The factor of safety of mechanically stabilized earth(MSE) structures can be analyzed either using limit equilibrium method(LEM) or strength reduction method(SRM) in finite element/difference method. In LEM, the stren...The factor of safety of mechanically stabilized earth(MSE) structures can be analyzed either using limit equilibrium method(LEM) or strength reduction method(SRM) in finite element/difference method. In LEM, the strengths of the reinforcement members and soils are reduced with the same factor. While using the SRM, only soil strength is reduced during the calculation of the factor of safety. This causes inconsistence in calculating the factor of safety of the MSE structures. To overcome this, an iteration method is proposed to consider the strength reduction of the reinforcements in SRM. The method is demonstrated by using PLAXIS, a finite element software. The results show that the factor of safety converges after a few iterations. The reduction of strength has different effects on the factor of safety depending on the properties of the reinforcements and the soil, and failure modes.展开更多
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s...Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
基金Project(41072200)supported by the National Natural Science Foundation of ChinaProject(14PJD032)supported by the Shanghai Pujiang Program,China
文摘The factor of safety of mechanically stabilized earth(MSE) structures can be analyzed either using limit equilibrium method(LEM) or strength reduction method(SRM) in finite element/difference method. In LEM, the strengths of the reinforcement members and soils are reduced with the same factor. While using the SRM, only soil strength is reduced during the calculation of the factor of safety. This causes inconsistence in calculating the factor of safety of the MSE structures. To overcome this, an iteration method is proposed to consider the strength reduction of the reinforcements in SRM. The method is demonstrated by using PLAXIS, a finite element software. The results show that the factor of safety converges after a few iterations. The reduction of strength has different effects on the factor of safety depending on the properties of the reinforcements and the soil, and failure modes.
文摘Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.