The basic element in any sustainable dam project is safety, which includes the following safety elements: O structural safety, dam safety monitoring, operational safety and maintenance, and emergency planning. Lon...The basic element in any sustainable dam project is safety, which includes the following safety elements: O structural safety, dam safety monitoring, operational safety and maintenance, and emergency planning. Long-term safety primarily includes the analysis of all hazards affecting the project; that is, hazards from the natural environment, hazards from the man-made environment, and project-specific and site-specific hazards. The special features of the seismic safety of dams are discussed. Large dams were the first structures to be systematically designed against earthquakes, starting in the 1930s. How- ever, the seismic safety of older dams is unknown, as most were designed using seismic design criteria and methods of dynamic analysis that are considered obsolete today. Therefore, we need to reevaluate the seismic safety of existing dams based on current state-of-the-art practices and rehabilitate deficient dams. For large dams, a site-specific seismic hazard analysis is usually recommended. Today, large dams and the safety-relevant elements used for controlling the reservoir after a strong earthquake must be able to withstand the ground motions of a safety evaluation earthquake. The ground motion parameters can be determined either by a probabilistic or a deterministic seismic hazard analysis. During strong earthquakes, inelastic deformations may occur in a dam; therefore, the seismic analysis has to be car- ried out in the time domain. Furthermore, earthquakes create multiple seismic hazards for dams such as ground shaking, fault movements, mass movements, and others. The ground motions needed by the dam engineer are not real earthquake ground motions but models of the ground motion, which allow the safe design of dams. It must also be kept in mind that darn safety evaluations must be carried out several times during the long life of large storage dams. These features are discussed in this paper.展开更多
Some super high arch dams ( SHADs), like Xiluodu Arch Dam, after their heights reaching the magnitude of 300 m, confront lots of technical challenges in design and construction. Several crucial technologies of 6 SHA...Some super high arch dams ( SHADs), like Xiluodu Arch Dam, after their heights reaching the magnitude of 300 m, confront lots of technical challenges in design and construction. Several crucial technologies of 6 SHADs will be reviewed and discussed in this and consecutive papers, including Xiluodu, Jinping I in China, Baktiary in Iran, ete. , on the topics of the research method, criterion for evaluation and engineering application of dam safety analysis and evaluation, reasonable dam base interface, dam shape optimization, comprehensive treatments of complex foundation, anti-seismic engineering, dam construction material, concrete placement and temperature control, instrumentation and monitoring of dam operation, etc. This paper will mainly focus on the overall safety of SHADs, reasonable dam base interface analysis and evaluation and their engineering application.展开更多
In this thesis, the design in construction management is defined as the design meets the requirements of the constructor. There are a range of definitions of design, but in this paper "design" refers to something, w...In this thesis, the design in construction management is defined as the design meets the requirements of the constructor. There are a range of definitions of design, but in this paper "design" refers to something, which has been planned and made and a pattern for decorating in something in the term of construction. Rumane says (2010)the design involves two processes. The first thing is analyzing and designing components and structure on the basis of recognized codes and standards of safety. The other is that designers conduct the information in the form展开更多
One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begu...One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begun to be designed and implemented based on digital technology with online and real time performance to achieve high speed and high density operation. The software is designed, coded and implemented into the system, and controls hardware components in order to satisfy the functional requirements of the system. As the functions that are implemented by software are increased, it becomes very difficult to predict the soil-ware failures because of its complexity. Therefore, it has become one of the key issues how to assure that the sottware is reliable, safe and secure. In this paper, the safety criteria are suggested to secure the software safety for the field of railway system. Characteristic of railway software and review safety related standards are analyzed. The authors also suggest development methodology and certification procedure for the developer and assessor to easily make safety critical railway software with following the safety criteria.展开更多
This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Adv...This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out.展开更多
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw...In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4 × 4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great performance in both hardware and software environment, which provides enough flexibility for different application scenario. The following are3 main advantages of RECTANGLE. First, RECTANGLE is extremely hardware-friendly. For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at100 k Hz clock and an energy efficiency of 3.0 p J/bit. Second, RECTANGLE achieves a very competitive software speed among the existing lightweight block ciphers due to its bit-slice style. Using 128-bit SSE instructions,a bit-slice implementation of RECTANGLE reaches an average encryption speed of about 3.9 cycles/byte for messages around 3000 bytes. Last but not least, we propose new design criteria for the RECTANGLE S-box.Due to our careful selection of the S-box and the asymmetric design of the permutation layer, RECTANGLE achieves a very good security-performance tradeoff. Our extensive and deep security analysis shows that the highest number of rounds that we can attack, is 18(out of 25).展开更多
