Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be...Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.展开更多
Estimating the global position of a road vehicle without using GPS is a challenge that many scientists look forward to solving in the near future. Normally, inertial and odometry sensors are used to complement GPS mea...Estimating the global position of a road vehicle without using GPS is a challenge that many scientists look forward to solving in the near future. Normally, inertial and odometry sensors are used to complement GPS measures in an attempt to provide a means for maintaining vehicle odometry during GPS outage. Nonetheless, recent experiments have demonstrated that computer vision can also be used as a valuable source to provide what can be denoted as visual odometry. For this purpose, vehicle motion can be estimated using a non-linear, photogrametric approach based on RAndom SAmple Consensus (RANSAC). The results prove that the detection and selection of relevant feature points is a crucial factor in the global performance of the visual odometry algorithm. The key issues for further improvement are discussed in this letter.展开更多
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con...At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.展开更多
A technique for testing space object receivers using global navigation satellite system (GNSS) signal simulator of the navigation field is proposed. Its structure consists of two blocks which allow synthesizing the ...A technique for testing space object receivers using global navigation satellite system (GNSS) signal simulator of the navigation field is proposed. Its structure consists of two blocks which allow synthesizing the scenario of reciprocal displacement of the receiver relative to navigation satellites and their signals. In the first block, according to the known coordinates of the receiver which are specified in tabular form or analytically, the distances between the receiver and the navigation satellites are calculated as well as their relative velocities. According to these data, the second block synthesizes the signals of navigational travelers with the specified characteristics which are transmitted via the air or cable with a given attenuation to the receiver. This allows testing on the earth receivers for airplanes and space objects under different scenarios of their movement, which not only reduces the risk of problems during the flight, but also avoids significant economic costs. Based on real data obtained by approaching two spacecraft using a simulator, the receiver was tested, which shows the promise of the proposed technology.展开更多
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft...Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.展开更多
In this paper the authors explore the Global Positioning System (GPS) signal acquisition and tracking algorithms used in software GPS receiver. Acquisition time is the most important parameter in evaluating the perf...In this paper the authors explore the Global Positioning System (GPS) signal acquisition and tracking algorithms used in software GPS receiver. Acquisition time is the most important parameter in evaluating the performance of a software GPS receiver in terms of its speed. A trade-off study is done to seek a good balance between the acquisition accuracy and the processing time. The frequency-domain acquisition method by circular correlation, used in a software GPS receiver, has been improved by studying the power spectrum of the Coarse Acquisition (C/A) code alone. The analysis of C/A code reveals that its power spectrum is symmetrical; hence only half the points are required to perform circular correlation. Besides, either half of the spectrum is asymmetrical where a larger amount of power is concentrated in almost one-quarter of the spectrum on its either sides. This further reduces the number of points used to perform correlation. Comparative results of MATLAB simulation of full-size, half-size and quarter-size circular correlation done on actual data stored on hard disk are provided, and they agree with those obtained using GPS receiver. Further reduction in acquisition time has been achieved by investigating the effect of length of the noncoherent pre-integration period. The improved acquisition methods pave way for further development of new algorithms to enhance software GPS receiver performance.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
A GPS IF signal computer simulation method is proposed in this article. The carrier Doppler frequency and the total propagation and delay time can be modeled or calculated with the input GPS satellite ephemeris file. ...A GPS IF signal computer simulation method is proposed in this article. The carrier Doppler frequency and the total propagation and delay time can be modeled or calculated with the input GPS satellite ephemeris file. The simulated GPS IF signal outputs to a text file for post-processing and analysis. The simulation signal spectrum is compared with the received real GPS IF signal spectrum, and the correctness of the simulation result is verified.展开更多
基金Project 2002CB412705 supported by the Major State Basic Research Development Program (973) of China
文摘Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.
文摘Estimating the global position of a road vehicle without using GPS is a challenge that many scientists look forward to solving in the near future. Normally, inertial and odometry sensors are used to complement GPS measures in an attempt to provide a means for maintaining vehicle odometry during GPS outage. Nonetheless, recent experiments have demonstrated that computer vision can also be used as a valuable source to provide what can be denoted as visual odometry. For this purpose, vehicle motion can be estimated using a non-linear, photogrametric approach based on RAndom SAmple Consensus (RANSAC). The results prove that the detection and selection of relevant feature points is a crucial factor in the global performance of the visual odometry algorithm. The key issues for further improvement are discussed in this letter.
基金Acknowledgements This work was supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) and National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008).
文摘At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.
文摘A technique for testing space object receivers using global navigation satellite system (GNSS) signal simulator of the navigation field is proposed. Its structure consists of two blocks which allow synthesizing the scenario of reciprocal displacement of the receiver relative to navigation satellites and their signals. In the first block, according to the known coordinates of the receiver which are specified in tabular form or analytically, the distances between the receiver and the navigation satellites are calculated as well as their relative velocities. According to these data, the second block synthesizes the signals of navigational travelers with the specified characteristics which are transmitted via the air or cable with a given attenuation to the receiver. This allows testing on the earth receivers for airplanes and space objects under different scenarios of their movement, which not only reduces the risk of problems during the flight, but also avoids significant economic costs. Based on real data obtained by approaching two spacecraft using a simulator, the receiver was tested, which shows the promise of the proposed technology.
基金Projects(61202004,61272084)supported by the National Natural Science Foundation of ChinaProjects(2011M500095,2012T50514)supported by the China Postdoctoral Science Foundation+2 种基金Projects(BK2011754,BK2009426)supported by the Natural Science Foundation of Jiangsu Province,ChinaProject(12KJB520007)supported by the Natural Science Fund of Higher Education of Jiangsu Province,ChinaProject(yx002001)supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.
文摘In this paper the authors explore the Global Positioning System (GPS) signal acquisition and tracking algorithms used in software GPS receiver. Acquisition time is the most important parameter in evaluating the performance of a software GPS receiver in terms of its speed. A trade-off study is done to seek a good balance between the acquisition accuracy and the processing time. The frequency-domain acquisition method by circular correlation, used in a software GPS receiver, has been improved by studying the power spectrum of the Coarse Acquisition (C/A) code alone. The analysis of C/A code reveals that its power spectrum is symmetrical; hence only half the points are required to perform circular correlation. Besides, either half of the spectrum is asymmetrical where a larger amount of power is concentrated in almost one-quarter of the spectrum on its either sides. This further reduces the number of points used to perform correlation. Comparative results of MATLAB simulation of full-size, half-size and quarter-size circular correlation done on actual data stored on hard disk are provided, and they agree with those obtained using GPS receiver. Further reduction in acquisition time has been achieved by investigating the effect of length of the noncoherent pre-integration period. The improved acquisition methods pave way for further development of new algorithms to enhance software GPS receiver performance.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
基金Supported by the Research Fund (2008-2009) of State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensingthe Na-tional 863 Program of China (No2008AA12Z308)
文摘A GPS IF signal computer simulation method is proposed in this article. The carrier Doppler frequency and the total propagation and delay time can be modeled or calculated with the input GPS satellite ephemeris file. The simulated GPS IF signal outputs to a text file for post-processing and analysis. The simulation signal spectrum is compared with the received real GPS IF signal spectrum, and the correctness of the simulation result is verified.