With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests...With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue.展开更多
With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning ...With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning the interaction between the atmospheric boundary layer and wind turbine arrays,the generated wakes and their interactions,and wind energy harvesting.However,the majority of the existing ML models for predicting wind turbine wakes merely recreate Computational fluid dynamics(CFD)simulated data with analogous accuracy but reduced computational costs,thus providing surrogate models rather than enhanced data-enabled physics insights.Although ML-based surrogate models are useful to overcome current limitations associated with the high computational costs of CFD models,using ML to unveil processes from experimental data or enhance modeling capabilities is deemed a potential research direction to pursue.In this letter,we discuss recent achievements in the realm of ML modeling of wind turbine wakes and operations,along with new promising research strategies.展开更多
Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellen...Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.展开更多
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w...Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.展开更多
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio...Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.展开更多
The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,indivi...The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,individuals are becoming increasingly concerned about data misuse and leaks.To address these issues,in this paper,we propose TrustControl,a trusted data usage control system to control,process,and protect data usage without revealing privacy.A trusted execution environment(TEE)is exploited to process confidential user data.First of all,we design a secure and reliable remote attestation mechanism for ARM TrustZone,which can verify the security of the TEE platform and function code,thus guaranteeing data processing security.Secondly,to address the security problem that the raw data may be misused,we design a remote dynamic code injection method to regulate that data can only be processed for the expected purpose.Our solution focuses on protecting the sensitive data of the data owner and the function code of the data user to prevent data misuse and leakage.Furthermore,we implement the prototype system of TrustControl on TrustZone-enabled hardware.Real-world experiment results demonstrate that the proposed Trust-Control is secure and the performance overhead of introducing our prototype system is very low.展开更多
With the development of mining industry,people have obtained profits from it,but they are facing environmental damages.In order to monitor these environmental changes,a spectral library is set up for the spectrum data...With the development of mining industry,people have obtained profits from it,but they are facing environmental damages.In order to monitor these environmental changes,a spectral library is set up for the spectrum data organization and management of mine typical objects.Most of the spectrum data come from the long-term field measuring in mining area and other spectral libraries.For the data quality control and error detection in the measuring data,an inner precision calculation method is presented and a series of interactive graphical controls are developed for the spectrum visualization and analysis.Through extracting and saving spectrum characters for the mine typical objects,realizs spectrum matching and classification for new measured spectrum samples are realized by using Euclidean distance,Aitchison distance,Pearson correlation coefficient and vector angular cosine methods.Based on the matching result,this work is able to gather dynamically physicochemical environment parameters from the library and gives an early warning for the mine environmental changes.展开更多
The coastal area of southern China is frequently affected by marine meteorological disasters,and is also one of the key areas that influence the short-term climate change of China.Due to a lack of observational facili...The coastal area of southern China is frequently affected by marine meteorological disasters,and is also one of the key areas that influence the short-term climate change of China.Due to a lack of observational facilities and techniques,little has been done in this area in terms of operational weather monitoring and scientific research on atmospheric and marine environment.With the support of China Meteorological Administration (CMA) and Guangdong Meteorological Bureau (GMB),the Marine Meteorological Science Experiment Base (MMSEB) at Bohe,Maoming has been jointly established by Guangzhou Institute of Tropical and Marine Meteorology (GITMM) and Maoming Meteorological Bureau (MMB) of Guangdong Province after three years of hard work.It has become an integrated coastal observation base that is equipped with a complete set of sophisticated instruments.Equipment maintenance and data quality control procedures have been implemented to ensure the long-term,steady operation of the instruments and the availability of high quality data.Preliminary observations show that the data obtained by the MMSEB reveal many interesting features in the boundary layer structure and air-sea interaction in such disastrous weather as typhoons and sea fog.The MMSEB is expected to play an important role in the scientific research of disastrous weather related to marine meteorology.展开更多
In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the in...In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.展开更多
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte...In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.展开更多
In mountain areas, radar observations are often contaminated (1) by echoes from high-speed moving vehicles and (2) by point-wise ground clutter under either normal propagation (NP) or anomalous propagation (AP...In mountain areas, radar observations are often contaminated (1) by echoes from high-speed moving vehicles and (2) by point-wise ground clutter under either normal propagation (NP) or anomalous propagation (AP) conditions. Level Ⅱ data are collected from KMTX (Salt Lake City, Utah) radar to analyze these two types of contamination in the mountain area around the Great Salt Lake. Human experts provide the "ground truth" for possible contamination of either type on each individual pixel. Common features are then extracted for contaminated pixels of each type. For example, pixels contaminated by echoes from high-speed moving vehicles are characterized by large radial velocity and spectrum width. Echoes from a moving train tend to have larger velocity and reflectivity but smaller spectrum width than those from moving vehicles on highways. These contaminated pixels are only seen in areas of large terrain gradient (in the radial direction along the radar beam). The same is true for the second type of contamination - pointwise ground clutters. Six quality control (QC) parameters are selected to quantify the extracted features. Histograms are computed for each QC parameter and grouped for contaminated pixels of each type and also for non-contaminated pixels. Based on the computed histograms, a fuzzy logical algorithm is developed for automated detection of contaminated pixels. The algorithm is tested with KMTX radar data under different (clear and rainy) weather conditions.展开更多
Among the regression-based algorithms for deriving SST from satellite measurements, regionally optimized algorithms normally perform better than the corresponding global algorithm. In this paper, three algorithms are ...Among the regression-based algorithms for deriving SST from satellite measurements, regionally optimized algorithms normally perform better than the corresponding global algorithm. In this paper, three algorithms are considered for SST retrieval over the East Asia region (15°-55°N, 105°-170°E), including the multi-channel algorithm (MCSST), the quadratic algorithm (QSST), and the Pathfinder algorithm (PFSST). All algorithms are derived and validated using collocated buoy and Geostationary Meteorological Satellite (GMS-5) observations from 1997 to 2001. An important part of the derivation and validation of the algorithms is the quality control procedure for the buoy SST data and an improved cloud screening method for the satellite brightness temperature measurements. The regionally optimized MCSST algorithm shows an overall improvement over the global algorithm, removing the bias of about -0.13℃ and reducing the root-mean-square difference (rmsd) from 1.36℃ to 1.26℃. The QSST is only slightly better than the MCSST. For both algorithms, a seasonal dependence of the remaining error statistics is still evident. The Pathfinder approach for deriving a season-specific set of coefficients, one for August to October and one for the rest of the year, provides the smallest rmsd overall that is also stable over time.展开更多
Providing a reliable and efficient communication infrastructure for critical regions is generally a strategy used to enhance regional safety or to sustain regional development. For such purposes, the spider-web networ...Providing a reliable and efficient communication infrastructure for critical regions is generally a strategy used to enhance regional safety or to sustain regional development. For such purposes, the spider-web network is prototyped as a cellular telecommunication infrastructure for its advantages including being interference-free, possessing fault-tolerance, having security management, and countering radio's multipath effects. Besides, it is used to develop area-based-street-SCADA (supervisory control and data acquisition) networks composed of regular optimal degree-3 prototyped sub-networks with the concepts of dual-surveillance, operational order and Hamiltonian laceability, and it flexibly fits various circulation configurations. Moreover, it can offer integrative response capabilities even after two paths' SCADA networks have been ruined.展开更多
This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling&train control systems in metro railways.The main concern of this paper is to minimize the failure...This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling&train control systems in metro railways.The main concern of this paper is to minimize the failure in automated metro railways system operator and integrate the information coming from Operational Control Centre(OCC),traction SCADA system,traction power control,and power supply system.This work presents a simulated prototype of an automated metro train system operator that uses PLC and SCADA for the real time monitoring and control of the metro railway systems.Here,SCADA is used for the visualization of an automated process operation and then the whole opera-tion is regulated with the help of PLC.The PLC used in this process is OMRON(NX1P2-9024DT1)and OMRON’s Sysmac studio programming software is used for developing the ladder logic of PLC.The metro railways system has deployed infrastructure based on SCADA from the power supply system,and each station’s traction power control is connected to the OCC remotely which commands all of the stations and has the highest command priority.An alarm is triggered in the event of an emergency or system congestion.This proposed system overcomes the drawbacks of the current centralized automatic train control(CATC)system.This system provides prominent benefits like augmenting services which may enhance a network’s full load capacity and networkflexibility,which help in easy modification in the existing program at any time.展开更多
Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the functio...Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem.展开更多
Wind energy is one of the fast growing sources of power production currently, and there is a great demand to reduce the cost of operation and maintenance. Most wind farms have installed supervisory control and data ac...Wind energy is one of the fast growing sources of power production currently, and there is a great demand to reduce the cost of operation and maintenance. Most wind farms have installed supervisory control and data acquisition (SCADA) systems for system control and logging data. However, the collected data are not used effectively. This paper proposes a fault detection method for main bearing wind turbine based on existing SCADA data using an artificial neural network (ANN). The ANN model for the normal behavior is established, and the difference between theoretical and actual values of the parameters is then calculated. Thus the early stage of main bearing fault can be identified to let the operator have sufficient time to make more informed decisions for maintenance.展开更多
Real world study (RWS) has become a hotspot for clinical research. Data quality plays a vital role in research achievement and other clinical research fields. In this paper, the common quality problems in the RWS of...Real world study (RWS) has become a hotspot for clinical research. Data quality plays a vital role in research achievement and other clinical research fields. In this paper, the common quality problems in the RWS of traditional Chinese medicine are discussed, and a countermeasure is proposed.展开更多
The main aim of this work is to design a non-fragile sampled data control(NFSDC) scheme for the asymptotic synchronization criteria for interconnected coupled circuit systems(multi-agent systems, MASs). NFSDC is used ...The main aim of this work is to design a non-fragile sampled data control(NFSDC) scheme for the asymptotic synchronization criteria for interconnected coupled circuit systems(multi-agent systems, MASs). NFSDC is used to conduct synchronization analysis of the considered MASs in the presence of time-varying delays. By constructing suitable Lyapunov functions, sufficient conditions are derived in terms of linear matrix inequalities(LMIs) to ensure synchronization between the MAS leader and follower systems. Finally, two numerical examples are given to show the effectiveness of the proposed control scheme and less conservation of the proposed Lyapunov functions.展开更多
With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers t...With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of various types and jobs from different classes can only be served by certain types of server, as it is often the case in real data centers. We model this problem as a robust Markov decision process(i.e., the transition function is not assumed to be known precisely). We give sufficient conditions(which seem to be reasonable and satisfied in practice) guaranteeing that an optimal threshold policy exists. This property can then be exploited in the design of an efficient solving method, which we provide.Finally, we present some experimental results demonstrating the practicability of our approach and compare with a previous related approach based on model predictive control.展开更多
A class of networked control systems is investigated whose communication network is shared with other applications. The design objective for such a system setting is not only the optimization of the control performanc...A class of networked control systems is investigated whose communication network is shared with other applications. The design objective for such a system setting is not only the optimization of the control performance but also the efficient utilization of the communication resources. We observe that at a large time scale the data packet delay in the communication network is roughly varying piecewise constant, which is typically true for data networks like the Internet. Based on this observation, a dynamic data packing scheme is proposed within the recently developed packet-based control framework for networked control systems. As expected this proposed approach achieves a fine balance between the control performance and the communication utilization: the similar control performance can be obtained at dramatically reduced cost of the communication resources. Simulations illustrate the effectiveness of the proposed approach.展开更多
基金supported by the National Natural Science Foundation of China (62272078)。
文摘With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue.
基金supported by the National Science Foundation(NSF)CBET,Fluid Dynamics CAREER program(Grant No.2046160),program manager Ron Joslin.
