As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ...In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.展开更多
The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline cons...The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects.展开更多
The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well co...The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well controlled, the process of the operation disposal will be mistaken and cannot reach the goal. However, for the confirmation of the control points, many studies only do qualitative research from the important aspect instead of quantificational research. They are devoid of a series of scientific methods. This paper advances quantificational methods to confirm the key control points from two aspects of job evaluation and mathematics model.展开更多
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ...In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.展开更多
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new...Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.展开更多
To study the occurrence mechanism of rock burst during mining the irregular working face,the study took irregular panel 7447 near fault tectonic as an engineering background.The spatial fracture characteristic of over...To study the occurrence mechanism of rock burst during mining the irregular working face,the study took irregular panel 7447 near fault tectonic as an engineering background.The spatial fracture characteristic of overlying strata was analyzed by Winkler elastic foundation beam theory.Furthermore,the influence law of panel width to suspended width and limit breaking span of key strata were also analyzed by thin plate theory.Through micro-seismic monitoring,theoretical analysis,numerical simulation and working resistance of support of field measurement,this study investigated the fracture characteristic of overlying strata and mechanism of rock burst in irregular working face.The results show that the fracture characteristic of overlying strata shows a spatial trapezoid structure,with the main roof being as an undersurface.The fracture form changes from vertical‘‘O-X"type to transverse‘‘O-X"type with the increase of trapezoidal height.From the narrow mining face to the wide mining face,the suspended width of key strata is greater than its limit breaking width,and a strong dynamic load is produced by the fracture of key strata.The numerical simulation and micro-seismic monitoring results show that the initial fracture position of key strata is close to tailgate 7447.Also there is a high static load caused by fault tectonic.The dynamic and static combined load induce rock burst.Accordingly,a cooperative control technology was proposed,which can weaken dynamic load by hard roof directional hydraulic fracture and enhance surrounding rock by supporting system.展开更多
Gob-area roof rupture movement is a key disturbance factor for gob-side entry retaining.The characteristics of gob-area sequential roof collapse of overlying strata and superposed disturbance mechanism for gob-side en...Gob-area roof rupture movement is a key disturbance factor for gob-side entry retaining.The characteristics of gob-area sequential roof collapse of overlying strata and superposed disturbance mechanism for gob-side entry retaining are obtained via physical simulation and theoretical analysis,in which the scope of disturbed strata is enlarged from main roof to fracture zone.The experiment reveals that as a working face advances,roof strata sequentially collapse from bottom to top and produce multiple disturbances to gob-side entry retaining.Key strata among the overlying strata control each collapse.Main roof subsidence is divided into three stages:flexure subsidence prior to rupture,rotational subsidence during rupture and compressive subsidence after rupture.The amounts of deformation evident in each of the three stages are 15%,55%and 30%,respectively.After the master stratum collapses,main roof subsidence approaches its maximum value.The final span of the key stratum determines the moment and cycling of gob-side entry retaining disturbances.Main roof subsidence influences the load on the filling wall.The sequential roof collapse of overlying strata results in fluctuations in the gob-side entry retaining deformation.Calculation formulae for the final span of the key stratum and the filling wall load are obtained via theoretical analysis.A control method for the stability of the gob-side entry retaining’s surrounding rock is proposed,which includes 3 measures:a“dual-layer”proactive anchorage support,roadside filling with dynamic strength matching and auxiliary support during disturbance.Finally,the gob-side entry retaining of the Xiaoqing mine E1403 working face is presented as an engineering case capable of verifying the validity of the research conclusions.展开更多
