Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be...Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.展开更多
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the...We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the securi...Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems.展开更多
In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high ...In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high seismic inten- sity, large-seale landslide and high dam and huge reservoirs with dam types such as concrete surface rock-fill, asphalt concrete core, roller compacted concrete (RCC) arch dam and so on. From several aspects, including risk response measures for high dam, strengthening safety awareness for high dam design and construction, improving high dam con- struetion technique, intelligent dam safety management system based on IT, developing dam rehabilitation and mainte- nance technologies, useful dam safety and coping strategy is proposed.展开更多
High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control sy...High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.展开更多
基金Project 2002CB412705 supported by the Major State Basic Research Development Program (973) of China
文摘Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.
基金supported by National Natural Science Foundation of China under Crant No.10575017
文摘We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
基金Supported by the National Natural Science Foundation of China(No.61070185,61003261)the Knowledge Innovation Program of the Chinese Academy of Sciences(No.XDA06030200)
文摘Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems.
文摘In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high seismic inten- sity, large-seale landslide and high dam and huge reservoirs with dam types such as concrete surface rock-fill, asphalt concrete core, roller compacted concrete (RCC) arch dam and so on. From several aspects, including risk response measures for high dam, strengthening safety awareness for high dam design and construction, improving high dam con- struetion technique, intelligent dam safety management system based on IT, developing dam rehabilitation and mainte- nance technologies, useful dam safety and coping strategy is proposed.
基金Sponsored by the National High Technology Research and Development Program of China(Grant No.2002AA420110 -2).
文摘High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.