In order to solve the problem of low precision and complication of three-dimensional modeling about micro-segment gear, one method of setting up the accurate 3D model is introduced. At first, the equation of the profi...In order to solve the problem of low precision and complication of three-dimensional modeling about micro-segment gear, one method of setting up the accurate 3D model is introduced. At first, the equation of the profile curve and the dedendum transition curve is set up, and the coordinates of the whole tooth profile are calculated by the program developed by Dephi software. And then the data of coordinates is imported to Catia, three-dimensional modeling can be got through the operations of rotating, mirror, incision and array. The method used in this paper is accurate and simple, which supplies the academic basis of CAE analysis and virtual design for micro-segment gear and relevant products.展开更多
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ...In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.展开更多
工业物联网(industrial Internet of things,IIoT)正面临着日益严峻的安全威胁,传统边界型安全模型已无法应对复杂多变的需求.零信任作为一种新兴的安全模型,以“绝不信任,始终认证”为核心原则,逐渐受到关注.然而,零信任在IIoT中的研...工业物联网(industrial Internet of things,IIoT)正面临着日益严峻的安全威胁,传统边界型安全模型已无法应对复杂多变的需求.零信任作为一种新兴的安全模型,以“绝不信任,始终认证”为核心原则,逐渐受到关注.然而,零信任在IIoT中的研究与应用仍处于起步阶段,亟需更加全面且系统的探索.系统综述了近年来工业领域零信任的发展与应用,重点分析其核心技术与实践场景,并明确当前研究趋势和未来方向.首先介绍了工业零信任的基本概念和原则,为后续讨论奠定理论基础.随后,系统梳理了工业零信任架构的迁移与评估方法,并总结了身份认证、软件定义边界、微隔离、信道安全及信任评估等关键技术,这些技术构成了工业零信任的核心支撑体系.此外,深入探讨了访问控制在零信任中的关键作用及其在权限管理中的价值.结合IIoT的典型应用场景,进一步分析零信任在复杂环境中的实践优势,最后总结了工业零信任的现存挑战和未来发展.展开更多
随着能源互联网战略的深入实施,可再生能源与微电网的参与度不断攀升,系统中不确定性因素显著增加,各参与主体间的合作与竞争关系变得愈发错综复杂。从垂直和水平两个层面建立了电网、服务商及多微电网混合博弈双层电能交易体系。在垂...随着能源互联网战略的深入实施,可再生能源与微电网的参与度不断攀升,系统中不确定性因素显著增加,各参与主体间的合作与竞争关系变得愈发错综复杂。从垂直和水平两个层面建立了电网、服务商及多微电网混合博弈双层电能交易体系。在垂直层面提出主从博弈的思想,以服务商为主导者、微电网为从属者。构建不确定性问题分阶段优化的分段鲁棒优化模型,实现不确定性的差异化调度,提高鲁棒优化的灵活性。利用布尔-列和约束生成(Bool-Column and constraint generation,B-C&CG)算法求解模型,并把整个模型分为主问题和子问题:主问题优化电价不确定性问题,子问题优化源荷不确定问题。在水平层面搭建纳什谈判模型,通过交替方向乘子(alternating direction method of multipliers,ADMM)算法求解水平层面微电网之间的电能交互模型。利用分布式求解方法得出交易价格策略,再结合拉格朗日乘子法,交替优化各分部并更新乘子,得出各微电网之间的最佳交易电价。仿真结果表明,所提方案兼顾了系统的鲁棒性、经济性及灵活性,缩减了各微电网的成本并充分保护了各微网的隐私。展开更多
基金Support by Nation Science and Technology (2009BAG12B03)
文摘In order to solve the problem of low precision and complication of three-dimensional modeling about micro-segment gear, one method of setting up the accurate 3D model is introduced. At first, the equation of the profile curve and the dedendum transition curve is set up, and the coordinates of the whole tooth profile are calculated by the program developed by Dephi software. And then the data of coordinates is imported to Catia, three-dimensional modeling can be got through the operations of rotating, mirror, incision and array. The method used in this paper is accurate and simple, which supplies the academic basis of CAE analysis and virtual design for micro-segment gear and relevant products.
基金supported by the National Natural Science Foundation of China(Grants Nos.62473146,62072249 and 62072056)the National Science Foundation of Hunan Province(Grant No.2024JJ3017)+1 种基金the Hunan Provincial Key Research and Development Program(Grant No.2022GK2019)by the Researchers Supporting Project Number(RSP2024R509),King Saud University,Riyadh,Saudi Arabia.
文摘In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
文摘工业物联网(industrial Internet of things,IIoT)正面临着日益严峻的安全威胁,传统边界型安全模型已无法应对复杂多变的需求.零信任作为一种新兴的安全模型,以“绝不信任,始终认证”为核心原则,逐渐受到关注.然而,零信任在IIoT中的研究与应用仍处于起步阶段,亟需更加全面且系统的探索.系统综述了近年来工业领域零信任的发展与应用,重点分析其核心技术与实践场景,并明确当前研究趋势和未来方向.首先介绍了工业零信任的基本概念和原则,为后续讨论奠定理论基础.随后,系统梳理了工业零信任架构的迁移与评估方法,并总结了身份认证、软件定义边界、微隔离、信道安全及信任评估等关键技术,这些技术构成了工业零信任的核心支撑体系.此外,深入探讨了访问控制在零信任中的关键作用及其在权限管理中的价值.结合IIoT的典型应用场景,进一步分析零信任在复杂环境中的实践优势,最后总结了工业零信任的现存挑战和未来发展.
文摘随着能源互联网战略的深入实施,可再生能源与微电网的参与度不断攀升,系统中不确定性因素显著增加,各参与主体间的合作与竞争关系变得愈发错综复杂。从垂直和水平两个层面建立了电网、服务商及多微电网混合博弈双层电能交易体系。在垂直层面提出主从博弈的思想,以服务商为主导者、微电网为从属者。构建不确定性问题分阶段优化的分段鲁棒优化模型,实现不确定性的差异化调度,提高鲁棒优化的灵活性。利用布尔-列和约束生成(Bool-Column and constraint generation,B-C&CG)算法求解模型,并把整个模型分为主问题和子问题:主问题优化电价不确定性问题,子问题优化源荷不确定问题。在水平层面搭建纳什谈判模型,通过交替方向乘子(alternating direction method of multipliers,ADMM)算法求解水平层面微电网之间的电能交互模型。利用分布式求解方法得出交易价格策略,再结合拉格朗日乘子法,交替优化各分部并更新乘子,得出各微电网之间的最佳交易电价。仿真结果表明,所提方案兼顾了系统的鲁棒性、经济性及灵活性,缩减了各微电网的成本并充分保护了各微网的隐私。