[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionna...[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction.展开更多
[Objective] Surveys of phytoplankton were taken during the autumn of 2009 along Anhui-Jiangsu reaches of the Yangtze River to understand the species com- position and their spatial distributions. [Method] Phytoplankto...[Objective] Surveys of phytoplankton were taken during the autumn of 2009 along Anhui-Jiangsu reaches of the Yangtze River to understand the species com- position and their spatial distributions. [Method] Phytoplankton species, their quanti- ties, biomass and the Mcnaughton's dominance indices were all measured and their spatial distribution characteristics were determined using cluster analysis. [Result] There were 27 species, belonging to 5 phyla, namely Chlorophyta, Bacillariophyta, Cyanophyta, Euglenophyta and Cryptophyta, of phytoplankton collected and identified from the surveys. Results showed that Bacillariophyta was the predominant phyto- plankton with 16 species collected which accounted for 59.3% of the total species identified. The number of species collected belonging to Chlorophyta, Cyanophyta, Cryptophyta and Euglenophyta were 6, 2, 2, and 1, accounting for 22.2%, 7.4%, 7.4% and 3.7% of the total number identified, respectively. At the species level, the predominant species were Fragilaria crotonensis, Melosira italica, Navicula crypto- cephala, Cyclotella striata and Chroomonas acuta. Phytoplankton abundance was ranging from 5.68×10^4 to 7.08×10^4 cells/L with its average of 6.01×10^4 cells/L. Phyto- plankton biomass was ranging from 30.43 to 34.73 μg/L with its average of 32.46 μg/L. Compared with the previous reports, the number of phytoplankton species was decreased but its abundance and biomass was increased along the Jiangsu reach of the Yangtze River. However, Bacillariophyta species were still the predominant species and the phytoplankton community structure had not significantly changed from the previous studies. [Conclusion] These results might be explained as that the water quality in the Yangtze River was deteriorated but had not come to the worst. The results of similarity analysis gave two clusters of phytoplankton community as Nanjing, Wuhu and Jiangyin sampling sites were clustered into one group and Tongling and Anqing were clustered into another group.展开更多
[Objective] To study the cocoon traits of wild silkworm descendants. [Method] In the selective breeding of domesticated raising wild silkworm and wild silkworm descendants, investigation on the traits of the built coc...[Objective] To study the cocoon traits of wild silkworm descendants. [Method] In the selective breeding of domesticated raising wild silkworm and wild silkworm descendants, investigation on the traits of the built cocoons was carried out. [Result] The pointed traits of cocoons displayed obviously in the wild silkworm descendants, its pointed parts were consistent with the rear part of silkworm chrysalis, and the female silkworm has slight difference, indicating the silkworm co- coon pointed trait was hereditary. [Conclusion] This study provided references for the study of silkworm cocoon traits of wild silkworm descendant and guides the selective breeding of silkworm variety.展开更多
To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own ...To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own security servers and service providers, and there are trust relationships between different security domains for identity federation. The security server is responsible for authentication and authorization inside the domain, and offers identity federation capability for different domains. The security assertion markup language (SAML) assertion is used as security token in the system for authentication, authorization, and identity federation. The design of the proposed single sign-on process is based on web service security framework and multiple security domains, and the authorization is always deployed in the local area inside the service provider' s security domain, which enables web service clients, both inside and outside their security domains, to access the services in a simple, scalable, standard and secure way.展开更多
The use of piezoelectric material sensors in smart composite structures is investigated. An experimental structure bonded with lead zirconate titanate piezoelectric ceramic(PZT) sensors is developed. These bonded sens...The use of piezoelectric material sensors in smart composite structures is investigated. An experimental structure bonded with lead zirconate titanate piezoelectric ceramic(PZT) sensors is developed. These bonded sensors are employed to monitor load variations and transient impacts in the structure. Incorporated with pattern recognition approach, PZT sensors have succeeded in detecting the onset and location of damages.展开更多
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t...To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.展开更多