This paper discusses the methods of establishing risk criteria for dams and reviews the application of dam risk criteria for individuals and societies in different countries or districts. Given the conditions in China...This paper discusses the methods of establishing risk criteria for dams and reviews the application of dam risk criteria for individuals and societies in different countries or districts. Given the conditions in China and considering the public safety and acceptance of dam risk, historical dam break data and current design standards, individual and societal risk criteria for dams are proposed. The tolerable dam risk criteria for individuals should be set to 10-5-10-7 per annum based on project scale, for ex- ample, approximately 1.0xl0 7 per annum, which corresponds to a reliability index of 4.2 based on a 100-year lifespan for a first-class or large project. The societal limit for risk tolerance for dams should be set to approximately 10-3-10-5 per annum, corresponding to the fatality range from 1 to 100 and be horizontally extended to 1000, and F-N curves are proposed. It was also found that the reliability indices of Chinese Standard (GB 50199-2013) and Eurocodel (2002) are different, but they have the same level of safety measured by the annual probability of failure. The research results have significance for establishing dam risk criteria.展开更多
In recent years, it has been demonstrated that checklists can improve patient safety significantly. To facilitate the effective use of checklists in daily practice, both the medical community and the informatics commu...In recent years, it has been demonstrated that checklists can improve patient safety significantly. To facilitate the effective use of checklists in daily practice, both the medical community and the informatics community propose to implement checklists in dynamic checklist applications that can be integrated into the clinical workflow and that is specific to the patient context. However, it is difficult to develop such applications because they are tightly intertwined with the content of specific checklists. We propose a platform that enables access to dynamic checklist applications by configuring the infrastructures provided in the platform. Then, the applications can be developed without time-consuming programming work. We define a number of design criteria regarding point of care and clinical processes by analyzing the existing checklist applications and the lessons learned from implementations.Then, by applying rule-based clinical decision support and workflow management technologies, we design technical mechanisms to satisfy the design criteria. A dynamic checklist application platform is designed based on these mechanisms. Finally, we build a platform in various design cycle iterations, driven by multiple clinical cases. By applying the platform, we develop nine comprehensive dynamic checklist applications with 242 dynamic checklists.The results demonstrate both the feasibility and the overall generic nature of the proposed approach. We propose a novel platform for configuring dynamic checklist applications. This platform satisfies the general requirements and can be easily configured to satisfy different scenarios in which safety checklists are used.展开更多
文摘The basic element in any sustainable dam project is safety, which includes the following safety elements: O structural safety, dam safety monitoring, operational safety and maintenance, and emergency planning. Long-term safety primarily includes the analysis of all hazards affecting the project; that is, hazards from the natural environment, hazards from the man-made environment, and project-specific and site-specific hazards. The special features of the seismic safety of dams are discussed. Large dams were the first structures to be systematically designed against earthquakes, starting in the 1930s. How- ever, the seismic safety of older dams is unknown, as most were designed using seismic design criteria and methods of dynamic analysis that are considered obsolete today. Therefore, we need to reevaluate the seismic safety of existing dams based on current state-of-the-art practices and rehabilitate deficient dams. For large dams, a site-specific seismic hazard analysis is usually recommended. Today, large dams and the safety-relevant elements used for controlling the reservoir after a strong earthquake must be able to withstand the ground motions of a safety evaluation earthquake. The ground motion parameters can be determined either by a probabilistic or a deterministic seismic hazard analysis. During strong earthquakes, inelastic deformations may occur in a dam; therefore, the seismic analysis has to be car- ried out in the time domain. Furthermore, earthquakes create multiple seismic hazards for dams such as ground shaking, fault movements, mass movements, and others. The ground motions needed by the dam engineer are not real earthquake ground motions but models of the ground motion, which allow the safe design of dams. It must also be kept in mind that darn safety evaluations must be carried out several times during the long life of large storage dams. These features are discussed in this paper.
文摘Some super high arch dams ( SHADs), like Xiluodu Arch Dam, after their heights reaching the magnitude of 300 m, confront lots of technical challenges in design and construction. Several crucial technologies of 6 SHADs will be reviewed and discussed in this and consecutive papers, including Xiluodu, Jinping I in China, Baktiary in Iran, ete. , on the topics of the research method, criterion for evaluation and engineering application of dam safety analysis and evaluation, reasonable dam base interface, dam shape optimization, comprehensive treatments of complex foundation, anti-seismic engineering, dam construction material, concrete placement and temperature control, instrumentation and monitoring of dam operation, etc. This paper will mainly focus on the overall safety of SHADs, reasonable dam base interface analysis and evaluation and their engineering application.
