This paper presents a ZUC-256 stream cipher algorithm hardware system in order to prevent the advanced security threats for 5 G wireless network.The main innovation of the hardware system is that a six-stage pipeline ...This paper presents a ZUC-256 stream cipher algorithm hardware system in order to prevent the advanced security threats for 5 G wireless network.The main innovation of the hardware system is that a six-stage pipeline scheme comprised of initialization and work stage is employed to enhance the solving speed of the critical logical paths.Moreover,the pipeline scheme adopts a novel optimized hardware structure to fast complete the Mod(231-1)calculation.The function of the hardware system has been validated experimentally in detail.The hardware system shows great superiorities.Compared with the same type system in recent literatures,the logic delay reduces by 47%with an additional hardware resources of only 4 multiplexers,the throughput rate reaches 5.26 Gbps and yields at least 45%better performance,the throughput rate per unit area increases 14.8%.The hardware system provides a faster and safer encryption module for the 5G wireless network.展开更多
Many years experience of the operation of high stress (>72% specified minimum yield strength, SMYS) gas pipelines and statistical analysis results of pipeline incidents showed that the operating pipelines at stress...Many years experience of the operation of high stress (>72% specified minimum yield strength, SMYS) gas pipelines and statistical analysis results of pipeline incidents showed that the operating pipelines at stress levels over 72% SMYS have not presented problems in USA and Canada, and design factor does not control incidents or the safety of pipelines. Enhancing pipeline safety management level is most important for decreasing incident rate. The application history of higher design factors in the U.S and Canada was reviewed. And the effect of higher factors to the critical flaw size, puncture resistance, change of reliability with time, risk level and the arrest toughness requirements of pipeline were analyzed here. The comparison of pipeline failure rates and risk levels between two design factors (0.72 and 0.8) has shown that a change in design factor from 0.72 to 0.8 would bring little effect on failure rates and risk levels. On the basis of the analysis result, the application feasibility of design factor of 0.8 in China was discussed and the related suggestions were proposed. When an operator wishes to apply design factor 0.8 to gas pipeline, the following process is recommended: stress level of line pipe hydro test should be up to 100% SMYS, reliability and risk assessment at the design feasibility or conceptual stage should be conducted, Charpy impact energy should meet the need of pipeline crack arrest; and establish and execute risk based integrity management plan. The technology of pipeline steel metallurgy, line pipe fabrication and pipeline construction, and line pipe quality control level in China achieved tremendous progresses, and line pipe product standards and property indexes have come up to international advanced level. Furthermore, pipeline safety management has improved greatly in China. Consequently, the research for the feasibility of application of design factor of 0.8 in China has fundamental basis.展开更多
Total site heat integration(TSHI) provides more opportunities for energy saving in industry clusters. Some design methods including direct integration using process streams and indirect integration using intermediate-...Total site heat integration(TSHI) provides more opportunities for energy saving in industry clusters. Some design methods including direct integration using process streams and indirect integration using intermediate-fluid circuits, i.e., steam, dowtherms and hot water, have been proposed during last few decades. Indirect heat integration is preferred when the heat sources and sinks are separated in independent plants with rather long distance. This improves energy efficiency by adaption of intermediate fluid circle which acts as a utility provider for plants in a symbiotic network. However, there are some significant factors ignored in conventional TSHI, i.e. the investment of pipeline, cost of pumping and heat loss. These factors simultaneously determine the possibility and performance of heat integration. This work presents a new methodology for indirect heat integration in low temperature range using hot water circuit as intermediate-fluid medium. The new methodology enables the targeting of indirect heat integration across plants considering the factors mentioned earlier. An MINLP model with economic objective is established and solved. The optimization results give the mass flow rate of intermediate-fluid, diameter of pipeline, the temperature of the circuits and the matches of heat exchanger networks(HENS) automatically. Finally, the application of this proposed methodology is illustrated with a case study.展开更多
Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network co...Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.展开更多
Pipelines, as means of transportation of water and hydrocarbon have been co<span style="white-space:normal;font-size:10pt;font-family:;" "="">nsidered “effective, safe and reliable”. O...Pipelines, as means of transportation of water and hydrocarbon have been co<span style="white-space:normal;font-size:10pt;font-family:;" "="">nsidered “effective, safe and reliable”. Over the years, pipeline failures in Niger Delta region of Nigeria have resulted in loss of lives, water pollution, soil contamination, air pollution, destruction of infrastructures and aquatic lives, and other losses. The study area, Niger Delta region is located on Latitude 4<span style="white-space:nowrap;">°</span>50</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">' </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">N, longitude 6<span style="white-space:nowrap;">°</span>00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">'</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">E and comprised of nine coastal states of Ni</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">geria (about 70,000</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">km<sup>2</sup>). Failure data were collected using: Questionnaires administered to experienced pipeline engineers in the International oil and gas companies (IOCs), Personnel interviews, and reports from the Department of Petroleum Resources, Nigerian National Petroleum Corporation (NNPC). This study assessed the strategies employed by four IOCs to mitigate pipeline failures in the process of asset integrity management. Design and construction methods detailing pipelines laying to infiltration</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">discouraging-depth were st</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">udied. The results obtained showed that vandalism is presently the major cause of pipeline failures. Deep burial solution was therefore explored as a vandalism mitigation approach and its cost of implementation for a typical Φ20</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""></span><span style="white-space:normal;font-size:10pt;font-family:;" "="">× 15</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">km trunkline in the region showed 9.627% (</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">≈809.3 million Naira) rise co</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">mpared to the normal burial option, and this difference accrued mainly from equipment and personnel cost. This is a paltry sum compared to the huge losses due to vandalism. Finally, this study posits that the available regulatory framework is now inadequate for pipeline design, construction, and operations due to this challenge and requires urgent amendment in favour of deep burial option.</span>展开更多
In this paper, the integrity assessment of pressurized pipelines containing defects is performed by direct simplified methods of limit and shakedown analysis. The defects considered are part-through slots of various g...In this paper, the integrity assessment of pressurized pipelines containing defects is performed by direct simplified methods of limit and shakedown analysis. The defects considered are part-through slots of various geometrical configurations. The engineering situation considered here has practical importance in the pressure vessel and pipe industry. The results are compared with those obtained by a step-by-step procedure using the professional code ABAQUS and where possible, with those provided by semi-empirical formulae used in engineering. The simplified methods are found more economical and more reliable than marching solutions achieved by step-by-step evolutive elastic-plastic analysis. The effects of various part-through slots on the load-carrying capacities of pipelines are investigated.展开更多
基金supported in part by the National R&D Program for Major Research Instruments of China(Grant No:62027814)the National Natural Science Foundation of China(Grant No:62104054)+2 种基金the Natural Science Foundation of Heilongjiang Province(Grant No:F2018010)the Postdoctoral Science Foundation of Heilongjiang Province,China(No:LBH-Z20133)the Fundamental Research Funds for The Central Universities,China(3072021CF0806)。
文摘This paper presents a ZUC-256 stream cipher algorithm hardware system in order to prevent the advanced security threats for 5 G wireless network.The main innovation of the hardware system is that a six-stage pipeline scheme comprised of initialization and work stage is employed to enhance the solving speed of the critical logical paths.Moreover,the pipeline scheme adopts a novel optimized hardware structure to fast complete the Mod(231-1)calculation.The function of the hardware system has been validated experimentally in detail.The hardware system shows great superiorities.Compared with the same type system in recent literatures,the logic delay reduces by 47%with an additional hardware resources of only 4 multiplexers,the throughput rate reaches 5.26 Gbps and yields at least 45%better performance,the throughput rate per unit area increases 14.8%.The hardware system provides a faster and safer encryption module for the 5G wireless network.
基金supported by China National Petroleum Corporation Application Fundamental Research Foundation (Grant No. 07A40401)
文摘Many years experience of the operation of high stress (>72% specified minimum yield strength, SMYS) gas pipelines and statistical analysis results of pipeline incidents showed that the operating pipelines at stress levels over 72% SMYS have not presented problems in USA and Canada, and design factor does not control incidents or the safety of pipelines. Enhancing pipeline safety management level is most important for decreasing incident rate. The application history of higher design factors in the U.S and Canada was reviewed. And the effect of higher factors to the critical flaw size, puncture resistance, change of reliability with time, risk level and the arrest toughness requirements of pipeline were analyzed here. The comparison of pipeline failure rates and risk levels between two design factors (0.72 and 0.8) has shown that a change in design factor from 0.72 to 0.8 would bring little effect on failure rates and risk levels. On the basis of the analysis result, the application feasibility of design factor of 0.8 in China was discussed and the related suggestions were proposed. When an operator wishes to apply design factor 0.8 to gas pipeline, the following process is recommended: stress level of line pipe hydro test should be up to 100% SMYS, reliability and risk assessment at the design feasibility or conceptual stage should be conducted, Charpy impact energy should meet the need of pipeline crack arrest; and establish and execute risk based integrity management plan. The technology of pipeline steel metallurgy, line pipe fabrication and pipeline construction, and line pipe quality control level in China achieved tremendous progresses, and line pipe product standards and property indexes have come up to international advanced level. Furthermore, pipeline safety management has improved greatly in China. Consequently, the research for the feasibility of application of design factor of 0.8 in China has fundamental basis.