In this work, the damage and penetration behavior of aluminum foam at various types of impact were examined through experiments. The impact energy of a striker was applied on the fixed aluminum foam having a thickness...In this work, the damage and penetration behavior of aluminum foam at various types of impact were examined through experiments. The impact energy of a striker was applied on the fixed aluminum foam having a thickness of 25 mm while increasing its impact by 2 J at each strike from 6 J to 16 J. The results show that the impact energies from 6 J to 12 J could not penetrate aluminum foam. However, the aluminum foam applied with the impact energy of 12 J incurred severe damages on its lower part. Finally, the aluminum foam applied with the impact energy of 14 J was penetrated. The striker having the impact energy of 6 J could penetrate aluminum foam around 10 mm. At this moment, aluminum foam could absorb the impact energy of around 9 J. When the impact energy of 14 J was applied on the aluminum foam, the aluminum foam was penetrated and it absorbed the impact energy of around 17.2 J. It is possible to create the safer structure against impact using the results of this work. The simulation results for the verification of the experimental results imply that the results for all the experiments in this work are reliable. It is possible to predict the structural safety of the aluminum foam for an impact if the impact behavior of aluminum foam performed in this work is utilized.展开更多
The transient pressures induced by trains passing through a tunnel and their impact on the structural safety of the tunnel lining were numerically analyzed.The results show that the pressure change increases rapidly a...The transient pressures induced by trains passing through a tunnel and their impact on the structural safety of the tunnel lining were numerically analyzed.The results show that the pressure change increases rapidly along the tunnel length,and the maximum value is observed at around 200 m from the entrance,while the maximum pressure amplitude is detected at 250 m from the entrance when two trains meeting in a double-track tunnel.The maximum peak pressure on the tunnel induced by a train passing through a 70 m^(2) single-track tunnel,100 m^(2) double-track tunnel and two trains meeting in the 100 m^(2) double-track tunnel at 350 km/h,are−4544 Pa,−3137 Pa and−5909 Pa,respectively.The aerodynamic pressure induced axial forces acting on the tunnel lining are only 8%,5%and 9%,respectively,of those generated by the earth pressure.It seems that the aerodynamic loads exert little underlying influence on the static strength safety of the tunnel lining providing that the existing cracks and defects are not considered.展开更多
A section of the Nanliang high speed railway tunnel on Shijiazhuang-Taiyuan high-speed passenger railway line in China was instrumented and studied for its mechanical properties and performances. The cross section for...A section of the Nanliang high speed railway tunnel on Shijiazhuang-Taiyuan high-speed passenger railway line in China was instrumented and studied for its mechanical properties and performances. The cross section for the tunnel was300 m2and is classified as the largest cross section for railway tunnels in China. Through in situ experimental studies, mechanistic properties of the tunnel were identified, including the surrounding rock pressure, convergences along tunnel perimeter and safety of primary support and lining structure.Based on the field measured data, the surrounding rock pressure demand for large-span deep tunnel in hard rock is recommended as double peak type in the vertical direction and fold line type was recommended for horizontal pressure. The results suggested that Promojiyfakonov's theory was most close to the monitored value. Specific recommendations were also generated for the use of bolts in tunnel structures.Numerical simulation was used to evaluate the safety of the tunnel and it confirmed that the current design can satisfy the requirement of the current code.展开更多
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect...Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
To perform structure buckling and reliability analysis on supercavitating vehicles with high velocity in the submarine,supercavitating vehicles were simplified as variable cross section beam firstly.Then structural bu...To perform structure buckling and reliability analysis on supercavitating vehicles with high velocity in the submarine,supercavitating vehicles were simplified as variable cross section beam firstly.Then structural buckling analysis of supercavitating vehicles with or without engine thrust was conducted,and the structural buckling safety margin equation of supercavitating vehicles was established.The indefinite information was described by interval set and the structure reliability analysis was performed by using non-probabilistic reliability method.Considering interval variables as random variables which satisfy uniform distribution,the Monte-Carlo method was used to calculate the non-probabilistic failure degree.Numerical examples of supercavitating vehicles were presented.Under different ratios of base diameter to cavitator diameter,the change tendency of non-probabilistic failure degree of structural buckling of supercavitating vehicles with or without engine thrust was studied along with the variety of speed.展开更多
