In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advo...In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.展开更多
Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(...Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials.展开更多
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid...In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.展开更多
A deterministic approach is frequently used in engineering design. In this quantitative design methodology, a safety factor, which is typically a strength-to-stress ratio, is derived as an index for the stability asse...A deterministic approach is frequently used in engineering design. In this quantitative design methodology, a safety factor, which is typically a strength-to-stress ratio, is derived as an index for the stability assessment of the engineering design. In underground coal mining applications such as pillar design,however, the inputs of pillar design are variables. This is widely overlooked in the deterministic approach. A probabilistic approach assessing the probability of failure or reliability of a system might be an alternative to the conventional quantitative methodology. This approach can incorporate the degree of uncertainty and deviations of variables and provide more versatile and reliable results. In this research, the reliability of case histories from stable and failed pillars of South Africa presented by Merwe and Mathey is examed. The updated Salamon and Munro strength formula(S-M formula) and Merwe and Mathey strength formula(M-M formula) are evaluated through a probabilistic approach. It is concluded that stable pillar cases have a reliability value greater than 0.83 while the reliability value of failed pillar cases are slightly larger than 0.50. There seems to be a positive relation between safety factor and reliability. The reliability of a pillar increases with pillar width but decreases with depth of cover, pillar height and entry width. The reliability analysis also confirms that M-M strength formula has a better distinction between the stable and failed pillar cases.展开更多
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions.展开更多
基金the financial support received by the University of Strathclyde in the form of a postgraduate research scholarship for the duration of the second author’s P hD studies
文摘In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.
基金Project(20100480964) supported by China Postdoctoral Science FoundationProjects(2002AA420090,2008AA092301) supported by the National High Technology Research and Development Program of China
文摘Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials.
基金This work was supported by the National Natural Science Foundation of China under Grant No. 60873199.
文摘In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.
基金supported by the National Natural Science Foundation of General Programs of China (Nos. 51574244, 51674264 and 51674243)
文摘A deterministic approach is frequently used in engineering design. In this quantitative design methodology, a safety factor, which is typically a strength-to-stress ratio, is derived as an index for the stability assessment of the engineering design. In underground coal mining applications such as pillar design,however, the inputs of pillar design are variables. This is widely overlooked in the deterministic approach. A probabilistic approach assessing the probability of failure or reliability of a system might be an alternative to the conventional quantitative methodology. This approach can incorporate the degree of uncertainty and deviations of variables and provide more versatile and reliable results. In this research, the reliability of case histories from stable and failed pillars of South Africa presented by Merwe and Mathey is examed. The updated Salamon and Munro strength formula(S-M formula) and Merwe and Mathey strength formula(M-M formula) are evaluated through a probabilistic approach. It is concluded that stable pillar cases have a reliability value greater than 0.83 while the reliability value of failed pillar cases are slightly larger than 0.50. There seems to be a positive relation between safety factor and reliability. The reliability of a pillar increases with pillar width but decreases with depth of cover, pillar height and entry width. The reliability analysis also confirms that M-M strength formula has a better distinction between the stable and failed pillar cases.
基金the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
文摘To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions.