In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
An improved model predictive control algorithm is proposed for Hammerstein-Wiener nonlinear systems.The proposed synthesis algorithm contains two parts:offline design the polytopic invariant sets,and online solve the ...An improved model predictive control algorithm is proposed for Hammerstein-Wiener nonlinear systems.The proposed synthesis algorithm contains two parts:offline design the polytopic invariant sets,and online solve the min-max optimization problem.The polytopic invariant set is adopted to replace the traditional ellipsoid invariant set.And the parameter-correlation nonlinear control law is designed to replace the traditional linear control law.Consequently,the terminal region is enlarged and the control effect is improved.Simulation and experiment are used to verify the validity of the wind tunnel flow field control algorithm.展开更多
Network calculus provides new tools for performance analysis of networks, but analyzing networks with complex topologies is a challenging research issue using statistical network calculus. A service model is proposed ...Network calculus provides new tools for performance analysis of networks, but analyzing networks with complex topologies is a challenging research issue using statistical network calculus. A service model is proposed to characterize a service process of network with complex topologies. To obtain closed-form expression of statistical end-to-end performance bounds for a wide range of traffic source models, the traffic model and service model are expanded according to error function. Based on the proposed models, the explicit end-to-end delay bound of Fractional Brownian Motion(FBM) traffic is derived, the factors that affect the delay bound are analyzed, and a comparison between theoretical and simulation results is performed. The results illustrate that the proposed models not only fit the network behaviors well, but also facilitate the network performance analysis.展开更多
Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world expe...Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world experience is generally available and can be turned into valuable experimental data.Every pillar that is developed, or stope that is mined, represents a full-scale test of a rock mechanics design. By harvesting these data, and then using the appropriate statistical techniques to interpret them,mining engineers have developed powerful design techniques that are widely used around the world.Successful empirical methods are readily accepted because they are simple, transparent, practical, and firmly tethered to reality. The author has been intimately associated with empirical design for his entire career, but his previous publications have described the application of individual techniques to specific problems. The focus of this paper is the process used to develop a successful empirical method. A sixstage process is described: identification of the problem, and of the end users of the final product; development of a conceptual rock mechanics model, and identification of the key parameters in that model;identification of measures for each of the key parameters, and the development of new measures(such as rating scales) where necessary; data sources and data collection; statistical analysis; and packaging of the final product. Each of these stages has its own potential rewards and pitfalls, which will be illustrated by incidents from the author's own experience. The ultimate goal of this paper is to provide a new and deeper appreciation for empirical techniques, as well as some guidelines and opportunities for future developers.展开更多
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina...In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead.展开更多
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec...With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.展开更多
A supply chain is a network that performs the procurement of raw material, the transportation of raw material to intermediate and end products, and the distribution of end products to retailers or customers. Installat...A supply chain is a network that performs the procurement of raw material, the transportation of raw material to intermediate and end products, and the distribution of end products to retailers or customers. Installation and operation of distribution centers and all downstream members play a vital role in fulfilling the customers demand and have a great impact for supply chain management performance. In this paper we address a new approach for solving a supply chain optimization model to decide distribution centers based on environmental consideration.展开更多
The throughput capacity of a container terminal is very important in planning and designing at container terminals.The existing methods estimated the throughput capacity without considering its change resulting from t...The throughput capacity of a container terminal is very important in planning and designing at container terminals.The existing methods estimated the throughput capacity without considering its change resulting from the different combination patterns of the types of arriving vessels.A simulation model is established to estimate the throughput capacities of a container terminal under different combination patterns of the types of arriving vessels.It shows that the throughput capacity of a container terminal is influenced by the utilization rates of the berth and quay cranes which result from the different combination patterns of the types of the arriving vessels.It provides a practical approach to estimate the throughput capacity of a container terminal considering the types of the vessels,and it is also helpful for the decision makers to raise the throughputs of the container terminals by optimizing the combination patterns of the types of arriving vessels.展开更多
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
基金Project(61074074)supported by the National Natural Science Foundation,ChinaProject(KT2012C01J0401)supported by the Group Innovation Fund,China
文摘An improved model predictive control algorithm is proposed for Hammerstein-Wiener nonlinear systems.The proposed synthesis algorithm contains two parts:offline design the polytopic invariant sets,and online solve the min-max optimization problem.The polytopic invariant set is adopted to replace the traditional ellipsoid invariant set.And the parameter-correlation nonlinear control law is designed to replace the traditional linear control law.Consequently,the terminal region is enlarged and the control effect is improved.Simulation and experiment are used to verify the validity of the wind tunnel flow field control algorithm.
