The quality of contour blasting depends on many initial blasting parameters.The parameters including blasthole diameter,rock Protodyakonov coefficient,tunnel area and distance between cracks on the tunnel face are mor...The quality of contour blasting depends on many initial blasting parameters.The parameters including blasthole diameter,rock Protodyakonov coefficient,tunnel area and distance between cracks on the tunnel face are more important.In this study,an algorithm linking between Delphi programming language and AutoCAD was created to develop a tunnel blasting model.Using this model,tunnel contour blasting passport in AutoCAD can be obtained automatically.The effects of rock Protodyakonov coefficient and cracks’distance on blastholes number and specific charge with the variation of blasthole diameter and the semi-circular tunnel face area were investigated to yield a set of equations with the highest correlations.The results show that specific charge increases as rock Protodyakonov coefficient,cracks’distance and drillhole diameter increase,but decreases when tunnel face area increases.In addition,the number of drillholes increases linearly as tunnel face area increases but decreases when drillhole diameter increases.展开更多
Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key co...Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key commercial intellectual properties. Recently, deep model intellectual property protection has drawn great attention from both academia and industry, and numerous works have been proposed. However, most of them focus on the classification task. In this paper, we present the first attempt at protecting deep semantic segmentation models from potential infringements. In details, we design a new hybrid intellectual property protection framework by combining the trigger-set based and passport based watermarking simultaneously. Within it, the trigger-set based watermarking mechanism aims to force the network output copyright watermarks for a pre-defined trigger image set, which enables black-box remote ownership verification. And the passport based watermarking mechanism is to eliminate the ambiguity attack risk of trigger-set based watermarking by adding an extra passport layer into the target model. Through extensive experiments, the proposed framework not only demonstrates its effectiveness upon existing segmentation models, but also shows strong robustness to different attack techniques.展开更多
The passport option is a call option on the balance of a trading account. The option holder retains the gain from trading, while the issuer is liable for the net loss. In this article, the mathematical foundation for ...The passport option is a call option on the balance of a trading account. The option holder retains the gain from trading, while the issuer is liable for the net loss. In this article, the mathematical foundation for pricing the European passport option is established. The pricing equation which is a fully nonlinear equation is derived using the dynamic programming principle. The comparison principle, uniqueness and convexity preserving of the viscosity solutions of related H J13 equation are proved. A relationship between the passport and lookback options is discussed.展开更多
The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its variou...The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its various services including student portal Breo, Learning Resources and Student Email Access and others through the Shibboleth. Like the University of Bedfordshire the other Universities in the UK are also implementing the Shibboleth system in their access management control. Therefore, the researchers of this project have found it important to evaluate its efficiency and effectiveness of Shibboleth from different perspectives. In the first part of this paper it tries to explain the features of Shibboleth as SSO services and compares it with other SSO services like Athens, Kerberos, etc. Then in the middle section, the authors go through the steps of installation and configuration of the Shibboleth. In the end of the paper, based on the survey of real users of Shibboleth at the University of Bedfordshire, the authors give its insights on the effectiveness of the Shibboleth as SSO service. Throughout this investigation, the authors have applied a triangulation to find out user and service provider viewpoint about Shibboleth. Although there were some problems persisted, the authors also implemented the Shibboleth system successfully to figure out different problems, efficiency and effectiveness. The recommendations and conclusion have been provided at the end of this project.展开更多
文摘The quality of contour blasting depends on many initial blasting parameters.The parameters including blasthole diameter,rock Protodyakonov coefficient,tunnel area and distance between cracks on the tunnel face are more important.In this study,an algorithm linking between Delphi programming language and AutoCAD was created to develop a tunnel blasting model.Using this model,tunnel contour blasting passport in AutoCAD can be obtained automatically.The effects of rock Protodyakonov coefficient and cracks’distance on blastholes number and specific charge with the variation of blasthole diameter and the semi-circular tunnel face area were investigated to yield a set of equations with the highest correlations.The results show that specific charge increases as rock Protodyakonov coefficient,cracks’distance and drillhole diameter increase,but decreases when tunnel face area increases.In addition,the number of drillholes increases linearly as tunnel face area increases but decreases when drillhole diameter increases.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.61872189,41975183,61825601)in part by the Natural Science Foundation of Jiangsu Province(BK20191397).
文摘Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key commercial intellectual properties. Recently, deep model intellectual property protection has drawn great attention from both academia and industry, and numerous works have been proposed. However, most of them focus on the classification task. In this paper, we present the first attempt at protecting deep semantic segmentation models from potential infringements. In details, we design a new hybrid intellectual property protection framework by combining the trigger-set based and passport based watermarking simultaneously. Within it, the trigger-set based watermarking mechanism aims to force the network output copyright watermarks for a pre-defined trigger image set, which enables black-box remote ownership verification. And the passport based watermarking mechanism is to eliminate the ambiguity attack risk of trigger-set based watermarking by adding an extra passport layer into the target model. Through extensive experiments, the proposed framework not only demonstrates its effectiveness upon existing segmentation models, but also shows strong robustness to different attack techniques.
基金supported in partby National Science Foundation of China (10371088,10671144)National Basic Research Program of China(2007CB814903)+3 种基金Development Funds of Shanghai Higher Education (05D210)the Special Funds for Major Specialties of Shanghai Education Committee (T0401)Supported by Special Fund for the Excellent Young Teachers of Shanghai Higher Learning Institutions (ssd08029)the Research Program of Shanghai Normal University (SK200812)
文摘The passport option is a call option on the balance of a trading account. The option holder retains the gain from trading, while the issuer is liable for the net loss. In this article, the mathematical foundation for pricing the European passport option is established. The pricing equation which is a fully nonlinear equation is derived using the dynamic programming principle. The comparison principle, uniqueness and convexity preserving of the viscosity solutions of related H J13 equation are proved. A relationship between the passport and lookback options is discussed.
文摘The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its various services including student portal Breo, Learning Resources and Student Email Access and others through the Shibboleth. Like the University of Bedfordshire the other Universities in the UK are also implementing the Shibboleth system in their access management control. Therefore, the researchers of this project have found it important to evaluate its efficiency and effectiveness of Shibboleth from different perspectives. In the first part of this paper it tries to explain the features of Shibboleth as SSO services and compares it with other SSO services like Athens, Kerberos, etc. Then in the middle section, the authors go through the steps of installation and configuration of the Shibboleth. In the end of the paper, based on the survey of real users of Shibboleth at the University of Bedfordshire, the authors give its insights on the effectiveness of the Shibboleth as SSO service. Throughout this investigation, the authors have applied a triangulation to find out user and service provider viewpoint about Shibboleth. Although there were some problems persisted, the authors also implemented the Shibboleth system successfully to figure out different problems, efficiency and effectiveness. The recommendations and conclusion have been provided at the end of this project.