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches ab...Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT.展开更多
In mountainous areas, geological disasters carrying large boulders can cause severe damage to the widely used masonry buildings due to the high impact forces. To better understand the damage of brick masonry buildings...In mountainous areas, geological disasters carrying large boulders can cause severe damage to the widely used masonry buildings due to the high impact forces. To better understand the damage of brick masonry buildings under the impact of boulders, a "block-joint" model is developed using threedimensional discontinuous deformation analysis(3-D DDA) to simulate the behaviour of the "brick-mortar" structure. The "block-joint" model is used to capture not only the large displacement and deformation of individual bricks but also the large-scale sliding and opening along the mortar between the bricks. The linear elastic constitutive model is applied to account for the non-plastic deformation behaviour of brick materials. Furthermore, the mechanical characteristics of the mortar are represented using the Mohr-Coulomb and Drucker-Prager criteria. To propose safe structural design schemes and effective reinforcement for brick masonry buildings, seven construction techniques are considered, includingdifferent grades of brick and mortar, effective shear areas and reinforced members. The proposed 3-D DDA model is used to analyse the velocity distribution and the key point displacements of the brick masonry building under the impact of boulders. The results show that upgrading the brick and mortar, increasing the wall thickness, making full use of the wall thickness, and adding a circular beam and structural column are very effective approaches for improving the impact resistance of brick masonry buildings.展开更多
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica...Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.展开更多
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing...Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.展开更多
The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigiou...The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigious National Basic Research Program (also called the "973 program") of China, was launched in May 2007. This project adopts a clean-slate approach and aims to design a novel future Internet that not only inherits the merit of the Internet today but also overcomes the drawbacks of the current Internet. In this paper, we make an overview of this project with a focus on its objectives, basic ideas, and progresses. Although this is a basic research project, its success will bring significant benefits to China as well as all other countries in the world.展开更多
基金Supported by National Social and Science Foundation of China(13XSH017)Humanities and Social Sciences Research Foundation of the Ministry of Education(10YJAZH041)Social Science Foundation of Shaanxi(12D271)~~
文摘[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction.
基金Supported by Fishery Germplasm Conservation Project of the Ministry of Agriculture(MOA)(No.6115048)State Specific Project on Fundamental Scientific Research Financed to Public Institutes(No.2009JBFB10)~~
文摘[Objective] Surveys of phytoplankton were taken during the autumn of 2009 along Anhui-Jiangsu reaches of the Yangtze River to understand the species com- position and their spatial distributions. [Method] Phytoplankton species, their quanti- ties, biomass and the Mcnaughton's dominance indices were all measured and their spatial distribution characteristics were determined using cluster analysis. [Result] There were 27 species, belonging to 5 phyla, namely Chlorophyta, Bacillariophyta, Cyanophyta, Euglenophyta and Cryptophyta, of phytoplankton collected and identified from the surveys. Results showed that Bacillariophyta was the predominant phyto- plankton with 16 species collected which accounted for 59.3% of the total species identified. The number of species collected belonging to Chlorophyta, Cyanophyta, Cryptophyta and Euglenophyta were 6, 2, 2, and 1, accounting for 22.2%, 7.4%, 7.4% and 3.7% of the total number identified, respectively. At the species level, the predominant species were Fragilaria crotonensis, Melosira italica, Navicula crypto- cephala, Cyclotella striata and Chroomonas acuta. Phytoplankton abundance was ranging from 5.68×10^4 to 7.08×10^4 cells/L with its average of 6.01×10^4 cells/L. Phyto- plankton biomass was ranging from 30.43 to 34.73 μg/L with its average of 32.46 μg/L. Compared with the previous reports, the number of phytoplankton species was decreased but its abundance and biomass was increased along the Jiangsu reach of the Yangtze River. However, Bacillariophyta species were still the predominant species and the phytoplankton community structure had not significantly changed from the previous studies. [Conclusion] These results might be explained as that the water quality in the Yangtze River was deteriorated but had not come to the worst. The results of similarity analysis gave two clusters of phytoplankton community as Nanjing, Wuhu and Jiangyin sampling sites were clustered into one group and Tongling and Anqing were clustered into another group.
