of the CMBS in the Chinese traffic environment.First,because safety-critical situations can be diverse especially in the Chinese environment,the Chinese traffic-accident characteristics are analyzed according to accident statistics over the past 17 years.Next,10 Chinese traffic-accident scenarios accounting for more than 80%of traffic accidents are selected.For each typical scenario,353 representative cases are collected from the traffic-management department of Beijing.These real-world accident cases are then reconstructed by the traffic-accident-reconstruction software PC-Crash on the basis of accident-scene diagrams.This study also proposes a systematic analytical process for estimating the effectiveness of the technology using the co-simulation platform of PC-Crash and rateEFFECT,in which 176 simulations are analyzed in detail to assess the accident-avoidance performance of the CMBS.The overall collision-avoidance effectiveness reaches 82.4%,showing that the proposed approach is efficient for avoiding collisions,thereby enhancing traffic safety and improving traffic management.展开更多
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ...In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.展开更多
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc...In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.展开更多
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor...Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.展开更多
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy...Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.展开更多
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a...A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.展开更多
Retaining gob-side entryways and the stability of gas drainage boreholes are two essential techniques in the co-extraction of coal and gas without entry pillars (CECGWEP). However, retained entryways located in deep...Retaining gob-side entryways and the stability of gas drainage boreholes are two essential techniques in the co-extraction of coal and gas without entry pillars (CECGWEP). However, retained entryways located in deep coal mines are hard to maintain, especially for constructing boreholes in confined spaces, owing to major deformations. Consequently, it is difficult to drill boreholes and maintain their stability, which therefore cannot guarantee the effectiveness of gas drainage. This paper presents three measures for conducting CECGWEP in deep mines on the basis of effective space in retained entryways for gas drainage, They are combinations of retaining roadways and face-lagging inclined boreholes, retaining roadways and face-advancing inclined boreholes, and retaining roadways and high return airway inclined boreholes. Several essential techniques are suggested to improve the maintenance of retained entryways and the stabilization of boreholes. For the particular cases considered in this study, two field trials have verified the latter two measures from the results obtained from the faces 1111(1) and 11112(1) in the Zhuji Mine. The results indicate that these models can effectively solve the problems in deep mines. The maximum gas drainage flow for a single hole can reach 8.1 m^3/min and the effective drainage distance can be extended up to 150 m or more.展开更多
For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertica...For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertical transportation system to transport this type of solid backfill material. Given the demands imposed on safely in feeding this material, we also investigated the structure and basic parameter of this system. For a mine in the Xingtai mining area the results show that: (1) a vertical transportation system should include three main parts, i.e., a feeding borehole, a maintenance chamber and a storage silo; (2) we determined that 486 mm is a suitable diameter for bore holes, the diameter of the storage silo is 6 m and its height 30 m in this vertical transportation system; (3) a conical buffer was developed to absorb the impact during the feeding process. To ensure normal implementation of fully mechanized backfilling coal mining technology and the safety of underground personnel, we propose a series of security technologies for anti-blockage, storage silo cleaning, high pressure air release and aspiration. This vertical transporting system has been applied in one this particular mine, which has fed about 4 million tons solid material with a feeding depth of 350 m and safely exploited 3 million tons of coal.展开更多
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t...The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.展开更多
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv...In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.展开更多
基金Supported by the Twelfth Five-Year National Science and Technology Support Project(2012BAK17B03)National Nature Science Foundation of China(31401356)+1 种基金College Students’ Science and Technology Innovation Activities Project Plan(New Talent Plan) in Zhejiang Province(2013R409036)National College Students’ Innovative Entrepreneurial Training Program~~
文摘Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety control technology of cadmium in rice grain was summarized in this paper. We hoped to lay a foundation for the safety production of rice.
文摘Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the social responsibility and play the role in solving the global problems like food security from the developmental status and potential of plant science and technology. Moreover,by working with agronomists, ecologists and environmental experts,plant scientists do provide novel ideas and technologies for developing low carbon agriculture,for breeding new crop varieties with high yield and quality and stress resistance,for developing new type of energy plants,for supplying healthy foods and drugs,reasonably using land and water resources,and for ameliorating environment,making better contribution to the sustainable development of the globe and human being ourselves.
基金Project 70771105 supported by the National Natural Science Foundation of China
文摘In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results.
文摘In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Institute of Nuclear Energy Safety Technology,was selected as the reference reactor for ADS development,as well as for the technology development of the Generation IV lead-cooled fast reactor.The conceptual design of CLEAR-I with 10 MW thermal power has been completed.KYLIN series lead-bismuth eutectic experimental loops have been constructed to investigate the technologies of the coolant,key components,structural materials,fuel assembly,operation,and control.In order to validate and test the key components and integrated operating technology of the lead-based reactor,the lead alloy-cooled non-nuclear reactor CLEAR-S,the lead-based zero-power nuclear reactor CLEAR-0,and the lead-based virtual reactor CLEAR-V are under realization.
