To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own ...To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own security servers and service providers, and there are trust relationships between different security domains for identity federation. The security server is responsible for authentication and authorization inside the domain, and offers identity federation capability for different domains. The security assertion markup language (SAML) assertion is used as security token in the system for authentication, authorization, and identity federation. The design of the proposed single sign-on process is based on web service security framework and multiple security domains, and the authorization is always deployed in the local area inside the service provider' s security domain, which enables web service clients, both inside and outside their security domains, to access the services in a simple, scalable, standard and secure way.展开更多
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t...To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.展开更多
The paper presents the development and performance of a kinematics control scheme for the AGV based on inductive guidance in transporting newsprint rolls. The required error is pre-computed using a kinematics model of...The paper presents the development and performance of a kinematics control scheme for the AGV based on inductive guidance in transporting newsprint rolls. The required error is pre-computed using a kinematics model of the AGV taking into account the effect of various factors that contribute to improve tracking performance of the AGV. Simulation and experimental results illustrate that the kinematics model performs well and the results of various factors contribute to tracking performance of the AGV.展开更多
The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of ...The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presen...Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presented. The subsystem is divided into three layers in its logic architecture: interactive monitor layer, collaborative control layer and real-time control layer. The safety problems and the related strategy are clarified by detailed analysis of each layer and relationship among the layers. So we can obtain a high performance MOMR teleoperation system with multi-layer safety architecture.展开更多
Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the ...Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the better rule for derivative line and the choice for termination. In hardware design, it presents three parts of driver’s peripheral circuit. In control software design, it presents a method of using 75176’s DE line to control the driver.展开更多
In order to investigate the behavior of buildings and engineering structures during earthquakes, based on the data of seismic observation devices mounted on constructions with typical characteristics, results of inves...In order to investigate the behavior of buildings and engineering structures during earthquakes, based on the data of seismic observation devices mounted on constructions with typical characteristics, results of investigating the change of mechanical properties of building structural system over time and the results of examination of structural rigidity and safety change over time, depending on the dynamic characteristics of the building, determined by experimental investigations made at intervals are mentioned in this article. In addition, evaluation of earthquake acceleration acting on structures due to earthquake-induced damage characteristics of buildings and engineering constructions which are made earthquake resistant is also included here.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
Containment control of first-order multi-agent systems with uncertain topologies and communication timedelays is studied. Suppose system topologies are dynamically changed, a containment control algorithm with time-va...Containment control of first-order multi-agent systems with uncertain topologies and communication timedelays is studied. Suppose system topologies are dynamically changed, a containment control algorithm with time-varying delays is presented. The stability of the control algorithm is studied under the assumption that communication topologies are jointly-connected, and constraint condition of distributed containment control for delayed multi-agent systems is derived with the aid of Lyapunov–Krasovskii function. Simulation results are provided to prove the correctness and effectiveness of the conclusion.展开更多
基金The National Natural Science Foundation of China(No60673054)
文摘To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own security servers and service providers, and there are trust relationships between different security domains for identity federation. The security server is responsible for authentication and authorization inside the domain, and offers identity federation capability for different domains. The security assertion markup language (SAML) assertion is used as security token in the system for authentication, authorization, and identity federation. The design of the proposed single sign-on process is based on web service security framework and multiple security domains, and the authorization is always deployed in the local area inside the service provider' s security domain, which enables web service clients, both inside and outside their security domains, to access the services in a simple, scalable, standard and secure way.
基金Supported by National 863 Plan Project (2008AA10Z220 )Key Technological Task Project of Henan Agricultural Domain(082102140004)~~
文摘To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.
文摘The paper presents the development and performance of a kinematics control scheme for the AGV based on inductive guidance in transporting newsprint rolls. The required error is pre-computed using a kinematics model of the AGV taking into account the effect of various factors that contribute to improve tracking performance of the AGV. Simulation and experimental results illustrate that the kinematics model performs well and the results of various factors contribute to tracking performance of the AGV.
文摘The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
文摘Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presented. The subsystem is divided into three layers in its logic architecture: interactive monitor layer, collaborative control layer and real-time control layer. The safety problems and the related strategy are clarified by detailed analysis of each layer and relationship among the layers. So we can obtain a high performance MOMR teleoperation system with multi-layer safety architecture.
文摘Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the better rule for derivative line and the choice for termination. In hardware design, it presents three parts of driver’s peripheral circuit. In control software design, it presents a method of using 75176’s DE line to control the driver.
文摘In order to investigate the behavior of buildings and engineering structures during earthquakes, based on the data of seismic observation devices mounted on constructions with typical characteristics, results of investigating the change of mechanical properties of building structural system over time and the results of examination of structural rigidity and safety change over time, depending on the dynamic characteristics of the building, determined by experimental investigations made at intervals are mentioned in this article. In addition, evaluation of earthquake acceleration acting on structures due to earthquake-induced damage characteristics of buildings and engineering constructions which are made earthquake resistant is also included here.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61273152,61304052,51407088the Science Foundation of Education Office of Shandong Province of China under Grant Nos.ZR2011FM07,BS2015DX018
文摘Containment control of first-order multi-agent systems with uncertain topologies and communication timedelays is studied. Suppose system topologies are dynamically changed, a containment control algorithm with time-varying delays is presented. The stability of the control algorithm is studied under the assumption that communication topologies are jointly-connected, and constraint condition of distributed containment control for delayed multi-agent systems is derived with the aid of Lyapunov–Krasovskii function. Simulation results are provided to prove the correctness and effectiveness of the conclusion.