文摘With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning the interaction between the atmospheric boundary layer and wind turbine arrays,the generated wakes and their interactions,and wind energy harvesting.However,the majority of the existing ML models for predicting wind turbine wakes merely recreate Computational fluid dynamics(CFD)simulated data with analogous accuracy but reduced computational costs,thus providing surrogate models rather than enhanced data-enabled physics insights.Although ML-based surrogate models are useful to overcome current limitations associated with the high computational costs of CFD models,using ML to unveil processes from experimental data or enhance modeling capabilities is deemed a potential research direction to pursue.In this letter,we discuss recent achievements in the realm of ML modeling of wind turbine wakes and operations,along with new promising research strategies.
基金This work is sponsored by the open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation,P.R.China(Grant CLDL-20182119)the National Natural Science Foundation of China under Grants 61672410 and 61802293+2 种基金the Key Lab of Information Network Security,Ministry of Public Security(Grant C18614)the Academy of Finland(Grants 308087,314203,and 335262)the Shaanxi Innovation Team project under grant 2018TD-007,and the 111 project under grant B16037.
文摘Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.
文摘Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.
基金financially supported by National Natural Science Foundation of China(No.61475094)National 973 Program of China(No.2013CB329202)
文摘Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.
基金This work was supported by the National Key R&D Program of China(No.2021YFB2700601)Research Project of Hainan University(No.HD-KYH-2021240)+2 种基金Finance Science and Technology Project of Hainan Province(No.ZDKJ2020009 and ZDKJ2020012)National Natural Science Foundation of China(No.62163011,62162022 and 62162024)Key Projects in Hainan Province(No.ZDYF2021GXJS003 and ZDYF2020040).
文摘The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,individuals are becoming increasingly concerned about data misuse and leaks.To address these issues,in this paper,we propose TrustControl,a trusted data usage control system to control,process,and protect data usage without revealing privacy.A trusted execution environment(TEE)is exploited to process confidential user data.First of all,we design a secure and reliable remote attestation mechanism for ARM TrustZone,which can verify the security of the TEE platform and function code,thus guaranteeing data processing security.Secondly,to address the security problem that the raw data may be misused,we design a remote dynamic code injection method to regulate that data can only be processed for the expected purpose.Our solution focuses on protecting the sensitive data of the data owner and the function code of the data user to prevent data misuse and leakage.Furthermore,we implement the prototype system of TrustControl on TrustZone-enabled hardware.Real-world experiment results demonstrate that the proposed Trust-Control is secure and the performance overhead of introducing our prototype system is very low.
基金Supported by the National Key Technology R&D Program of China(No.2012BAH27B04,2011BAC03B03)the National Natural Science Foundation of China(No.41471330)+1 种基金Research Fund for the Doctoral Program of Higher Education of China(20113718110001)SDUST Research Fund(2011KYTD103)
文摘With the development of mining industry,people have obtained profits from it,but they are facing environmental damages.In order to monitor these environmental changes,a spectral library is set up for the spectrum data organization and management of mine typical objects.Most of the spectrum data come from the long-term field measuring in mining area and other spectral libraries.For the data quality control and error detection in the measuring data,an inner precision calculation method is presented and a series of interactive graphical controls are developed for the spectrum visualization and analysis.Through extracting and saving spectrum characters for the mine typical objects,realizs spectrum matching and classification for new measured spectrum samples are realized by using Euclidean distance,Aitchison distance,Pearson correlation coefficient and vector angular cosine methods.Based on the matching result,this work is able to gather dynamically physicochemical environment parameters from the library and gives an early warning for the mine environmental changes.
基金National Public Benefit Research Foundation (Meteorology) (GYHY200906008)
文摘The coastal area of southern China is frequently affected by marine meteorological disasters,and is also one of the key areas that influence the short-term climate change of China.Due to a lack of observational facilities and techniques,little has been done in this area in terms of operational weather monitoring and scientific research on atmospheric and marine environment.With the support of China Meteorological Administration (CMA) and Guangdong Meteorological Bureau (GMB),the Marine Meteorological Science Experiment Base (MMSEB) at Bohe,Maoming has been jointly established by Guangzhou Institute of Tropical and Marine Meteorology (GITMM) and Maoming Meteorological Bureau (MMB) of Guangdong Province after three years of hard work.It has become an integrated coastal observation base that is equipped with a complete set of sophisticated instruments.Equipment maintenance and data quality control procedures have been implemented to ensure the long-term,steady operation of the instruments and the availability of high quality data.Preliminary observations show that the data obtained by the MMSEB reveal many interesting features in the boundary layer structure and air-sea interaction in such disastrous weather as typhoons and sea fog.The MMSEB is expected to play an important role in the scientific research of disastrous weather related to marine meteorology.