文摘In this thesis, the design in construction management is defined as the design meets the requirements of the constructor. There are a range of definitions of design, but in this paper "design" refers to something, which has been planned and made and a pattern for decorating in something in the term of construction. Rumane says (2010)the design involves two processes. The first thing is analyzing and designing components and structure on the basis of recognized codes and standards of safety. The other is that designers conduct the information in the form
文摘One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begun to be designed and implemented based on digital technology with online and real time performance to achieve high speed and high density operation. The software is designed, coded and implemented into the system, and controls hardware components in order to satisfy the functional requirements of the system. As the functions that are implemented by software are increased, it becomes very difficult to predict the soil-ware failures because of its complexity. Therefore, it has become one of the key issues how to assure that the sottware is reliable, safe and secure. In this paper, the safety criteria are suggested to secure the software safety for the field of railway system. Characteristic of railway software and review safety related standards are analyzed. The authors also suggest development methodology and certification procedure for the developer and assessor to easily make safety critical railway software with following the safety criteria.
文摘This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out.
基金supported by National Natural Science Foundation of China(Grant No.61379138)Research Fund KU Leuven(OT/13/071)+1 种基金"Strategic Priority Research Program"of the Chinese Academy of Sciences(Grant No.XDA06010701)National High-tech R&D Program of China(863 Program)(Grant No.2013AA014002)
文摘In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4 × 4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great performance in both hardware and software environment, which provides enough flexibility for different application scenario. The following are3 main advantages of RECTANGLE. First, RECTANGLE is extremely hardware-friendly. For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at100 k Hz clock and an energy efficiency of 3.0 p J/bit. Second, RECTANGLE achieves a very competitive software speed among the existing lightweight block ciphers due to its bit-slice style. Using 128-bit SSE instructions,a bit-slice implementation of RECTANGLE reaches an average encryption speed of about 3.9 cycles/byte for messages around 3000 bytes. Last but not least, we propose new design criteria for the RECTANGLE S-box.Due to our careful selection of the S-box and the asymmetric design of the permutation layer, RECTANGLE achieves a very good security-performance tradeoff. Our extensive and deep security analysis shows that the highest number of rounds that we can attack, is 18(out of 25).
基金supported by the National Key Basic Research Program of China(Grant No.2013CB036403)
文摘This paper discusses the methods of establishing risk criteria for dams and reviews the application of dam risk criteria for individuals and societies in different countries or districts. Given the conditions in China and considering the public safety and acceptance of dam risk, historical dam break data and current design standards, individual and societal risk criteria for dams are proposed. The tolerable dam risk criteria for individuals should be set to 10-5-10-7 per annum based on project scale, for ex- ample, approximately 1.0xl0 7 per annum, which corresponds to a reliability index of 4.2 based on a 100-year lifespan for a first-class or large project. The societal limit for risk tolerance for dams should be set to approximately 10-3-10-5 per annum, corresponding to the fatality range from 1 to 100 and be horizontally extended to 1000, and F-N curves are proposed. It was also found that the reliability indices of Chinese Standard (GB 50199-2013) and Eurocodel (2002) are different, but they have the same level of safety measured by the annual probability of failure. The research results have significance for establishing dam risk criteria.
基金Project supported by the National Science and Technology Major Project of China(No.2016YFC0901703)
文摘In recent years, it has been demonstrated that checklists can improve patient safety significantly. To facilitate the effective use of checklists in daily practice, both the medical community and the informatics community propose to implement checklists in dynamic checklist applications that can be integrated into the clinical workflow and that is specific to the patient context. However, it is difficult to develop such applications because they are tightly intertwined with the content of specific checklists. We propose a platform that enables access to dynamic checklist applications by configuring the infrastructures provided in the platform. Then, the applications can be developed without time-consuming programming work. We define a number of design criteria regarding point of care and clinical processes by analyzing the existing checklist applications and the lessons learned from implementations.Then, by applying rule-based clinical decision support and workflow management technologies, we design technical mechanisms to satisfy the design criteria. A dynamic checklist application platform is designed based on these mechanisms. Finally, we build a platform in various design cycle iterations, driven by multiple clinical cases. By applying the platform, we develop nine comprehensive dynamic checklist applications with 242 dynamic checklists.The results demonstrate both the feasibility and the overall generic nature of the proposed approach. We propose a novel platform for configuring dynamic checklist applications. This platform satisfies the general requirements and can be easily configured to satisfy different scenarios in which safety checklists are used.