[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method]...[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.展开更多
The low altitude airspace will be open in China, general aviation flights are tremendously increased. Whether aircrafts can fly safely and how to determine the requirements of safety flight are the problems needed to ...The low altitude airspace will be open in China, general aviation flights are tremendously increased. Whether aircrafts can fly safely and how to determine the requirements of safety flight are the problems needed to be confirmed. Under this circumstances, based on the international Civil Aviation Organization(ICAO) criteria and the standards made by CAAC, this paper adopts the "See and Avoid" principle. Under the binding conditions of flight rules, visibility requirements, responding time, the aircraft speed, circle banking angle or the climbing angle, based on its study on aircraft dynamics principles, this paper establishes a mathematical collision avoidance model for head-to-head traffic and crossing converging traffic at the same level. And the safety separation requirements of the aircrafts in low altitude flight are equantitatively analyzed. Finally, the Matlab software is used to analyze the above method. The result shows that the safe traffic avoidance of the converging traffic at the same level meets certain flight conditions, while intersecting the traffic at the same level can safely avoid the collision.展开更多
In order to study the safety factor and instability process of cohesive soil slope, the discrete element method(DEM) was applied. DEM software PFC2 D was used to simulate the triaxial test to study the influence of th...In order to study the safety factor and instability process of cohesive soil slope, the discrete element method(DEM) was applied. DEM software PFC2 D was used to simulate the triaxial test to study the influence of the particle micro parameters on the macroscopic characteristics of cohesive soil and calibrate the micro parameters of DEM model on this basis. Embankment slope stability analysis was carried out by strength reduction and gravity increase method, it is shown that the safety factor obtained by strength reduction method is more conservative, and the arc-shaped feature of the sliding surface under the gravity increase method is more obvious. Throughout the progressive failure process, the failure trends, maximum displacements, and velocity changes obtained by the two methods were consistent. When slope was destroyed, the upper part was cracked, the middle part was sheared, and the lower part was destroyed by extrusion. The conclusions of this paper can be applied to the safety factor calculation of cohesive soil slopes and the analysis of the instability process.展开更多
In view of the stress concentration problem left by the joint coal seams mining since the reservation of the coal pillar, it was proposed that non-pillar mining technology be used in Dongrong No.2 coal mine. The numer...In view of the stress concentration problem left by the joint coal seams mining since the reservation of the coal pillar, it was proposed that non-pillar mining technology be used in Dongrong No.2 coal mine. The numerical simulation software FLAG2D was used to draw the relationship between surrounding rock deformation of roadway driving along next goaf and the size of the coal pillar, so the safety and suitable position of roadway was determined. The distribution of lateral abutment pressure was measured by using the ZYJ-30 drilling stress gauge in the coal wall. The conclusions of the numerical simulation were verified.展开更多
The present paper discusses the effects of small plants on the dump mass reinforcement and slope stability.The roots of smaller plants(such as grasses and shrubs)do not go deep.However,they stabilize the slope by bind...The present paper discusses the effects of small plants on the dump mass reinforcement and slope stability.The roots of smaller plants(such as grasses and shrubs)do not go deep.However,they stabilize the slope by binding the upper layer of dump slope.Shear strength of the dump mass with and without root reinforcement is determined by laboratory shear box instrument.The increased cohesion(apparent cohesion)of upper layer of the dump mass due to plants is determined by fabricated shear box.The kinetic behavior of the dump has been investigated using the FLAC software.The factor of safety has been calculated in order to determine the possible effect of small plants on the stability of the dump slope.It is observed that the small plants do not significantly improve the factor of safety(FOS)of slope.However,it could be useful for early stabilization.The grasses quickly bind the upper surface,whereas shrubs too immensely strengthen the stability of the dump in the initial stage.展开更多
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy...Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.展开更多
In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associat...In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive.展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
基金Supported by Common Chips and Basic Software Products(2010ZX01045-001-004-3)~~
文摘[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.
文摘The low altitude airspace will be open in China, general aviation flights are tremendously increased. Whether aircrafts can fly safely and how to determine the requirements of safety flight are the problems needed to be confirmed. Under this circumstances, based on the international Civil Aviation Organization(ICAO) criteria and the standards made by CAAC, this paper adopts the "See and Avoid" principle. Under the binding conditions of flight rules, visibility requirements, responding time, the aircraft speed, circle banking angle or the climbing angle, based on its study on aircraft dynamics principles, this paper establishes a mathematical collision avoidance model for head-to-head traffic and crossing converging traffic at the same level. And the safety separation requirements of the aircrafts in low altitude flight are equantitatively analyzed. Finally, the Matlab software is used to analyze the above method. The result shows that the safe traffic avoidance of the converging traffic at the same level meets certain flight conditions, while intersecting the traffic at the same level can safely avoid the collision.
基金Project(51808116) supported by the National Natural Science Foundation of ChinaProject(BK20180404) supported by the Natural Science Foundation of Jiangsu Province, China+1 种基金Project(KFJ170106) supported by the Changsha University of Science & Technology via Open Fund of National Engineering Laboratory of Highway Maintenance Technology,ChinaProject(242020R40133) supported by Fundamental Research Funds for the Central Universities, China。
文摘In order to study the safety factor and instability process of cohesive soil slope, the discrete element method(DEM) was applied. DEM software PFC2 D was used to simulate the triaxial test to study the influence of the particle micro parameters on the macroscopic characteristics of cohesive soil and calibrate the micro parameters of DEM model on this basis. Embankment slope stability analysis was carried out by strength reduction and gravity increase method, it is shown that the safety factor obtained by strength reduction method is more conservative, and the arc-shaped feature of the sliding surface under the gravity increase method is more obvious. Throughout the progressive failure process, the failure trends, maximum displacements, and velocity changes obtained by the two methods were consistent. When slope was destroyed, the upper part was cracked, the middle part was sheared, and the lower part was destroyed by extrusion. The conclusions of this paper can be applied to the safety factor calculation of cohesive soil slopes and the analysis of the instability process.
文摘In view of the stress concentration problem left by the joint coal seams mining since the reservation of the coal pillar, it was proposed that non-pillar mining technology be used in Dongrong No.2 coal mine. The numerical simulation software FLAG2D was used to draw the relationship between surrounding rock deformation of roadway driving along next goaf and the size of the coal pillar, so the safety and suitable position of roadway was determined. The distribution of lateral abutment pressure was measured by using the ZYJ-30 drilling stress gauge in the coal wall. The conclusions of the numerical simulation were verified.
文摘The present paper discusses the effects of small plants on the dump mass reinforcement and slope stability.The roots of smaller plants(such as grasses and shrubs)do not go deep.However,they stabilize the slope by binding the upper layer of dump slope.Shear strength of the dump mass with and without root reinforcement is determined by laboratory shear box instrument.The increased cohesion(apparent cohesion)of upper layer of the dump mass due to plants is determined by fabricated shear box.The kinetic behavior of the dump has been investigated using the FLAC software.The factor of safety has been calculated in order to determine the possible effect of small plants on the stability of the dump slope.It is observed that the small plants do not significantly improve the factor of safety(FOS)of slope.However,it could be useful for early stabilization.The grasses quickly bind the upper surface,whereas shrubs too immensely strengthen the stability of the dump in the initial stage.
基金The paper is supported by the National High Technology Research and Development Program of China (863 Program) (No.2009AA01Z439) and the National Natural Science Foundation of China (U0835001)
文摘Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.
文摘In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive.
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.