基金Supported by the Agricultural Fund Project of Ministry of Science and Technology(Y0415)the China Agriculture Research System(Sericulture)~~
文摘[Objective] To study the cocoon traits of wild silkworm descendants. [Method] In the selective breeding of domesticated raising wild silkworm and wild silkworm descendants, investigation on the traits of the built cocoons was carried out. [Result] The pointed traits of cocoons displayed obviously in the wild silkworm descendants, its pointed parts were consistent with the rear part of silkworm chrysalis, and the female silkworm has slight difference, indicating the silkworm co- coon pointed trait was hereditary. [Conclusion] This study provided references for the study of silkworm cocoon traits of wild silkworm descendant and guides the selective breeding of silkworm variety.
基金The National Natural Science Foundation of China(No60673054)
文摘To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own security servers and service providers, and there are trust relationships between different security domains for identity federation. The security server is responsible for authentication and authorization inside the domain, and offers identity federation capability for different domains. The security assertion markup language (SAML) assertion is used as security token in the system for authentication, authorization, and identity federation. The design of the proposed single sign-on process is based on web service security framework and multiple security domains, and the authorization is always deployed in the local area inside the service provider' s security domain, which enables web service clients, both inside and outside their security domains, to access the services in a simple, scalable, standard and secure way.
文摘The use of piezoelectric material sensors in smart composite structures is investigated. An experimental structure bonded with lead zirconate titanate piezoelectric ceramic(PZT) sensors is developed. These bonded sensors are employed to monitor load variations and transient impacts in the structure. Incorporated with pattern recognition approach, PZT sensors have succeeded in detecting the onset and location of damages.
基金Supported by National 863 Plan Project (2008AA10Z220 )Key Technological Task Project of Henan Agricultural Domain(082102140004)~~
文摘To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.
基金Project(2011-0006548)supported by the Basic Research Program through the National Research Foundation of Korea
文摘In this work, the damage and penetration behavior of aluminum foam at various types of impact were examined through experiments. The impact energy of a striker was applied on the fixed aluminum foam having a thickness of 25 mm while increasing its impact by 2 J at each strike from 6 J to 16 J. The results show that the impact energies from 6 J to 12 J could not penetrate aluminum foam. However, the aluminum foam applied with the impact energy of 12 J incurred severe damages on its lower part. Finally, the aluminum foam applied with the impact energy of 14 J was penetrated. The striker having the impact energy of 6 J could penetrate aluminum foam around 10 mm. At this moment, aluminum foam could absorb the impact energy of around 9 J. When the impact energy of 14 J was applied on the aluminum foam, the aluminum foam was penetrated and it absorbed the impact energy of around 17.2 J. It is possible to create the safer structure against impact using the results of this work. The simulation results for the verification of the experimental results imply that the results for all the experiments in this work are reliable. It is possible to predict the structural safety of the aluminum foam for an impact if the impact behavior of aluminum foam performed in this work is utilized.
基金Project(51975591)supported by the National Natural Science Foundation of ChinaProject(P2018J003)supported by the Technology Research and Development Program of China Railway。
文摘The transient pressures induced by trains passing through a tunnel and their impact on the structural safety of the tunnel lining were numerically analyzed.The results show that the pressure change increases rapidly along the tunnel length,and the maximum value is observed at around 200 m from the entrance,while the maximum pressure amplitude is detected at 250 m from the entrance when two trains meeting in a double-track tunnel.The maximum peak pressure on the tunnel induced by a train passing through a 70 m^(2) single-track tunnel,100 m^(2) double-track tunnel and two trains meeting in the 100 m^(2) double-track tunnel at 350 km/h,are−4544 Pa,−3137 Pa and−5909 Pa,respectively.The aerodynamic pressure induced axial forces acting on the tunnel lining are only 8%,5%and 9%,respectively,of those generated by the earth pressure.It seems that the aerodynamic loads exert little underlying influence on the static strength safety of the tunnel lining providing that the existing cracks and defects are not considered.
