The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data...The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable.展开更多
The developing processes of stress and deformation fields of a protected layer after mining an upper-protective layer with a bow pseudo-incline technique were simulated to locate the protection region. The pressure re...The developing processes of stress and deformation fields of a protected layer after mining an upper-protective layer with a bow pseudo-incline technique were simulated to locate the protection region. The pressure relief of the protected layer was analyzed after mining the upper-protective layer. The pressure relief angle along the strike and incline were located according to the roles of protection of the deformation and stress pressure-relief of the protective layer after mining. This results show that the upper-protective layer with the bow pseudo-incline technique have an upper and downside pressure relief angle of 85 and 68 degrees respectively; the distribution of strike pressure relief angles along the pseudo-incline working face is uneven and their values range from 38.3 to 51 degrees. The pressure relief angle of the inclined middle location was the largest. The distribution of the protection region of the upper-protective layer with the bow pseudo-incline teelmique located by practical tests and numerical simulation is essentially consistent, compared with the results obtained by these methods.展开更多
Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The exp...Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference.展开更多
With an increase of mining the upper limits under unconsolidated aquifers, dewatering of the bottom aquifer of the Quaternary system has become a major method to avoid water and sand inrushes.In the 8th District of th...With an increase of mining the upper limits under unconsolidated aquifers, dewatering of the bottom aquifer of the Quaternary system has become a major method to avoid water and sand inrushes.In the 8th District of the Taiping Coal Mine in south-western Shandong province, the bottom aquifer of the Quaternary system is moderate to excellent in water-yielding capacity.The base rock above the coal seam is very thin in the concealed coal field of the Carboniferous and Permian systems.Therefore, a comprehensive dewatering plan from both the ground surface and the panel was proposed to lower the groundwater level in order to ensure mining safety.According to the hydrogeologic conditions of the 8th District, we established a numerical model so that we could simulate the groundwater flow in the dewatering process.We obtained the simulation parameters from previous data using backward modeling, such as the average coefficient of permeability of 12 m/d and the elastic storage coefficient of 0.002.From the same model, we predicted the movement of groundwater and water level variables and obtained the visible effect of the dewatering project.Despite the overburden failure during mining, no water and/or sand inrush occurred because the groundwater level in the bottom aquifer was lowered to a safe water level.展开更多
An alluvium with a sandy aquifer at the bottom,but lacking an effective impermeable layer between the sandy aquifer and bedrock is referred to as a special alluvial stratum.Impacted by the drainage of the aquifer due ...An alluvium with a sandy aquifer at the bottom,but lacking an effective impermeable layer between the sandy aquifer and bedrock is referred to as a special alluvial stratum.Impacted by the drainage of the aquifer due to mining activities,a shaft wall in this special alluvial stratum will be subject to a downward load by an additional vertical force which must be taken into consideration in the design of the shaft wall.The complexity of interaction between shaft wall and the surrounding walls makes it extremely difficult to determine this additional vertical force.For a particular shaft wall in an extra-thick alluvium and assuming that the friction coefficient between shaft wall and stratum does not change with depth,an analysis of a numerical simulation of the stress within the shaft wall has been carried out.Growth and size of the additional vertical stress have been obtained,based on specific values of the friction coefficient,the modulus of elasticity of the drainage layer and the thickness of the drainage layer.Subsequently, the safety of shaft walls with different structural types was studied and a more suitable structural design,providing an important basis for the design of shaft walls,is promoted.展开更多
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi...Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level.展开更多