基金Work supported by the Second Stage of Brain Korea 21 Projects
文摘In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.
基金supported by the National Science Foundation of China (No.61373040,No.61173137)The Ph.D.Pro-grams Foundation of Ministry of Education of China(20120141110073)Key Project of Natural Science Foundation of Hubei Province (No.2010CDA004)
文摘In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.
基金the NOAA A8R2WRPproject and FAA (Federal Aviation Administration) con-tract IA#DTFA03-01-X-9007 to NSSL (National SevereStorms Laboratory)the ONR (Offce of NavalResearch)Grant N000140310822 to the University of Ok-lahoma.
文摘In mountain areas, radar observations are often contaminated (1) by echoes from high-speed moving vehicles and (2) by point-wise ground clutter under either normal propagation (NP) or anomalous propagation (AP) conditions. Level Ⅱ data are collected from KMTX (Salt Lake City, Utah) radar to analyze these two types of contamination in the mountain area around the Great Salt Lake. Human experts provide the "ground truth" for possible contamination of either type on each individual pixel. Common features are then extracted for contaminated pixels of each type. For example, pixels contaminated by echoes from high-speed moving vehicles are characterized by large radial velocity and spectrum width. Echoes from a moving train tend to have larger velocity and reflectivity but smaller spectrum width than those from moving vehicles on highways. These contaminated pixels are only seen in areas of large terrain gradient (in the radial direction along the radar beam). The same is true for the second type of contamination - pointwise ground clutters. Six quality control (QC) parameters are selected to quantify the extracted features. Histograms are computed for each QC parameter and grouped for contaminated pixels of each type and also for non-contaminated pixels. Based on the computed histograms, a fuzzy logical algorithm is developed for automated detection of contaminated pixels. The algorithm is tested with KMTX radar data under different (clear and rainy) weather conditions.
文摘Among the regression-based algorithms for deriving SST from satellite measurements, regionally optimized algorithms normally perform better than the corresponding global algorithm. In this paper, three algorithms are considered for SST retrieval over the East Asia region (15°-55°N, 105°-170°E), including the multi-channel algorithm (MCSST), the quadratic algorithm (QSST), and the Pathfinder algorithm (PFSST). All algorithms are derived and validated using collocated buoy and Geostationary Meteorological Satellite (GMS-5) observations from 1997 to 2001. An important part of the derivation and validation of the algorithms is the quality control procedure for the buoy SST data and an improved cloud screening method for the satellite brightness temperature measurements. The regionally optimized MCSST algorithm shows an overall improvement over the global algorithm, removing the bias of about -0.13℃ and reducing the root-mean-square difference (rmsd) from 1.36℃ to 1.26℃. The QSST is only slightly better than the MCSST. For both algorithms, a seasonal dependence of the remaining error statistics is still evident. The Pathfinder approach for deriving a season-specific set of coefficients, one for August to October and one for the rest of the year, provides the smallest rmsd overall that is also stable over time.
文摘Providing a reliable and efficient communication infrastructure for critical regions is generally a strategy used to enhance regional safety or to sustain regional development. For such purposes, the spider-web network is prototyped as a cellular telecommunication infrastructure for its advantages including being interference-free, possessing fault-tolerance, having security management, and countering radio's multipath effects. Besides, it is used to develop area-based-street-SCADA (supervisory control and data acquisition) networks composed of regular optimal degree-3 prototyped sub-networks with the concepts of dual-surveillance, operational order and Hamiltonian laceability, and it flexibly fits various circulation configurations. Moreover, it can offer integrative response capabilities even after two paths' SCADA networks have been ruined.