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金Project(51625503) supported by the National Science Fund for Distinguished Young Scholars,ChinaProject(61790561) supported by the National Natural Science Foundation of China+1 种基金Project(20163000124) supported by Tsinghua-Honda Joint Research,ChinaProject(TTS2017-02) supported by the Open Fund for Jiangsu Key Laboratory of Traffic and Transportation Security,China
文摘Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to better evaluate the performance of the CMBS in the Chinese traffic environment.First,because safety-critical situations can be diverse especially in the Chinese environment,the Chinese traffic-accident characteristics are analyzed according to accident statistics over the past 17 years.Next,10 Chinese traffic-accident scenarios accounting for more than 80%of traffic accidents are selected.For each typical scenario,353 representative cases are collected from the traffic-management department of Beijing.These real-world accident cases are then reconstructed by the traffic-accident-reconstruction software PC-Crash on the basis of accident-scene diagrams.This study also proposes a systematic analytical process for estimating the effectiveness of the technology using the co-simulation platform of PC-Crash and rateEFFECT,in which 176 simulations are analyzed in detail to assess the accident-avoidance performance of the CMBS.The overall collision-avoidance effectiveness reaches 82.4%,showing that the proposed approach is efficient for avoiding collisions,thereby enhancing traffic safety and improving traffic management.
基金Acknowledgements This work was supported by Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute National Natural Science Foundation of China(No. 61070219) Building Together Specific Project from Beijing Municipal Education Commission.
文摘In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.
文摘In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.
文摘Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.
基金The paper is supported by the National High Technology Research and Development Program of China (863 Program) (No.2009AA01Z439) and the National Natural Science Foundation of China (U0835001)
文摘Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.
文摘A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.
基金Acknowledgments The research was supported by Program for Changjiang Scholars and Innovative Research Team in University (IRT_I4R55), and the National Natural Science Foundation of China under Grant No. NSFC-51274193.
文摘Retaining gob-side entryways and the stability of gas drainage boreholes are two essential techniques in the co-extraction of coal and gas without entry pillars (CECGWEP). However, retained entryways located in deep coal mines are hard to maintain, especially for constructing boreholes in confined spaces, owing to major deformations. Consequently, it is difficult to drill boreholes and maintain their stability, which therefore cannot guarantee the effectiveness of gas drainage. This paper presents three measures for conducting CECGWEP in deep mines on the basis of effective space in retained entryways for gas drainage, They are combinations of retaining roadways and face-lagging inclined boreholes, retaining roadways and face-advancing inclined boreholes, and retaining roadways and high return airway inclined boreholes. Several essential techniques are suggested to improve the maintenance of retained entryways and the stabilization of boreholes. For the particular cases considered in this study, two field trials have verified the latter two measures from the results obtained from the faces 1111(1) and 11112(1) in the Zhuji Mine. The results indicate that these models can effectively solve the problems in deep mines. The maximum gas drainage flow for a single hole can reach 8.1 m^3/min and the effective drainage distance can be extended up to 150 m or more.
基金support for this work provided by the National Natural Science Foundation of China (No. 51074165)the major program of the National Natural Science Foundation of China (No. 50834004)the Innovation Project of Graduate Students of Jiangsu Province (No. CXZZ11-0308)
文摘For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertical transportation system to transport this type of solid backfill material. Given the demands imposed on safely in feeding this material, we also investigated the structure and basic parameter of this system. For a mine in the Xingtai mining area the results show that: (1) a vertical transportation system should include three main parts, i.e., a feeding borehole, a maintenance chamber and a storage silo; (2) we determined that 486 mm is a suitable diameter for bore holes, the diameter of the storage silo is 6 m and its height 30 m in this vertical transportation system; (3) a conical buffer was developed to absorb the impact during the feeding process. To ensure normal implementation of fully mechanized backfilling coal mining technology and the safety of underground personnel, we propose a series of security technologies for anti-blockage, storage silo cleaning, high pressure air release and aspiration. This vertical transporting system has been applied in one this particular mine, which has fed about 4 million tons solid material with a feeding depth of 350 m and safely exploited 3 million tons of coal.
基金Under the auspices of International Centre for China Development Studies,the University of Hong Kong
文摘The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.
基金Supported by the National Natural Science Foundation of China (No.10671051)the Natural Science Foundation of Zhejiang Province (No.Y105067).
文摘In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.