基金sponsored by projects (Grant Nos. 50978172, 51078318) of the National Natural Science Foundation of ChinaProject (Grant No. 10-0667) supposed by the New Century Excellent Talents in University
文摘A section of the Nanliang high speed railway tunnel on Shijiazhuang-Taiyuan high-speed passenger railway line in China was instrumented and studied for its mechanical properties and performances. The cross section for the tunnel was300 m2and is classified as the largest cross section for railway tunnels in China. Through in situ experimental studies, mechanistic properties of the tunnel were identified, including the surrounding rock pressure, convergences along tunnel perimeter and safety of primary support and lining structure.Based on the field measured data, the surrounding rock pressure demand for large-span deep tunnel in hard rock is recommended as double peak type in the vertical direction and fold line type was recommended for horizontal pressure. The results suggested that Promojiyfakonov's theory was most close to the monitored value. Specific recommendations were also generated for the use of bolts in tunnel structures.Numerical simulation was used to evaluate the safety of the tunnel and it confirmed that the current design can satisfy the requirement of the current code.
基金the National Natural Science Foundation of China
文摘Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
基金Sponsored by the National High-Tech Research and Development Program of China(863 Program)(Grant No. 2006AA04Z410)
文摘To perform structure buckling and reliability analysis on supercavitating vehicles with high velocity in the submarine,supercavitating vehicles were simplified as variable cross section beam firstly.Then structural buckling analysis of supercavitating vehicles with or without engine thrust was conducted,and the structural buckling safety margin equation of supercavitating vehicles was established.The indefinite information was described by interval set and the structure reliability analysis was performed by using non-probabilistic reliability method.Considering interval variables as random variables which satisfy uniform distribution,the Monte-Carlo method was used to calculate the non-probabilistic failure degree.Numerical examples of supercavitating vehicles were presented.Under different ratios of base diameter to cavitator diameter,the change tendency of non-probabilistic failure degree of structural buckling of supercavitating vehicles with or without engine thrust was studied along with the variety of speed.
文摘Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT.
基金sponsored by the National Science & Technology Pillar Programme of the Ministry of Science and Technology of China (Grant No. 2014BAL05B01)National Natural Science Foundation of China (Grant No. 51708420)+3 种基金Shanghai Pujiang Program (Grant No. 17PJ1409100)Natural Science Foundation of Shanghai (Grant No. 17ZR1432300)the Fundamental Research Funds for the Central Universities (Grant No. 2016KJ024)the Shanghai Peak Discipline Program for Higher Education Institutions (Class I)-Civil Engineering
文摘In mountainous areas, geological disasters carrying large boulders can cause severe damage to the widely used masonry buildings due to the high impact forces. To better understand the damage of brick masonry buildings under the impact of boulders, a "block-joint" model is developed using threedimensional discontinuous deformation analysis(3-D DDA) to simulate the behaviour of the "brick-mortar" structure. The "block-joint" model is used to capture not only the large displacement and deformation of individual bricks but also the large-scale sliding and opening along the mortar between the bricks. The linear elastic constitutive model is applied to account for the non-plastic deformation behaviour of brick materials. Furthermore, the mechanical characteristics of the mortar are represented using the Mohr-Coulomb and Drucker-Prager criteria. To propose safe structural design schemes and effective reinforcement for brick masonry buildings, seven construction techniques are considered, includingdifferent grades of brick and mortar, effective shear areas and reinforced members. The proposed 3-D DDA model is used to analyse the velocity distribution and the key point displacements of the brick masonry building under the impact of boulders. The results show that upgrading the brick and mortar, increasing the wall thickness, making full use of the wall thickness, and adding a circular beam and structural column are very effective approaches for improving the impact resistance of brick masonry buildings.
基金supported by National Natural Science Foundation of China (No. 61572267, No. 61272425, No. 61402245)the Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University+1 种基金the Open Project of the State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(No.2017-MS-21, No.2016-MS-23)National Cryptography Development Fund of China (MMJJ20170118)
文摘Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.
文摘Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.
基金The research of this work is supported in part by the National Basic Research Program ("973 program") of China under grant no. 2007CB307100in part by the "111 Program" of China under contract No. B08002
文摘The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigious National Basic Research Program (also called the "973 program") of China, was launched in May 2007. This project adopts a clean-slate approach and aims to design a novel future Internet that not only inherits the merit of the Internet today but also overcomes the drawbacks of the current Internet. In this paper, we make an overview of this project with a focus on its objectives, basic ideas, and progresses. Although this is a basic research project, its success will bring significant benefits to China as well as all other countries in the world.