In the past, the probabilities of basic events were described as triangular or trapezoidal fuzzy number that cannot characterize the common distribution of the primary events in engineering, and the fault tree analyze...In the past, the probabilities of basic events were described as triangular or trapezoidal fuzzy number that cannot characterize the common distribution of the primary events in engineering, and the fault tree analyzed by fuzzy set theory did not include repeated basic events. This paper presents a new method to analyze the fault tree by using normal fuzzy number to describe the fuzzy probability of each basic event which is more suitably used to analyze the reliability in safety systems, and then the formulae of computing the fuzzy probability of the top event of the fault tree which includes repeated events are derived. Finally, an example is given.展开更多
Goafs are threats to safe mining.Their imaging effects or those of other complex geological bodies are often poor in conventional reflected wave images.Hence,accurate detection of goafs has become an important problem...Goafs are threats to safe mining.Their imaging effects or those of other complex geological bodies are often poor in conventional reflected wave images.Hence,accurate detection of goafs has become an important problem,to be solved with a sense of urgency.Based on scattering theory,we used an equivalent offset method to extract Common Scattering Point gathers,in order to analyze different scattering wave characteristics between Common Scattering Point and Common Mid Point gathers and to compare stack and migration imaging effects.Our research results show that the scattering wave imaging method is more efficient than the conventional imaging method and is therefore a more effective imaging method for detecting goafs and other complex geological bodies.It has important implications for safe mining procedures and infrastructures.展开更多
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s...Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.展开更多
It is important to study the methane transport phenomenon in a longwall panel under descensional ventilation conditions. In this paper the gob area is divided into a number of nodes to represent the rectangular percol...It is important to study the methane transport phenomenon in a longwall panel under descensional ventilation conditions. In this paper the gob area is divided into a number of nodes to represent the rectangular percolating elements. The connections between nodes (elements) become branches,so that a network can be formed. Using the mechanics of porous media fluid flow, the mathematical model of air and gas flows has been established. Based on the existing ground pressure theories,the porosity of the inhomogeneous porous media in the gob can be given. In computer simulation it is considered that air pressure and temperature are functions of position ; air density, viscosity, and natural ventilation pressure are functions of temperature,pressure and methane concentration,and the resistance varies with air density and viscosity. Finally,the calculation results are given to show the differences between ascensional and descensional ventilation methods.展开更多
文摘The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable.
基金Projects PLN0610 supported by the Open Fund of State Key Lab of Oil and Gas Reservoir Geology and Exploitation (Southwest Petroleum University)HKLGF200706 by the Opening Project of Henan Key Laboratory of Coal Mine Methane and Fire Prevention+3 种基金50334060, 50474025 and 50774106 by the National Natural Science Foundation of China2005CB221502 by the National Basic Research Program of China50621403 by the Natural Science Innova-tion Group Foundation of ChinaCSTC, 2006BB7147, 2006AA7002 by the Natural Science Foundation of Chongqing
文摘The developing processes of stress and deformation fields of a protected layer after mining an upper-protective layer with a bow pseudo-incline technique were simulated to locate the protection region. The pressure relief of the protected layer was analyzed after mining the upper-protective layer. The pressure relief angle along the strike and incline were located according to the roles of protection of the deformation and stress pressure-relief of the protective layer after mining. This results show that the upper-protective layer with the bow pseudo-incline technique have an upper and downside pressure relief angle of 85 and 68 degrees respectively; the distribution of strike pressure relief angles along the pseudo-incline working face is uneven and their values range from 38.3 to 51 degrees. The pressure relief angle of the inclined middle location was the largest. The distribution of the protection region of the upper-protective layer with the bow pseudo-incline teelmique located by practical tests and numerical simulation is essentially consistent, compared with the results obtained by these methods.
基金This work was supported by the National Natural Science Foundation of China(No.51878507).
文摘Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference.