文摘This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling&train control systems in metro railways.The main concern of this paper is to minimize the failure in automated metro railways system operator and integrate the information coming from Operational Control Centre(OCC),traction SCADA system,traction power control,and power supply system.This work presents a simulated prototype of an automated metro train system operator that uses PLC and SCADA for the real time monitoring and control of the metro railway systems.Here,SCADA is used for the visualization of an automated process operation and then the whole opera-tion is regulated with the help of PLC.The PLC used in this process is OMRON(NX1P2-9024DT1)and OMRON’s Sysmac studio programming software is used for developing the ladder logic of PLC.The metro railways system has deployed infrastructure based on SCADA from the power supply system,and each station’s traction power control is connected to the OCC remotely which commands all of the stations and has the highest command priority.An alarm is triggered in the event of an emergency or system congestion.This proposed system overcomes the drawbacks of the current centralized automatic train control(CATC)system.This system provides prominent benefits like augmenting services which may enhance a network’s full load capacity and networkflexibility,which help in easy modification in the existing program at any time.
文摘Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem.
文摘Wind energy is one of the fast growing sources of power production currently, and there is a great demand to reduce the cost of operation and maintenance. Most wind farms have installed supervisory control and data acquisition (SCADA) systems for system control and logging data. However, the collected data are not used effectively. This paper proposes a fault detection method for main bearing wind turbine based on existing SCADA data using an artificial neural network (ANN). The ANN model for the normal behavior is established, and the difference between theoretical and actual values of the parameters is then calculated. Thus the early stage of main bearing fault can be identified to let the operator have sufficient time to make more informed decisions for maintenance.
文摘Real world study (RWS) has become a hotspot for clinical research. Data quality plays a vital role in research achievement and other clinical research fields. In this paper, the common quality problems in the RWS of traditional Chinese medicine are discussed, and a countermeasure is proposed.
基金Project supported by the National Natural Science Foundation of China(No.62103103)the Natural Science Foundation of Jiangsu Province,China(No.BK20210223)。
文摘The main aim of this work is to design a non-fragile sampled data control(NFSDC) scheme for the asymptotic synchronization criteria for interconnected coupled circuit systems(multi-agent systems, MASs). NFSDC is used to conduct synchronization analysis of the considered MASs in the presence of time-varying delays. By constructing suitable Lyapunov functions, sufficient conditions are derived in terms of linear matrix inequalities(LMIs) to ensure synchronization between the MAS leader and follower systems. Finally, two numerical examples are given to show the effectiveness of the proposed control scheme and less conservation of the proposed Lyapunov functions.
文摘With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of various types and jobs from different classes can only be served by certain types of server, as it is often the case in real data centers. We model this problem as a robust Markov decision process(i.e., the transition function is not assumed to be known precisely). We give sufficient conditions(which seem to be reasonable and satisfied in practice) guaranteeing that an optimal threshold policy exists. This property can then be exploited in the design of an efficient solving method, which we provide.Finally, we present some experimental results demonstrating the practicability of our approach and compare with a previous related approach based on model predictive control.
基金supported by the National Natural Science Foundation of China(Grant Nos.6142230761174061&61304048)+4 种基金the Scientific Research Starting Foundation for the Returned Overseas Chinese Scholars,Ministry of Education of Chinathe National Hi-Tech Research and Development Program of China("863"Project)(Grant No.2014AA06A503)the Youth Innovation Promotion Association,Chinese Academy of Sciences,in part by the Youth Top-Notch Talent Support Programthe 1000-Talent Youth ProgramZhejiang 1000-Talent Program
文摘A class of networked control systems is investigated whose communication network is shared with other applications. The design objective for such a system setting is not only the optimization of the control performance but also the efficient utilization of the communication resources. We observe that at a large time scale the data packet delay in the communication network is roughly varying piecewise constant, which is typically true for data networks like the Internet. Based on this observation, a dynamic data packing scheme is proposed within the recently developed packet-based control framework for networked control systems. As expected this proposed approach achieves a fine balance between the control performance and the communication utilization: the similar control performance can be obtained at dramatically reduced cost of the communication resources. Simulations illustrate the effectiveness of the proposed approach.