基金Supported by the National Basic Research Program of China(2012CB720500)the National Natural Science Foundation of China(21476256)
文摘Total site heat integration(TSHI) provides more opportunities for energy saving in industry clusters. Some design methods including direct integration using process streams and indirect integration using intermediate-fluid circuits, i.e., steam, dowtherms and hot water, have been proposed during last few decades. Indirect heat integration is preferred when the heat sources and sinks are separated in independent plants with rather long distance. This improves energy efficiency by adaption of intermediate fluid circle which acts as a utility provider for plants in a symbiotic network. However, there are some significant factors ignored in conventional TSHI, i.e. the investment of pipeline, cost of pumping and heat loss. These factors simultaneously determine the possibility and performance of heat integration. This work presents a new methodology for indirect heat integration in low temperature range using hot water circuit as intermediate-fluid medium. The new methodology enables the targeting of indirect heat integration across plants considering the factors mentioned earlier. An MINLP model with economic objective is established and solved. The optimization results give the mass flow rate of intermediate-fluid, diameter of pipeline, the temperature of the circuits and the matches of heat exchanger networks(HENS) automatically. Finally, the application of this proposed methodology is illustrated with a case study.
文摘Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.
文摘Pipelines, as means of transportation of water and hydrocarbon have been co<span style="white-space:normal;font-size:10pt;font-family:;" "="">nsidered “effective, safe and reliable”. Over the years, pipeline failures in Niger Delta region of Nigeria have resulted in loss of lives, water pollution, soil contamination, air pollution, destruction of infrastructures and aquatic lives, and other losses. The study area, Niger Delta region is located on Latitude 4<span style="white-space:nowrap;">°</span>50</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">' </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">N, longitude 6<span style="white-space:nowrap;">°</span>00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">'</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">00</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">E and comprised of nine coastal states of Ni</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">geria (about 70,000</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">km<sup>2</sup>). Failure data were collected using: Questionnaires administered to experienced pipeline engineers in the International oil and gas companies (IOCs), Personnel interviews, and reports from the Department of Petroleum Resources, Nigerian National Petroleum Corporation (NNPC). This study assessed the strategies employed by four IOCs to mitigate pipeline failures in the process of asset integrity management. Design and construction methods detailing pipelines laying to infiltration</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">discouraging-depth were st</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">udied. The results obtained showed that vandalism is presently the major cause of pipeline failures. Deep burial solution was therefore explored as a vandalism mitigation approach and its cost of implementation for a typical Φ20</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">"</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""></span><span style="white-space:normal;font-size:10pt;font-family:;" "="">× 15</span><span style="white-space:normal;font-size:10pt;font-family:;" "=""> </span><span style="white-space:normal;font-size:10pt;font-family:;" "="">km trunkline in the region showed 9.627% (</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">≈809.3 million Naira) rise co</span><span style="white-space:normal;font-size:10pt;font-family:;" "="">mpared to the normal burial option, and this difference accrued mainly from equipment and personnel cost. This is a paltry sum compared to the huge losses due to vandalism. Finally, this study posits that the available regulatory framework is now inadequate for pipeline design, construction, and operations due to this challenge and requires urgent amendment in favour of deep burial option.</span>
基金The project was supported by the National Science and Technology Commission of ChinaThe Department of Structural Engineering ,Technical University of milan ,Tialy
文摘In this paper, the integrity assessment of pressurized pipelines containing defects is performed by direct simplified methods of limit and shakedown analysis. The defects considered are part-through slots of various geometrical configurations. The engineering situation considered here has practical importance in the pressure vessel and pipe industry. The results are compared with those obtained by a step-by-step procedure using the professional code ABAQUS and where possible, with those provided by semi-empirical formulae used in engineering. The simplified methods are found more economical and more reliable than marching solutions achieved by step-by-step evolutive elastic-plastic analysis. The effects of various part-through slots on the load-carrying capacities of pipelines are investigated.