OBJECTIVE: To evaluate the effectiveness and safety of filiform needle acupuncture for poststroke depression, and to compare acupuncture with the therapeutic efficacy of antidepressant drugs. DATA RETRIEVAL: We retr...OBJECTIVE: To evaluate the effectiveness and safety of filiform needle acupuncture for poststroke depression, and to compare acupuncture with the therapeutic efficacy of antidepressant drugs. DATA RETRIEVAL: We retrieved data from the Chinese National Knowledge Infrastructure (1979-2012), Wanfang (1980-2012), VIP (1989-2012), Chinese Biomedical Literature (1975- 2012), PubMed (1966-2012), Ovid Lww (-2012), and Cochrane Library (-2012) Database using the internet. SELECTION CRITERIA: Randomized controlled trials on filiform needle acupuncture versus antidepressant drugs for treatment of poststroke depression were included. Moreover, the in- cluded articles scored at least 4 points on the Jadad scale. Exclusion criteria: other acupuncture therapies as treatment group, not stroke-induced depression patients, score 〈 4 points, non-ran- domized controlled trials, or animal trials. MAIN OUTCOME MEASURES: These were the Hamilton Depression Scale scores, clinical ef- fective rate, Self-Rating Depression Scale scores, Side Effect Rating Scale scores, and incidence of adverse reaction and events. RESULTS: A total of 17 randomized controlled clinical trials were included. Meta-analysis results displayed that after 4 weeks of treatment, clinical effective rate was better in patients treated with fill- form needle acupuncture than those treated with simple antidepressant drugs [relative risk = 1.11, 95% confidence interval (C/): 1.03-1.21, P = 0.01]. At 6 weeks, clinical effective rate was similar between filiform needle acupuncture and antidepressant drug groups. At 2 weeks after filiform needle acupuncture, Hamilton Depression Scale (17 items) scores were lower than in the antide- pressant drug group (mean difference = -2.34, 95%CI: -3.46 to -1.22, P 〈 0.000,1). At 4 weeks, Hamilton Depression Scale (24 items) scores were similar between filiform needle acupuncture and antidepressant drug groups. Self-Rating Depression Scale scores were lower in filiform needle acupuncture group than in the antidepressant drug group. Side Effect Rating Scale was used in only two articles, and no meta-analysis was conducted. Safety evaluation of the 17 arti- cles showed that gastrointestinal tract reactions such as nausea and vomiting were very common in the antidepressant drug group. Incidence of adverse reaction and events was very low in the filiform needle acupuncture group. CONCLUSION: Early filiform needle acupuncture for poststroke depression can perfectly con- trol depression. Filiform needle acupuncture is safe and reliable. Therapeutic effects of filiform needle acupuncture were better than those of antidepressant drugs.展开更多
Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operati...Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system.展开更多
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme w...A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.展开更多
We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can...We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can berestored by the receiver with probability 1/2 if all the agents collaborate.However,for certain type of original states therestoration probability is unit.展开更多
E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ...E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.展开更多
In view of complex geological characteristics and alternating loading conditions associated with cyclic large amount of gas injection and withdrawal in underground gas storage(UGS) of China, a series of key gas storag...In view of complex geological characteristics and alternating loading conditions associated with cyclic large amount of gas injection and withdrawal in underground gas storage(UGS) of China, a series of key gas storage construction technologies were established, mainly including UGS site selection and evaluation, key index design, well drilling and completion, surface engineering and operational risk warning and assessment, etc. The effect of field application was discussed and summarized. Firstly, trap dynamic sealing capacity evaluation technology for conversion of UGS from the fault depleted or partially depleted gas reservoirs. A key index design method mainly based on the effective gas storage capacity design for water flooded heterogeneous gas reservoirs was proposed. To effectively guide the engineering construction of UGS, the safe well drilling, high quality cementing and high pressure and large flow surface injection and production engineering optimization suitable for long-term alternate loading condition and ultra-deep and ultra-low temperature formation were developed. The core surface equipment like high pressure gas injection compressor can be manufactured by our own. Last, the full-system operational risk warning and assessment technology for UGS was set up. The above 5 key technologies have been utilized in site selection, development scheme design, engineering construction and annual operations of 6 UGS groups, e.g. the Hutubi UGS in Xinjiang. To date, designed main indexes are highly consistent with actural performance, the 6 UGS groups have the load capacity of over 7.5 billion cubic meters of working gas volume and all the storage facilities have been running efficiently and safely.展开更多
The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in ...The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.展开更多
Since the implementation of the Action Plan for Air Pollution Prevention and Control , all regions of China have steadily promoted the prevention and control of air pollution and achieved results continuously. However...Since the implementation of the Action Plan for Air Pollution Prevention and Control , all regions of China have steadily promoted the prevention and control of air pollution and achieved results continuously. However, the atmospheric environment in key areas such as Beijing-Tianjin-Hebei region, the Yangtze River Delta region, and Fenwei Plain is still severe, and especially during the heating period heavy pollution occurs frequently, which has become the focus and difficulty of improving the quality of the atmospheric environment and is also the weakest link of China s air pollution control at present. How to alleviate air pollution, how to win the battle of pollution prevention and control, how to hold the fruits of the blue sky defense war, energy consumption is key.展开更多
Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strate...Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strategy to define some key nodes within the version derivation graph is presented and some implementation details are described. At last, the performance of different strategies are compared with each other.展开更多
Based on the quadratic supply rate, the problem of robust dissipative control for a class of uncertain nonlinear system with sector nonlinear input is discussed. The uncertainty is described by bounded norm. It is sho...Based on the quadratic supply rate, the problem of robust dissipative control for a class of uncertain nonlinear system with sector nonlinear input is discussed. The uncertainty is described by bounded norm. It is shown that the robust dissipative control problem can be resolved for all admissible uncertainty, if there exists a storage function such that Hamilton Jacobi inequality holds. When the uncertainties of the system satisfy the matching condition, and input function within the boundedness of the sector, the closed loop system will be stronger dissipativeness, and the controller which we obtained in the paper is more flexible, because it contains an adjustable parameter for some certain range.展开更多
Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic cong...Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic congestion control method of the selection of a secure path. By estimating the average queue length at the nodes, the congestion level at present is detected. If the occurrence of the possible congestion is predicted, the network will select a new path where all nodes have been certified as trusted nodes, generating session keys in the TCP three-way handshake to prevent the denial of service attacks. Simulation results show that the new algorithm is superior to TCP Reno algorithm in terms of security, packets loss rate, throughput, and end-to-end delay.展开更多
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金Project supported by the National Natural Science Foundation of China(Grant No.61108039)the Major Research Plan of the National Natural Science Foundation of China(Grant No.91121023)the Scientific Research Foundation of Graduate School of South China Normal University(Grant No.2012kyjj224)
文摘In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.
文摘The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects.
文摘The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well controlled, the process of the operation disposal will be mistaken and cannot reach the goal. However, for the confirmation of the control points, many studies only do qualitative research from the important aspect instead of quantificational research. They are devoid of a series of scientific methods. This paper advances quantificational methods to confirm the key control points from two aspects of job evaluation and mathematics model.
文摘In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.
基金This work was supported in part by the National Natural Science Foundation of China under Grant 62203468Young Elite Scientist Sponsorship Program by CAST under Grant 2022QNRC001+1 种基金Foundation of China State Railway Group Co.,Ltd.under Grant K2021X001Foundation of China Academy of Railway Sciences Corporation Limited under Grant 2021YJ315.
文摘Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.
基金supported by the Key Project of National Natural Science Foundation of China (No. 51634001)the National Natural Science Foundation of China (Nos. 51404269 and 51674253)+1 种基金the State Key Research Development Program of China (No. 2016YFC0801403)the Key Research Development Program of Jiangsu Province, China (No. BE2015040)
文摘To study the occurrence mechanism of rock burst during mining the irregular working face,the study took irregular panel 7447 near fault tectonic as an engineering background.The spatial fracture characteristic of overlying strata was analyzed by Winkler elastic foundation beam theory.Furthermore,the influence law of panel width to suspended width and limit breaking span of key strata were also analyzed by thin plate theory.Through micro-seismic monitoring,theoretical analysis,numerical simulation and working resistance of support of field measurement,this study investigated the fracture characteristic of overlying strata and mechanism of rock burst in irregular working face.The results show that the fracture characteristic of overlying strata shows a spatial trapezoid structure,with the main roof being as an undersurface.The fracture form changes from vertical‘‘O-X"type to transverse‘‘O-X"type with the increase of trapezoidal height.From the narrow mining face to the wide mining face,the suspended width of key strata is greater than its limit breaking width,and a strong dynamic load is produced by the fracture of key strata.The numerical simulation and micro-seismic monitoring results show that the initial fracture position of key strata is close to tailgate 7447.Also there is a high static load caused by fault tectonic.The dynamic and static combined load induce rock burst.Accordingly,a cooperative control technology was proposed,which can weaken dynamic load by hard roof directional hydraulic fracture and enhance surrounding rock by supporting system.
