26 resultados para model-based security management
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
In this paper, a logarithmic expression to describe the residual strength degradation process is developed in order to fatigue test results for normalized carbon steel. The definition and expression of fatigue damage due to symmetrical stress with a constant amplitude are also given. The expression of fatigue damage can also explain the nonlinear properties of fatigue damage. Furthermore, the fatigue damage of structures under random stress is analyzed, and an iterative formula to describe the fatigue damage process is deduced. Finally, an approximate method for evaluating the fatigue life of structures under repeated random stress blocking is presented through various calculation examples.
Resumo:
An optical communication scheme of 2-D pattern transfer based on imaging optics for submarine laser uplink communication (SLUC) is suggested. Unlike the methods aiming at avoiding neighboring crosstalk used in traditional multi-channel optical beam transferring, we make full use of the overlapping of each spreading beam other than controlling divergence effect of each beam to avoid interference noise. The apparent parameters have been introduced to simplify theoretical analysis of optical pattern transfer problem involving underwater condition, with the help of which the complex beam propagation inside two kinds of mediums can be easily reduced to brief beam transfer only inside air medium. In this paper, optical transmission path and receiver terminal optics geometry have been described in detail. The link range equation and system uplink performance analysis have also been given. At last, results of a proof-of-concept experiment indicate good feasibility of the proposed SLUC model. © 2007 Elsevier GmbH. All rights reserved.
Resumo:
Formulation of a 16-term error model, based on the four-port ABCD-matrix and voltage and current variables, is outlined. Matrices A, B, C, and D are each 2 x 2 submatrices of the complete 4 x 4 error matrix. The corresponding equations are linear in terms of the error parameters, which simplifies the calibration process. The parallelism with the network analyzer calibration procedures and the requirement of five two-port calibration measurements are stressed. Principles for robust choice of equations are presented. While the formulation is suitable for any network analyzer measurement, it is expected to be a useful alternative for the nonlinear y-parameter approach used in intrinsic semiconductor electrical and noise parameter measurements and parasitics' deembedding.
Resumo:
A mobile agent system model based on the servlet technology is presented, the constitution and working process of the system are analyzed. The implementation of key parts of this model and the current development situation as well as the development trend of mobile agent technology are introduced. The mobile agent system model enhances its internal structure recognition and facilitates the system expansion and reformation. The remotely mobile agent control method by means of the protocol modification is presented.
Resumo:
In this paper, a disturbance controller is designed for making robotic system behave as a decoupled linear system according to the concept of internal model. Based on the linear system, the paper presents an iterative learning control algorithm to robotic manipulators. A sufficient condition for convergence is provided. The selection of parameter values of the algorithm is simple and easy to meet the convergence condition. The simulation results demonstrate the effectiveness of the algorithm..
Resumo:
A numerical model has been developed for simulating the rapid solidification processing (RSP) of Ni-Al alloy in order to predict the resultant phase composition semi-quantitatively during RSP. The present model couples the initial nucleation temperature evaluating method based on the time dependent nucleation theory, and solidified volume fraction calculation model based on the kinetics model of dendrite growth in undercooled melt. This model has been applied to predict the cooling curve and the volume fraction of solidified phases of Ni-Al alloy in planar flow casting. The numerical results agree with the experimental results semi-quantitatively.
Resumo:
A second-order dynamic model based on the general relation between the subgrid-scale stress and the velocity gradient tensors was proposed. A priori test of the second-order model was made using moderate resolution direct numerical simulation date at high Reynolds number ( Taylor microscale Reynolds number R-lambda = 102 similar to 216) for homogeneous, isotropic forced flow, decaying flow, and homogeneous rotating flow. Numerical testing shows that the second-order dynamic model significantly improves the correlation coefficient when compared to the first-order dynamic models.
Resumo:
提出一个基于动态可信度的可调节安全模型MSMBDTD(modified security model based on dynamic trusted degree),它在可信计算的可信认证和度量的基础上,定义可信度判定规则,对系统运行过程中可信度的变化实施动态分析,在此基础上分别调节主体的访问权限,使可信度和访问范围保持一致,实现基于可信度的访问控制。文中对MSMBDTD进行了形式化描述,并分析和证明了模型的安全性。
Resumo:
网络脆弱性分析是近年来国内外研究的热点问题之一.基于攻击能力增长的网络安全性分析模型以攻击者的能力增长为主导,参考网络环境配置,模拟黑客攻击自动生成攻击图.使用攻击能力增长表示攻击者的最终目标使得攻击图的表示更为准确.最小攻击代价分析第1次考虑了相似攻击对攻击代价的影响,以便对各条路径的攻击代价进行计算;最小环境改变分析考虑入侵检测的因素对最可能的攻击路径进行分析,对于入侵检测系统的处理更加科学合理;两种分析都为改善网络配置提供了依据.与已有成果相比,模型提出的算法和方法更为实际可行.