In this paper, the conservation laws of generalized Birkhoff system in event space are studied by using the method of integrating factors. Firstly, the generalized Pfaff-Birkhoff principle and the generalized Birkhoff...In this paper, the conservation laws of generalized Birkhoff system in event space are studied by using the method of integrating factors. Firstly, the generalized Pfaff-Birkhoff principle and the generalized Birkhoff equations are established, and the definition of the integrating factors for the system is given. Secondly, based on the concept of integrating factors, the conservation theorems and their inverse for the generalized Birkhoff system in the event space are presented in detail, and the relation between the conservation laws and the integrating factors of the system is obtained and the generalized Killing equations for the determination of the integrating factors are given. Finally, an example is given to illustrate the application of the results.展开更多
To calculate the deviations between single station magnitudes and average ones by the magnitude residual statistical method,the paper selects 13086 seismic events recorded by the Gansu broadband digital seismic networ...To calculate the deviations between single station magnitudes and average ones by the magnitude residual statistical method,the paper selects 13086 seismic events recorded by the Gansu broadband digital seismic network from January 2009 to December 2012. The frequency distribution and quantitative statistics of the deviations of earthquake magnitude are analyzed. The MLcalibration function is modified and a uniform local magnitude system characteristic of the Gansu region,is obtained.展开更多
In order to overcome the limitations of traditional methods in uncertainty analysis, a modified Bayesian network(BN), which is called evidence network(EN), was proposed with evidence theory to handle epistemic uncerta...In order to overcome the limitations of traditional methods in uncertainty analysis, a modified Bayesian network(BN), which is called evidence network(EN), was proposed with evidence theory to handle epistemic uncertainty in probabilistic risk assessment(PRA). Fault trees(FTs) and event trees(ETs) were transformed into an EN which is used as a uniform framework to represent accident scenarios. Epistemic uncertainties of basic events in PRA were presented in evidence theory form and propagated through the network. A case study of a highway tunnel risk analysis was discussed to demonstrate the proposed approach. Frequencies of end states are obtained and expressed by belief and plausibility measures. The proposed approach addresses the uncertainties in experts' knowledge and can be easily applied to uncertainty analysis of FTs/ETs that have dependent events.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
The socio-historical analysis of "Chinese Modernity" and "Chinese Cultural Identity" within the context of social transformation, by restoring the origin of modernity as a "historical event" since late Qing, lea...The socio-historical analysis of "Chinese Modernity" and "Chinese Cultural Identity" within the context of social transformation, by restoring the origin of modernity as a "historical event" since late Qing, leads to the finding that "the Deng Zheng-lai Problem" pinpoints the current crisis of cultural identity and the loss of Orthodoxy(daotong) which infects contemporary China. It is necessary to build and shape the mode of cultural identity in response to the pressure of rightness, creating "the identity of hybridity" by negotiating the classic tradition with the socialist tradition and a partial western tradition. By observing "the Deng- Hui frameworks" (the frameworks formulated by Deng Zheng-lai, Wang Hui, Deng Xiao-mang and Qin Hui), we should neither blindly return to the classic tradition nor uncritically resort to the Western resources in our attempt at rebuilding cultural identity; instead, one mode of a "New Civilization" might arise in the sense of what Liang Qi-chao regards as cutting across both China and the West.展开更多
In this paper, we study some results of extended timed event graph (ETEG)by using graph theory's methods in the dioid framework. A necessary and sufficient con-dition for the observability of ETEG is obtained and ...In this paper, we study some results of extended timed event graph (ETEG)by using graph theory's methods in the dioid framework. A necessary and sufficient con-dition for the observability of ETEG is obtained and ETEG's standard structure is alsoestablished.展开更多
基金supported by National Natural Science Foundation of China under Grant No. 10572021
文摘In this paper, the conservation laws of generalized Birkhoff system in event space are studied by using the method of integrating factors. Firstly, the generalized Pfaff-Birkhoff principle and the generalized Birkhoff equations are established, and the definition of the integrating factors for the system is given. Secondly, based on the concept of integrating factors, the conservation theorems and their inverse for the generalized Birkhoff system in the event space are presented in detail, and the relation between the conservation laws and the integrating factors of the system is obtained and the generalized Killing equations for the determination of the integrating factors are given. Finally, an example is given to illustrate the application of the results.
基金supported by the China National Special Fund for Earthquake Scientific Research in Public Interests(201308009)
文摘To calculate the deviations between single station magnitudes and average ones by the magnitude residual statistical method,the paper selects 13086 seismic events recorded by the Gansu broadband digital seismic network from January 2009 to December 2012. The frequency distribution and quantitative statistics of the deviations of earthquake magnitude are analyzed. The MLcalibration function is modified and a uniform local magnitude system characteristic of the Gansu region,is obtained.
基金Project(71201170)supported by the National Natural Science Foundation of China
文摘In order to overcome the limitations of traditional methods in uncertainty analysis, a modified Bayesian network(BN), which is called evidence network(EN), was proposed with evidence theory to handle epistemic uncertainty in probabilistic risk assessment(PRA). Fault trees(FTs) and event trees(ETs) were transformed into an EN which is used as a uniform framework to represent accident scenarios. Epistemic uncertainties of basic events in PRA were presented in evidence theory form and propagated through the network. A case study of a highway tunnel risk analysis was discussed to demonstrate the proposed approach. Frequencies of end states are obtained and expressed by belief and plausibility measures. The proposed approach addresses the uncertainties in experts' knowledge and can be easily applied to uncertainty analysis of FTs/ETs that have dependent events.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
文摘The socio-historical analysis of "Chinese Modernity" and "Chinese Cultural Identity" within the context of social transformation, by restoring the origin of modernity as a "historical event" since late Qing, leads to the finding that "the Deng Zheng-lai Problem" pinpoints the current crisis of cultural identity and the loss of Orthodoxy(daotong) which infects contemporary China. It is necessary to build and shape the mode of cultural identity in response to the pressure of rightness, creating "the identity of hybridity" by negotiating the classic tradition with the socialist tradition and a partial western tradition. By observing "the Deng- Hui frameworks" (the frameworks formulated by Deng Zheng-lai, Wang Hui, Deng Xiao-mang and Qin Hui), we should neither blindly return to the classic tradition nor uncritically resort to the Western resources in our attempt at rebuilding cultural identity; instead, one mode of a "New Civilization" might arise in the sense of what Liang Qi-chao regards as cutting across both China and the West.
文摘In this paper, we study some results of extended timed event graph (ETEG)by using graph theory's methods in the dioid framework. A necessary and sufficient con-dition for the observability of ETEG is obtained and ETEG's standard structure is alsoestablished.