Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classification...Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures.展开更多
Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification t...Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification to ensuresustainable development of ecotourism. But there are few products certificated until now in China. After reviewing thetrend of ecotourism certification in the world and summarizing its theory and method, this paper analyzes the progressand prospect of ecotourism certification in China, and concludes that certification in China is necessary and promising.展开更多
A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the ass...A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the assessment result should be less than that in the input. However, it was proved that under certain circumstances, the ER approach could not solve the probability deficiency problem. The variable weight approach was based on two assumptions: 1) the greater weight should be given to the rule with more adequate information; 2) the greater weight should be given to the rules with less disparate information. Assessment results of two notional case studies show that 1) the probability deficiency problem is solved using the proposed variable weight approach, and 2) the information with less inadequacy and more disparity is provided for the decision makers to help reach a consensus.展开更多
We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed ...We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed to be inexact but bounded and are represented by intervals. Such uncertainty may typically arise from imprecision during the process of manufacturing or construction, or round-off errors. In this case the application of the finite element method results in a system of linear equations with numerous interval parameters which cannot be solved conventionally. Applying a suitable variable substitution, an iteration method for the solution of a parametric system of linear equations is firstly employed to obtain initial bounds on the node displacements. Thereafter, an interval tightening (pruning) technique is applied, firstly on the element forces and secondly on the node displacements, in order to obtain tight guaranteed enclosures for the interval solutions for the forces and displacements.展开更多
The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has...The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.展开更多
This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integrati...This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integration of renewable generation and controllable loads. Approaches for modeling aggregated controllable loads are presented and placed in the same control and economic modeling framework as generation resources for interconnection planning studies. Model performance is examined with system parameters that are typical for an interconnection approximately the size of the Western Electricity Coordinating Council(WECC) and a control area about 1/100 the size of the system. These results are used to demonstrate and validate the methods presented.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
Baoxinggou area is located in northern Daxing'anling. In this area,comprehensive use of geophysical and geochemical exploration methods plays an important role in the prospecting,and has yielded some application r...Baoxinggou area is located in northern Daxing'anling. In this area,comprehensive use of geophysical and geochemical exploration methods plays an important role in the prospecting,and has yielded some application results so far. Based on the 1 /100 000 stream sediment anomaly survey,the methods of 1 /20 000 soil geochemical measurement,trenching engineering on the earth's surface and 1 /10 000 IP intermediate gradient survey were all used to verify and decompose drainage anomalies,as well as to find and locate ore bodies. In this way,an effective,economical and quick prospecting method was concluded,which focuses on the middle and lower mountain forest swamp landscape in the northern part of Daxing'anling,and provides reference for the prospecting in the area.展开更多
This article is devoted to the study of high order accuracy difference methods tor the Cahn-rnmara equation. A three level linearized compact difference scheme is derived. The u^ique solvability and uaconditional conv...This article is devoted to the study of high order accuracy difference methods tor the Cahn-rnmara equation. A three level linearized compact difference scheme is derived. The u^ique solvability and uaconditional convergence of the difference solution are proved. The convergence order is O(T2+h4) in the maximum norm. The mass conservation and the non-increase of the total energy are also verified. Some numerical examples are given to demonstrate the theoretical results.展开更多
Checking whether a given formula is an invariant at a given program location(especially,inside a loop) can be quite nontrivial even for simple loop programs,given that it is in general an undecidable property.This is ...Checking whether a given formula is an invariant at a given program location(especially,inside a loop) can be quite nontrivial even for simple loop programs,given that it is in general an undecidable property.This is especially the case if the given formula is not an inductive loop invariant,as most automated techniques can only check or generate inductive loop invariants.In this paper,conditions are identified on simple loops and formulas when this check can be performed automatically.A general theorem is proved which gives a necessary and sufficient condition for a formula to be an invariant under certain restrictions on a loop.As a byproduct of this analysis,a new kind of loop invariant inside the loop body,called inside-loop invariant,is proposed.Such an invariant is more general than an inductive loop invariant typically used in the Floyd-Hoare axiomatic approach to program verification.The use of such invariants for program debugging is explored;it is shown that such invariants can be more useful than traditional inductive loop invariants especially when one is interested in checking extreme/side conditions such as underflow,accessing array/collection data structures outside the range,divide by zero,etc.展开更多
基金The National High Technology Research and Develop-ment Program of China(863Program)(No.2006AA04Z416)the Na-tional Science Fund for Distinguished Young Scholars(No.50725828)the Excellent Dissertation Program for Doctoral Degree of Southeast University(No.0705)
文摘Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures.