基金Project(51404251)supported by the National Natural Science Foundation of ChinaProject(BK20140198)supported by the Natural Science Foundation of Jiangsu Province,China+1 种基金Project(PPZY2015A046)supported by the Top-notch Academic Programs Project of Jiangsu Higher Education Institutions,ChinaProject supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Gob-area roof rupture movement is a key disturbance factor for gob-side entry retaining.The characteristics of gob-area sequential roof collapse of overlying strata and superposed disturbance mechanism for gob-side entry retaining are obtained via physical simulation and theoretical analysis,in which the scope of disturbed strata is enlarged from main roof to fracture zone.The experiment reveals that as a working face advances,roof strata sequentially collapse from bottom to top and produce multiple disturbances to gob-side entry retaining.Key strata among the overlying strata control each collapse.Main roof subsidence is divided into three stages:flexure subsidence prior to rupture,rotational subsidence during rupture and compressive subsidence after rupture.The amounts of deformation evident in each of the three stages are 15%,55%and 30%,respectively.After the master stratum collapses,main roof subsidence approaches its maximum value.The final span of the key stratum determines the moment and cycling of gob-side entry retaining disturbances.Main roof subsidence influences the load on the filling wall.The sequential roof collapse of overlying strata results in fluctuations in the gob-side entry retaining deformation.Calculation formulae for the final span of the key stratum and the filling wall load are obtained via theoretical analysis.A control method for the stability of the gob-side entry retaining’s surrounding rock is proposed,which includes 3 measures:a“dual-layer”proactive anchorage support,roadside filling with dynamic strength matching and auxiliary support during disturbance.Finally,the gob-side entry retaining of the Xiaoqing mine E1403 working face is presented as an engineering case capable of verifying the validity of the research conclusions.
基金supported by the Guangdong Provincial"211 Engineering"Stage-III Key Disciplines Construction Project in China,No.Yue 2009431
文摘OBJECTIVE: To evaluate the effectiveness and safety of filiform needle acupuncture for poststroke depression, and to compare acupuncture with the therapeutic efficacy of antidepressant drugs. DATA RETRIEVAL: We retrieved data from the Chinese National Knowledge Infrastructure (1979-2012), Wanfang (1980-2012), VIP (1989-2012), Chinese Biomedical Literature (1975- 2012), PubMed (1966-2012), Ovid Lww (-2012), and Cochrane Library (-2012) Database using the internet. SELECTION CRITERIA: Randomized controlled trials on filiform needle acupuncture versus antidepressant drugs for treatment of poststroke depression were included. Moreover, the in- cluded articles scored at least 4 points on the Jadad scale. Exclusion criteria: other acupuncture therapies as treatment group, not stroke-induced depression patients, score 〈 4 points, non-ran- domized controlled trials, or animal trials. MAIN OUTCOME MEASURES: These were the Hamilton Depression Scale scores, clinical ef- fective rate, Self-Rating Depression Scale scores, Side Effect Rating Scale scores, and incidence of adverse reaction and events. RESULTS: A total of 17 randomized controlled clinical trials were included. Meta-analysis results displayed that after 4 weeks of treatment, clinical effective rate was better in patients treated with fill- form needle acupuncture than those treated with simple antidepressant drugs [relative risk = 1.11, 95% confidence interval (C/): 1.03-1.21, P = 0.01]. At 6 weeks, clinical effective rate was similar between filiform needle acupuncture and antidepressant drug groups. At 2 weeks after filiform needle acupuncture, Hamilton Depression Scale (17 items) scores were lower than in the antide- pressant drug group (mean difference = -2.34, 95%CI: -3.46 to -1.22, P 〈 0.000,1). At 4 weeks, Hamilton Depression Scale (24 items) scores were similar between filiform needle acupuncture and antidepressant drug groups. Self-Rating Depression Scale scores were lower in filiform needle acupuncture group than in the antidepressant drug group. Side Effect Rating Scale was used in only two articles, and no meta-analysis was conducted. Safety evaluation of the 17 arti- cles showed that gastrointestinal tract reactions such as nausea and vomiting were very common in the antidepressant drug group. Incidence of adverse reaction and events was very low in the filiform needle acupuncture group. CONCLUSION: Early filiform needle acupuncture for poststroke depression can perfectly con- trol depression. Filiform needle acupuncture is safe and reliable. Therapeutic effects of filiform needle acupuncture were better than those of antidepressant drugs.
基金supported by the National Key Rese arch and Development Program of China(2018YFB0904100)Science and Technology Project of State Grid(SGHB0000KXJS1800685)
文摘Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system.
