A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ...A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.展开更多
In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati...In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.展开更多
This paper proposes a new type of tri-sectional wheel-based cable climbing robot which is able to climb up vertical cylindrical cables of a cable-stayed bridge. The robot is composed of three pairs of wheels equally s...This paper proposes a new type of tri-sectional wheel-based cable climbing robot which is able to climb up vertical cylindrical cables of a cable-stayed bridge. The robot is composed of three pairs of wheels equally spaced circularly which are joined by six connecting boards to form a whole closed hexagonal body to clasp a cable. The whole design is entirely modular to enable to assenably the robot on-siteeasy eaoily. To analyze the static features of the robot, a mathematical model of climbing is deduced. Furthermore, taking a cable with a diameter of 80mm as an example, we calculate the design parameters of the robot. For safly landing in the case of electrical accident, a centrifugal speed regulator is proposed and applied to consume useless energy generated when the robot is slipping down along the cables. A simplified mathematical model of the landing mechanism is deduced. Finally, several experiments on the climbing mechanism demonstrate that the robot can carry payloads less than 2.2kg to climb up a cable with diameters varying from 65mm to 205mm.展开更多
基金"China National Science Foundation"under grant No: 2001AA412010
文摘A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.
基金This work is supported by the following projects: National Natural Science Foundation of China grant 60772136, 111 Development Program of China NO.B08038, National Science & Technology Pillar Program of China NO.2008BAH22B03 and NO. 2007BAH08B01.
文摘In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.
基金Supported by the National High Technology Research and Development Programme of China (No. 2006AA04Z234) and the China Postdoctoral Science Foundation ( No. 20090461051 )
文摘This paper proposes a new type of tri-sectional wheel-based cable climbing robot which is able to climb up vertical cylindrical cables of a cable-stayed bridge. The robot is composed of three pairs of wheels equally spaced circularly which are joined by six connecting boards to form a whole closed hexagonal body to clasp a cable. The whole design is entirely modular to enable to assenably the robot on-siteeasy eaoily. To analyze the static features of the robot, a mathematical model of climbing is deduced. Furthermore, taking a cable with a diameter of 80mm as an example, we calculate the design parameters of the robot. For safly landing in the case of electrical accident, a centrifugal speed regulator is proposed and applied to consume useless energy generated when the robot is slipping down along the cables. A simplified mathematical model of the landing mechanism is deduced. Finally, several experiments on the climbing mechanism demonstrate that the robot can carry payloads less than 2.2kg to climb up a cable with diameters varying from 65mm to 205mm.