NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user ...NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.展开更多
The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering maliciou...The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.展开更多
Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for int...Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.展开更多
This paper considers the influence of changes of the transmission lines of permissible load current depending on conductor and ambient temperatures, climate conditions. The theoretical background of the allowable cond...This paper considers the influence of changes of the transmission lines of permissible load current depending on conductor and ambient temperatures, climate conditions. The theoretical background of the allowable conductor temperature as well as load current determination principles are proposed. On one hand, the principles are based on mechanical limitations; on the other hand, they are based on thermal limitations. The simulation tasks were based on specific data information of three existing overhead lines of Latvian power system as well as the planned 330 kV overhead line. Moreover, the special thermovision device was used for precious determination of conductor temperature of the existing transmission lines. The simulation results of the obtained data are reviewed in the paper.展开更多
To predict the distortion of aerospace monolithic components, a model is established to simulate the numerical control (NC) milling process using 3D finite element method (FEM). In this model, the cutting layer is sim...To predict the distortion of aerospace monolithic components, a model is established to simulate the numerical control (NC) milling process using 3D finite element method (FEM). In this model, the cutting layer is simplified firstly. Then, the models of cutting force and cutting temperature are established to gain the cutting loads, which are applied to the mesh model of the part. Finally, a prototype of machining simulation environment is developed to simulate the milling process of a spar. Key factors influencing the distortion, such as initial residual stress, cutting loads, fixture layout, cutting sequence, and tool path are considered all together. The total distortion of the spar is predicted and an experiment is conducted to validate the numerical results. It is found that the maximum discrepancy between the simulation results and experiment values is 19.0%展开更多
文摘NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.
基金Project(61070194) supported by the National Natural Science Foundation of ChinaProject([2009]1886) supported by the Information Security Industrialization Fund from NDRC of China in 2009+1 种基金Project(CJ[2010]341) supported by the Major Achievements Transfer Projects of MOF and MIIT of China in 2010Project(2011FJ2003) supported by the Natural Science Foundation of Hunan Province, China
文摘The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.
文摘Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.
文摘This paper considers the influence of changes of the transmission lines of permissible load current depending on conductor and ambient temperatures, climate conditions. The theoretical background of the allowable conductor temperature as well as load current determination principles are proposed. On one hand, the principles are based on mechanical limitations; on the other hand, they are based on thermal limitations. The simulation tasks were based on specific data information of three existing overhead lines of Latvian power system as well as the planned 330 kV overhead line. Moreover, the special thermovision device was used for precious determination of conductor temperature of the existing transmission lines. The simulation results of the obtained data are reviewed in the paper.
基金Project (No. 50435020) supported by the National Natural Science Foundation of China
文摘To predict the distortion of aerospace monolithic components, a model is established to simulate the numerical control (NC) milling process using 3D finite element method (FEM). In this model, the cutting layer is simplified firstly. Then, the models of cutting force and cutting temperature are established to gain the cutting loads, which are applied to the mesh model of the part. Finally, a prototype of machining simulation environment is developed to simulate the milling process of a spar. Key factors influencing the distortion, such as initial residual stress, cutting loads, fixture layout, cutting sequence, and tool path are considered all together. The total distortion of the spar is predicted and an experiment is conducted to validate the numerical results. It is found that the maximum discrepancy between the simulation results and experiment values is 19.0%