基金Supported by the National Natural Science Foun-dation of China (70271068)
文摘A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.
基金Supported by the program for New Century Excellent Talents at the University of China under Grant No.NCET-06-0554the National Natural Science Foundation of China under Grant Nos.60677001,50672001,10874122,and 10747146+2 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806
文摘We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can berestored by the receiver with probability 1/2 if all the agents collaborate.However,for certain type of original states therestoration probability is unit.
基金Supported by the National Natural Science Foundation of China(No.60073052)
文摘E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.
基金Supported by the CNPC Science and Technology Major Project(2015E-4002)
文摘In view of complex geological characteristics and alternating loading conditions associated with cyclic large amount of gas injection and withdrawal in underground gas storage(UGS) of China, a series of key gas storage construction technologies were established, mainly including UGS site selection and evaluation, key index design, well drilling and completion, surface engineering and operational risk warning and assessment, etc. The effect of field application was discussed and summarized. Firstly, trap dynamic sealing capacity evaluation technology for conversion of UGS from the fault depleted or partially depleted gas reservoirs. A key index design method mainly based on the effective gas storage capacity design for water flooded heterogeneous gas reservoirs was proposed. To effectively guide the engineering construction of UGS, the safe well drilling, high quality cementing and high pressure and large flow surface injection and production engineering optimization suitable for long-term alternate loading condition and ultra-deep and ultra-low temperature formation were developed. The core surface equipment like high pressure gas injection compressor can be manufactured by our own. Last, the full-system operational risk warning and assessment technology for UGS was set up. The above 5 key technologies have been utilized in site selection, development scheme design, engineering construction and annual operations of 6 UGS groups, e.g. the Hutubi UGS in Xinjiang. To date, designed main indexes are highly consistent with actural performance, the 6 UGS groups have the load capacity of over 7.5 billion cubic meters of working gas volume and all the storage facilities have been running efficiently and safely.
基金the National Basic Research Programs of China (No. 2011CB201204)the National Natural Science Foundation of China (Nos. 51074160)+1 种基金the Fundamental Research Funds for the Central Universities (No. 2010QNA03)Project Funded by the Priority Academic Program Development of Jiangsu Higher Education institutions for their support for this project
文摘The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.
基金Supported by Special Project for Research on Prevention and Control of Air Pollution from Fire Coal in 2018 of Ministry of Ecology and Environment of the People’s Republic of China(2018A030)National Natural Science Foundation of China(41771498)
文摘Since the implementation of the Action Plan for Air Pollution Prevention and Control , all regions of China have steadily promoted the prevention and control of air pollution and achieved results continuously. However, the atmospheric environment in key areas such as Beijing-Tianjin-Hebei region, the Yangtze River Delta region, and Fenwei Plain is still severe, and especially during the heating period heavy pollution occurs frequently, which has become the focus and difficulty of improving the quality of the atmospheric environment and is also the weakest link of China s air pollution control at present. How to alleviate air pollution, how to win the battle of pollution prevention and control, how to hold the fruits of the blue sky defense war, energy consumption is key.
文摘Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strategy to define some key nodes within the version derivation graph is presented and some implementation details are described. At last, the performance of different strategies are compared with each other.
基金the National Natural Science Foundation of China(6987401569934030)and Foundation of the Education Department of Hubei Province(99A121)
文摘Based on the quadratic supply rate, the problem of robust dissipative control for a class of uncertain nonlinear system with sector nonlinear input is discussed. The uncertainty is described by bounded norm. It is shown that the robust dissipative control problem can be resolved for all admissible uncertainty, if there exists a storage function such that Hamilton Jacobi inequality holds. When the uncertainties of the system satisfy the matching condition, and input function within the boundedness of the sector, the closed loop system will be stronger dissipativeness, and the controller which we obtained in the paper is more flexible, because it contains an adjustable parameter for some certain range.
文摘Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic congestion control method of the selection of a secure path. By estimating the average queue length at the nodes, the congestion level at present is detected. If the occurrence of the possible congestion is predicted, the network will select a new path where all nodes have been certified as trusted nodes, generating session keys in the TCP three-way handshake to prevent the denial of service attacks. Simulation results show that the new algorithm is superior to TCP Reno algorithm in terms of security, packets loss rate, throughput, and end-to-end delay.