A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear ph...A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear physical substructures. The study presented in this paper is focused on further validating the RTHS platform using a nonlinear viscoelastic-plastic damper that has displacement, frequency and temperature-dependent properties. The validation study includes damper component characterization tests, as well as RTHS of a series of single-degree-of-freedom (SDOF) systems equipped with viscoelastic-plastic dampers that represent different structural designs. From the component characterization tests, it was found that for a wide range of excitation frequencies and friction slip loads, the tracking errors are comparable to the errors in RTHS of linear spring systems. The hybrid SDOF results are compared to an independently validated thermal- mechanical viscoelastic model to further validate the ability for the platform to test nonlinear systems. After the validation, as an application study, nonlinear SDOF hybrid tests were used to develop performance spectra to predict the response of structures equipped with damping systems that are more challenging to model analytically. The use of the experimental performance spectra is illustrated by comparing the predicted response to the hybrid test response of 2DOF systems equipped with viscoelastic-plastic dampers.展开更多
- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate...- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate diffraction coefficients are selected. And the results of the formulae given in the paper agree satisfactorily with those experimental data now available. The proposed computational method is effective and convenient to use in evaluating the horizontal and vertical wave forces on the mat. An exmaple is also given in this paper. Finally, the effects of the vertical wave force on the platorm's sit-on-bottom stability are analyzed.展开更多
Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM)...Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM) is the first step of the transformation.This paper proposes an approach for this transformation with pattern.In this approach, we take advantage of"reuse"from various standpoints.Feature model is used to describe the requirement of the application.This can help us bring"reuse"into effect at requirement level.Moreover we use pattern to transform CIM to PIM.This can help us bring"reuse"into effect at development level.Meanwhile, pattern was divided into four hierarchies.Different hierarchies of pattern are used to help us utilize reuse at different phase of development.From another standpoint, feature model describes the problem of a domain while pattern describe the problem across domains.This can help us reuse the element in and across domains.Finally, the detailed process of the transformation is given.展开更多
In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and cen...In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and centralized mass of the platform top are all determined by using a coefficient-revising method.展开更多
The paper presents an innovative approach to studying the reuse of a decommissioned natural gas production platformfor the seasonal storage and extraction of a hydrogen-methane(H2-CH4)mixture froma depleted reservoir....The paper presents an innovative approach to studying the reuse of a decommissioned natural gas production platformfor the seasonal storage and extraction of a hydrogen-methane(H2-CH4)mixture froma depleted reservoir.The reuse plan involves removing outdated equipment from the platform’s decks while retaining essential components such as wellheads and separators.Exploiting a depleted reservoir for the injection of an H_(2)-CH_(4) mixture requires a thorough understanding of its specific characteristics.This paper focuses on the engineering approach adopted in the basic design phase for such a conversion,providing recommendations and HSE guidelines.Given the hazardous nature of substances like hydrogen in the gas mixture,the paper also examines potential risk scenarios,particularly those involving containment loss.A qualitative and quantitative assessment of these risks is conducted to evaluate their impact on the structure and equipment.The results of this assessment serve as a foundation for later studies on layout optimization and domino effect prevention.Additionally,some critical scenarios are simulated using an innovative approach known as the Source Box Accident Model(SBAM),which was proposed in previous works.SBAM leverages Computational Fluid Dynamics(CFD)but decouples the accidental phenomenon into a release phase and a dispersion phase.This method overcomes the challenges conventional CFD tools face in assessing congested plant configurations,providing more precise estimations of gas cloud behavior.The simulation results indicate that the released gas remains within the platform deck domain,and the flammable cloud is significantly smaller than what traditional,simplified tools predict.展开更多
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w...Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.展开更多
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry...Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.展开更多
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu...Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.展开更多
Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Ch...Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Chinese medicine”,“chemotherapy”and“diarrhea”as the theme words,comprehensive search of the database of CNKI,Wanfang and VIP from its inception to November 2020 was conduct-ed.The formulas of external treatment of traditional Chinese medicine for chemotherapy-induced diarrhea were included and the association rule,clustering and factor analysis were carried out.Results:A total of 145 papers,57 prescriptions meeting the inclusion criteria were collected,among which high-frequency drugs including Baizhu(Atractylodis macrocephalae rhizoma),Fuling(Poria),Dangshen(Codonopsisradix),Huanglian(Coptidis rhizoma),Zhigancao(Glycyrrhizae radix et rhizoma praeparata cum melle)were the most commonly used.The confidence level was set as 0.7 and the support level was set as 10,12 core compatibility groups were obtained,and 6 categories were cluster analyzed.Conclusion:The principle of external treatment of chemotherapy-induced diarrhea is mainly“restore deficiency and benefiting qi”,“benefiting water infiltration and dampness”,“clearing heat”and“inducing astringency”.Prescription combination and new prescription combination based on traditional Chinese medicine(TCM)inheritance computing platform system can be used as reference for clinicians and applied in primary hospitals.展开更多
Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Th...Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Things and other advanced information technologies to build an economics and management ERP virtual simulation experiment teaching platform.Cloud computing and big data,virtual simulation experiment teaching resources with"resource library+project library+enterprise management simulation sandbox training"as the core can build an online and offline collaborative and practical experiment teaching platform.It is expected to achieve the ideal effect of integration of three spaces.Such as physics and resources and social digital teaching.Moreover,it can also benefit human-computer collaboration and interactive teaching and inquiry learning.展开更多
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a...This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.展开更多
Practice training is very important for students learning Computer networks.But building a real laboratory is constrained and expensive.In this paper,we present an online experimental platform for computer networks co...Practice training is very important for students learning Computer networks.But building a real laboratory is constrained and expensive.In this paper,we present an online experimental platform for computer networks course based on Dynamips simulator.Instructors and students can access the platform by IE Browser to manage and take router experiments.On the basis of deployment and testing,the platform is effective and flexible.展开更多
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o...Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.展开更多
针对当前电离层现报和预报数据精度不足、多源异构数据融合困难等问题,本文基于全球卫星导航系统(Global Navigation Satellite System,GNSS)和垂测观测数据,设计了一套电离层融合处理和预报系统。采用限带卡尔曼滤波模型,基于银河麒麟...针对当前电离层现报和预报数据精度不足、多源异构数据融合困难等问题,本文基于全球卫星导航系统(Global Navigation Satellite System,GNSS)和垂测观测数据,设计了一套电离层融合处理和预报系统。采用限带卡尔曼滤波模型,基于银河麒麟操作系统和云计算平台,利用容器云、高可用、分布式架构实现全球及中国周边区域电离层总电子含量(Total Electron Content,TEC)、F2层临界频率(Critical Frequency of the F2 Layer,foF2)及电子密度的高精度现报和预报。实验测试表明,该系统现报延迟约5 min、空间时间分辨率达到5°×2.5°×15 min,较传统数据处理方法有较大提升。系统支持三维电子密度可视化,为电离层研究、卫星导航修正、短波通信及地基雷达等应用提供可靠数据支撑,为无线电系统应用提供高精度、高时效的电离层环境信息服务。展开更多
基金NSERC Discovery under Grant 371627-2009 and NSERC RTI under Grant 374707-2009 EQPEQ programs
文摘A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear physical substructures. The study presented in this paper is focused on further validating the RTHS platform using a nonlinear viscoelastic-plastic damper that has displacement, frequency and temperature-dependent properties. The validation study includes damper component characterization tests, as well as RTHS of a series of single-degree-of-freedom (SDOF) systems equipped with viscoelastic-plastic dampers that represent different structural designs. From the component characterization tests, it was found that for a wide range of excitation frequencies and friction slip loads, the tracking errors are comparable to the errors in RTHS of linear spring systems. The hybrid SDOF results are compared to an independently validated thermal- mechanical viscoelastic model to further validate the ability for the platform to test nonlinear systems. After the validation, as an application study, nonlinear SDOF hybrid tests were used to develop performance spectra to predict the response of structures equipped with damping systems that are more challenging to model analytically. The use of the experimental performance spectra is illustrated by comparing the predicted response to the hybrid test response of 2DOF systems equipped with viscoelastic-plastic dampers.
文摘- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate diffraction coefficients are selected. And the results of the formulae given in the paper agree satisfactorily with those experimental data now available. The proposed computational method is effective and convenient to use in evaluating the horizontal and vertical wave forces on the mat. An exmaple is also given in this paper. Finally, the effects of the vertical wave force on the platorm's sit-on-bottom stability are analyzed.
基金supported by the National Natural Science Foundation of China (Grant No.601730301)the National BasicResearch Program of China (973 Program) (Grant No.2002CB312001)
文摘Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM) is the first step of the transformation.This paper proposes an approach for this transformation with pattern.In this approach, we take advantage of"reuse"from various standpoints.Feature model is used to describe the requirement of the application.This can help us bring"reuse"into effect at requirement level.Moreover we use pattern to transform CIM to PIM.This can help us bring"reuse"into effect at development level.Meanwhile, pattern was divided into four hierarchies.Different hierarchies of pattern are used to help us utilize reuse at different phase of development.From another standpoint, feature model describes the problem of a domain while pattern describe the problem across domains.This can help us reuse the element in and across domains.Finally, the detailed process of the transformation is given.
基金The project is supported by the National Natural Science Foundation of China
文摘In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and centralized mass of the platform top are all determined by using a coefficient-revising method.
基金funded by the Italian Ministry of Environment and Energy Security(MASE)-Direzione Generale per le Fonti energetiche e Titoli Abilitativi(DGFTA).