基金Projects 40372123, 40772192 supported by the National Natural Science Foundation of ChinaNCET-04-0486 by the Program for New Century Excellent Talents in University of China2007CB209400 by the National Basic Research Program of China
文摘With an increase of mining the upper limits under unconsolidated aquifers, dewatering of the bottom aquifer of the Quaternary system has become a major method to avoid water and sand inrushes.In the 8th District of the Taiping Coal Mine in south-western Shandong province, the bottom aquifer of the Quaternary system is moderate to excellent in water-yielding capacity.The base rock above the coal seam is very thin in the concealed coal field of the Carboniferous and Permian systems.Therefore, a comprehensive dewatering plan from both the ground surface and the panel was proposed to lower the groundwater level in order to ensure mining safety.According to the hydrogeologic conditions of the 8th District, we established a numerical model so that we could simulate the groundwater flow in the dewatering process.We obtained the simulation parameters from previous data using backward modeling, such as the average coefficient of permeability of 12 m/d and the elastic storage coefficient of 0.002.From the same model, we predicted the movement of groundwater and water level variables and obtained the visible effect of the dewatering project.Despite the overburden failure during mining, no water and/or sand inrush occurred because the groundwater level in the bottom aquifer was lowered to a safe water level.
文摘An alluvium with a sandy aquifer at the bottom,but lacking an effective impermeable layer between the sandy aquifer and bedrock is referred to as a special alluvial stratum.Impacted by the drainage of the aquifer due to mining activities,a shaft wall in this special alluvial stratum will be subject to a downward load by an additional vertical force which must be taken into consideration in the design of the shaft wall.The complexity of interaction between shaft wall and the surrounding walls makes it extremely difficult to determine this additional vertical force.For a particular shaft wall in an extra-thick alluvium and assuming that the friction coefficient between shaft wall and stratum does not change with depth,an analysis of a numerical simulation of the stress within the shaft wall has been carried out.Growth and size of the additional vertical stress have been obtained,based on specific values of the friction coefficient,the modulus of elasticity of the drainage layer and the thickness of the drainage layer.Subsequently, the safety of shaft walls with different structural types was studied and a more suitable structural design,providing an important basis for the design of shaft walls,is promoted.
基金the National Natural Science Foundation of China under Grant,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level.
文摘In the past, the probabilities of basic events were described as triangular or trapezoidal fuzzy number that cannot characterize the common distribution of the primary events in engineering, and the fault tree analyzed by fuzzy set theory did not include repeated basic events. This paper presents a new method to analyze the fault tree by using normal fuzzy number to describe the fuzzy probability of each basic event which is more suitably used to analyze the reliability in safety systems, and then the formulae of computing the fuzzy probability of the top event of the fault tree which includes repeated events are derived. Finally, an example is given.
基金Financial support for this work,provided by the Key National Project(No.2008ZX05035)the State Science and Technology Support Program,the National Natural Science Foundation of China (Nos.40574057,40874054,40804026)the State Basic Research and Development Program of China(No.2007CB209406)
文摘Goafs are threats to safe mining.Their imaging effects or those of other complex geological bodies are often poor in conventional reflected wave images.Hence,accurate detection of goafs has become an important problem,to be solved with a sense of urgency.Based on scattering theory,we used an equivalent offset method to extract Common Scattering Point gathers,in order to analyze different scattering wave characteristics between Common Scattering Point and Common Mid Point gathers and to compare stack and migration imaging effects.Our research results show that the scattering wave imaging method is more efficient than the conventional imaging method and is therefore a more effective imaging method for detecting goafs and other complex geological bodies.It has important implications for safe mining procedures and infrastructures.
文摘Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.
文摘It is important to study the methane transport phenomenon in a longwall panel under descensional ventilation conditions. In this paper the gob area is divided into a number of nodes to represent the rectangular percolating elements. The connections between nodes (elements) become branches,so that a network can be formed. Using the mechanics of porous media fluid flow, the mathematical model of air and gas flows has been established. Based on the existing ground pressure theories,the porosity of the inhomogeneous porous media in the gob can be given. In computer simulation it is considered that air pressure and temperature are functions of position ; air density, viscosity, and natural ventilation pressure are functions of temperature,pressure and methane concentration,and the resistance varies with air density and viscosity. Finally,the calculation results are given to show the differences between ascensional and descensional ventilation methods.