基金Supported by the National Natural Science Foundation Major Research Plan of China (No. 90718003), the National Natural Science Foundation of China (No. 60973027), and the National High Technology Research and Development Program of China (No. 2007AA01Z401 ).
文摘Network calculus provides new tools for performance analysis of networks, but analyzing networks with complex topologies is a challenging research issue using statistical network calculus. A service model is proposed to characterize a service process of network with complex topologies. To obtain closed-form expression of statistical end-to-end performance bounds for a wide range of traffic source models, the traffic model and service model are expanded according to error function. Based on the proposed models, the explicit end-to-end delay bound of Fractional Brownian Motion(FBM) traffic is derived, the factors that affect the delay bound are analyzed, and a comparison between theoretical and simulation results is performed. The results illustrate that the proposed models not only fit the network behaviors well, but also facilitate the network performance analysis.
文摘Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world experience is generally available and can be turned into valuable experimental data.Every pillar that is developed, or stope that is mined, represents a full-scale test of a rock mechanics design. By harvesting these data, and then using the appropriate statistical techniques to interpret them,mining engineers have developed powerful design techniques that are widely used around the world.Successful empirical methods are readily accepted because they are simple, transparent, practical, and firmly tethered to reality. The author has been intimately associated with empirical design for his entire career, but his previous publications have described the application of individual techniques to specific problems. The focus of this paper is the process used to develop a successful empirical method. A sixstage process is described: identification of the problem, and of the end users of the final product; development of a conceptual rock mechanics model, and identification of the key parameters in that model;identification of measures for each of the key parameters, and the development of new measures(such as rating scales) where necessary; data sources and data collection; statistical analysis; and packaging of the final product. Each of these stages has its own potential rewards and pitfalls, which will be illustrated by incidents from the author's own experience. The ultimate goal of this paper is to provide a new and deeper appreciation for empirical techniques, as well as some guidelines and opportunities for future developers.
基金Project(61005008) supported by the National Natural Science Foundation of ChinaProject(JI300D004) supported by the COSTIND Application Foundation of China
文摘In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead.
基金supported by China Fundamental Research Funds for the Central University under Grant No.BUPT 2009RC1022
文摘With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.
文摘A supply chain is a network that performs the procurement of raw material, the transportation of raw material to intermediate and end products, and the distribution of end products to retailers or customers. Installation and operation of distribution centers and all downstream members play a vital role in fulfilling the customers demand and have a great impact for supply chain management performance. In this paper we address a new approach for solving a supply chain optimization model to decide distribution centers based on environmental consideration.
基金the Innovation Action Project from Science and Technology Commission of Shanghai Municipality (No. 08170511300)
文摘The throughput capacity of a container terminal is very important in planning and designing at container terminals.The existing methods estimated the throughput capacity without considering its change resulting from the different combination patterns of the types of arriving vessels.A simulation model is established to estimate the throughput capacities of a container terminal under different combination patterns of the types of arriving vessels.It shows that the throughput capacity of a container terminal is influenced by the utilization rates of the berth and quay cranes which result from the different combination patterns of the types of the arriving vessels.It provides a practical approach to estimate the throughput capacity of a container terminal considering the types of the vessels,and it is also helpful for the decision makers to raise the throughputs of the container terminals by optimizing the combination patterns of the types of arriving vessels.