文摘Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification to ensuresustainable development of ecotourism. But there are few products certificated until now in China. After reviewing thetrend of ecotourism certification in the world and summarizing its theory and method, this paper analyzes the progressand prospect of ecotourism certification in China, and concludes that certification in China is necessary and promising.
基金Foundation item: Projects(70901074, 71001104, 71201168) supported by the National Natural Science Foundation of China
文摘A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the assessment result should be less than that in the input. However, it was proved that under certain circumstances, the ER approach could not solve the probability deficiency problem. The variable weight approach was based on two assumptions: 1) the greater weight should be given to the rule with more adequate information; 2) the greater weight should be given to the rules with less disparate information. Assessment results of two notional case studies show that 1) the probability deficiency problem is solved using the proposed variable weight approach, and 2) the information with less inadequacy and more disparity is provided for the decision makers to help reach a consensus.
文摘We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed to be inexact but bounded and are represented by intervals. Such uncertainty may typically arise from imprecision during the process of manufacturing or construction, or round-off errors. In this case the application of the finite element method results in a system of linear equations with numerous interval parameters which cannot be solved conventionally. Applying a suitable variable substitution, an iteration method for the solution of a parametric system of linear equations is firstly employed to obtain initial bounds on the node displacements. Thereafter, an interval tightening (pruning) technique is applied, firstly on the element forces and secondly on the node displacements, in order to obtain tight guaranteed enclosures for the interval solutions for the forces and displacements.
文摘The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.
文摘This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integration of renewable generation and controllable loads. Approaches for modeling aggregated controllable loads are presented and placed in the same control and economic modeling framework as generation resources for interconnection planning studies. Model performance is examined with system parameters that are typical for an interconnection approximately the size of the Western Electricity Coordinating Council(WECC) and a control area about 1/100 the size of the system. These results are used to demonstrate and validate the methods presented.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
基金Supported by project of Special Service Funds for Gold Geology of Gold Headquarters(2008,No.20130301)
文摘Baoxinggou area is located in northern Daxing'anling. In this area,comprehensive use of geophysical and geochemical exploration methods plays an important role in the prospecting,and has yielded some application results so far. Based on the 1 /100 000 stream sediment anomaly survey,the methods of 1 /20 000 soil geochemical measurement,trenching engineering on the earth's surface and 1 /10 000 IP intermediate gradient survey were all used to verify and decompose drainage anomalies,as well as to find and locate ore bodies. In this way,an effective,economical and quick prospecting method was concluded,which focuses on the middle and lower mountain forest swamp landscape in the northern part of Daxing'anling,and provides reference for the prospecting in the area.
基金supported by Natural Science Foundation of China (Grant No. 10871044)
文摘This article is devoted to the study of high order accuracy difference methods tor the Cahn-rnmara equation. A three level linearized compact difference scheme is derived. The u^ique solvability and uaconditional convergence of the difference solution are proved. The convergence order is O(T2+h4) in the maximum norm. The mass conservation and the non-increase of the total energy are also verified. Some numerical examples are given to demonstrate the theoretical results.
基金supported by NSFC-90718041NKBRPC-2005C B321902+1 种基金China Scholarship Council in Chinasupported by the National Science Foundation award CCF-0729097
文摘Checking whether a given formula is an invariant at a given program location(especially,inside a loop) can be quite nontrivial even for simple loop programs,given that it is in general an undecidable property.This is especially the case if the given formula is not an inductive loop invariant,as most automated techniques can only check or generate inductive loop invariants.In this paper,conditions are identified on simple loops and formulas when this check can be performed automatically.A general theorem is proved which gives a necessary and sufficient condition for a formula to be an invariant under certain restrictions on a loop.As a byproduct of this analysis,a new kind of loop invariant inside the loop body,called inside-loop invariant,is proposed.Such an invariant is more general than an inductive loop invariant typically used in the Floyd-Hoare axiomatic approach to program verification.The use of such invariants for program debugging is explored;it is shown that such invariants can be more useful than traditional inductive loop invariants especially when one is interested in checking extreme/side conditions such as underflow,accessing array/collection data structures outside the range,divide by zero,etc.