Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptio...Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.展开更多
In the present study,we described a continuous-flow,one-pot synthesis of asymmetrical ureas using nucleophilic addition reaction of amines to isocyanates derived from acids’Curtius rearrangement.The advantages of thi...In the present study,we described a continuous-flow,one-pot synthesis of asymmetrical ureas using nucleophilic addition reaction of amines to isocyanates derived from acids’Curtius rearrangement.The advantages of this method included broad substrate scope,high yields,rapid reaction,simplicity,extraordinary safety,and easy scale-up.展开更多
After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. W...After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service.展开更多
基金Project(2010B14814) supported by the Fundamental Research Funds for the Central Universities of ChinaProject(200801133) supported by the Ministry of Water Resources of China for Public Welfare ProfessionProject(50809023) supported by the National Natural Science Foundation of China
文摘Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.
基金National Natural Science Foundation of China(Grant No.21877005).
文摘In the present study,we described a continuous-flow,one-pot synthesis of asymmetrical ureas using nucleophilic addition reaction of amines to isocyanates derived from acids’Curtius rearrangement.The advantages of this method included broad substrate scope,high yields,rapid reaction,simplicity,extraordinary safety,and easy scale-up.
基金Project supported by the National Natural Science Foundation of China(Nos.61562087 and 61772270)the National High-Tech R&D Program(863)of China(No.2015AA015303)+2 种基金the Natural Science Foundation of Jiangsu Province,China(No.BK20130735)the Universities Natural Science Foundation of Jiangsu Province,China(No.13KJB520011)the Science Foundation of Nanjing Institute of Technology,China(No.YKJ201420)
文摘After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service.