文摘The paper presents an innovative approach to studying the reuse of a decommissioned natural gas production platformfor the seasonal storage and extraction of a hydrogen-methane(H2-CH4)mixture froma depleted reservoir.The reuse plan involves removing outdated equipment from the platform’s decks while retaining essential components such as wellheads and separators.Exploiting a depleted reservoir for the injection of an H_(2)-CH_(4) mixture requires a thorough understanding of its specific characteristics.This paper focuses on the engineering approach adopted in the basic design phase for such a conversion,providing recommendations and HSE guidelines.Given the hazardous nature of substances like hydrogen in the gas mixture,the paper also examines potential risk scenarios,particularly those involving containment loss.A qualitative and quantitative assessment of these risks is conducted to evaluate their impact on the structure and equipment.The results of this assessment serve as a foundation for later studies on layout optimization and domino effect prevention.Additionally,some critical scenarios are simulated using an innovative approach known as the Source Box Accident Model(SBAM),which was proposed in previous works.SBAM leverages Computational Fluid Dynamics(CFD)but decouples the accidental phenomenon into a release phase and a dispersion phase.This method overcomes the challenges conventional CFD tools face in assessing congested plant configurations,providing more precise estimations of gas cloud behavior.The simulation results indicate that the released gas remains within the platform deck domain,and the flammable cloud is significantly smaller than what traditional,simplified tools predict.
基金Supported by the National High Technology Research and Development Program of China (2005AA145110)
文摘Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.
基金Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 ,90104005) HP Laborato-ry of China
文摘Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.
基金National Natural Science Foundation of China Youth Science Foundation Project(No.81904001)Capital Health Development Scientific Research Project(No.first issue 2018-1-4061)+1 种基金State Administration of Traditional Chinese Medicine Clinical Collaboration Project of TCM and Western Medicine for Major and Intractable Diseases(No.2019-ZX-005)In-Hospital Project of China-Japan Friendship Hospital(No.2019-1-QN-56)。
文摘Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Chinese medicine”,“chemotherapy”and“diarrhea”as the theme words,comprehensive search of the database of CNKI,Wanfang and VIP from its inception to November 2020 was conduct-ed.The formulas of external treatment of traditional Chinese medicine for chemotherapy-induced diarrhea were included and the association rule,clustering and factor analysis were carried out.Results:A total of 145 papers,57 prescriptions meeting the inclusion criteria were collected,among which high-frequency drugs including Baizhu(Atractylodis macrocephalae rhizoma),Fuling(Poria),Dangshen(Codonopsisradix),Huanglian(Coptidis rhizoma),Zhigancao(Glycyrrhizae radix et rhizoma praeparata cum melle)were the most commonly used.The confidence level was set as 0.7 and the support level was set as 10,12 core compatibility groups were obtained,and 6 categories were cluster analyzed.Conclusion:The principle of external treatment of chemotherapy-induced diarrhea is mainly“restore deficiency and benefiting qi”,“benefiting water infiltration and dampness”,“clearing heat”and“inducing astringency”.Prescription combination and new prescription combination based on traditional Chinese medicine(TCM)inheritance computing platform system can be used as reference for clinicians and applied in primary hospitals.
基金the 2020 University Innovation and Entrepreneurship Project of Guangdong University of Foreign Studies.
文摘Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Things and other advanced information technologies to build an economics and management ERP virtual simulation experiment teaching platform.Cloud computing and big data,virtual simulation experiment teaching resources with"resource library+project library+enterprise management simulation sandbox training"as the core can build an online and offline collaborative and practical experiment teaching platform.It is expected to achieve the ideal effect of integration of three spaces.Such as physics and resources and social digital teaching.Moreover,it can also benefit human-computer collaboration and interactive teaching and inquiry learning.
基金Project supported by the General Project of Natural Science Foundation of Hunan Province(Grant Nos.2024JJ5273 and 2023JJ50328)the Scientific Research Project of Education Department of Hunan Province(Grant Nos.22A0049 and 22B0699)。
文摘This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.
文摘Practice training is very important for students learning Computer networks.But building a real laboratory is constrained and expensive.In this paper,we present an online experimental platform for computer networks course based on Dynamips simulator.Instructors and students can access the platform by IE Browser to manage and take router experiments.On the basis of deployment and testing,the platform is effective and flexible.
文摘Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.
文摘针对当前电离层现报和预报数据精度不足、多源异构数据融合困难等问题,本文基于全球卫星导航系统(Global Navigation Satellite System,GNSS)和垂测观测数据,设计了一套电离层融合处理和预报系统。采用限带卡尔曼滤波模型,基于银河麒麟操作系统和云计算平台,利用容器云、高可用、分布式架构实现全球及中国周边区域电离层总电子含量(Total Electron Content,TEC)、F2层临界频率(Critical Frequency of the F2 Layer,foF2)及电子密度的高精度现报和预报。实验测试表明,该系统现报延迟约5 min、空间时间分辨率达到5°×2.5°×15 min,较传统数据处理方法有较大提升。系统支持三维电子密度可视化,为电离层研究、卫星导航修正、短波通信及地基雷达等应用提供可靠数据支撑,为无线电系统应用提供高精度、高时效的电离层环境信息服务。