从车地无线通信、车载控制模型、轨旁设备应用等方面有针对性地研究了设计速度在160~200 km/h下基于通信的列车运行控制(CBTC,Communication Based Train Control)系统的高速适应性问题,提出了速度提升后CBTC系统相对应的改进方案。从...从车地无线通信、车载控制模型、轨旁设备应用等方面有针对性地研究了设计速度在160~200 km/h下基于通信的列车运行控制(CBTC,Communication Based Train Control)系统的高速适应性问题,提出了速度提升后CBTC系统相对应的改进方案。从理论上分析,传统CBTC系统在完成适配性改进后,能够满足此速度等级下安全运行的要求。展开更多
In view of the fact that safety production supervision of coal mines in China features low efficacy, this paper applies principles of cybernetics to simulate the dynamic process of safety supervision, and proposes tha...In view of the fact that safety production supervision of coal mines in China features low efficacy, this paper applies principles of cybernetics to simulate the dynamic process of safety supervision, and proposes that institutional variables be controlled to support intermediate goals, which in turn contribute to the ultimate safety production objective. Rather than focusing all attention on safety issues of working faces, supervising departments of coalmines are advised to pay much more attention to institutional factors that may impact people’s attitude and behavior, which are responsible for most coalmine accidents. It is believed that such a shift of attention can effectively reduce coalmining production accidents and greatly enhance supervision efficacy.展开更多
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the...Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.展开更多
文摘从车地无线通信、车载控制模型、轨旁设备应用等方面有针对性地研究了设计速度在160~200 km/h下基于通信的列车运行控制(CBTC,Communication Based Train Control)系统的高速适应性问题,提出了速度提升后CBTC系统相对应的改进方案。从理论上分析,传统CBTC系统在完成适配性改进后,能够满足此速度等级下安全运行的要求。
文摘In view of the fact that safety production supervision of coal mines in China features low efficacy, this paper applies principles of cybernetics to simulate the dynamic process of safety supervision, and proposes that institutional variables be controlled to support intermediate goals, which in turn contribute to the ultimate safety production objective. Rather than focusing all attention on safety issues of working faces, supervising departments of coalmines are advised to pay much more attention to institutional factors that may impact people’s attitude and behavior, which are responsible for most coalmine accidents. It is believed that such a shift of attention can effectively reduce coalmining production accidents and greatly enhance supervision efficacy.
文摘Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.