期刊文献+

计算机系统应用中的可靠性问题 被引量:2

ON RELIABILITY IN APPLICATION OF COMPUTER SYSTEMS
下载PDF
导出
摘要 分析了电磁干扰及其对计算机系统干扰的机理、接地处理的重要性。提出了系统应用中必须综合考虑系统的可靠性 ,防止通过变压器和仪器的共同供电配电系统引入的干扰 ,提出为了保证系统可靠应用 。 This paper analyzes the underlying principles of electromagnetic interference and its interference with computer systems and the importance of ground processing.It argues that the reliability of the systems in application should be considered in an all-round way and interference caused by common power supply and the distribution system of the transformer and the instrument.Some anti-interference measures are recommended for the safe application of computer systems.
作者 吴常红
机构地区 西南农业大学
出处 《西南农业大学学报(自然科学版)》 CSCD 北大核心 2001年第1期93-96,共4页 Journal of Southwest Agricultural University
关键词 DCS 电磁干扰 电磁廉容 AC接地 DC接地 计算机系统 应用 可靠性 DCS electromagnetic interference electromagnetic compatibility AC ground DC ground shielding ground
  • 相关文献

参考文献6

  • 1吴常红.series9000回路和逻辑控制器在我国工业中的应用展望.全国网络,微机学术会议论文集[M].,1991,11.30.
  • 2吴常红.浅谈产品质量的现场管理和控制.中国仪器仪表学会首届青年学术会议论文集[M].,1992,2.24.
  • 3吴常红.可编程序控制器发展趋势初探.中国仪器仪表学会第二届青年科技大会和中国科协第二届青年学术年会卫星会议论文集[M].,1994,5.16.
  • 4吴常红,中国仪器仪表学会第二届青年科技大会和中国科协第二届青年学术年会卫星会议论文集,1994年
  • 5吴常红,中国仪器仪表学会首届青年学术会议论文集,1992年
  • 6吴常红,全国网络,微机学术会议论文集,1991年,1130页

同被引文献10

  • 1Thomas H Hinke, Harry S. Protecting databases from inference attacks [ J]. Computer & Security, 2000,16 ( 8 ):687 - 708.
  • 2Li Lixin, Liao Changrong, Chen Weiming, et al. Inference attack analysis of MLS DBMS using rough set theory [ J ].Proceedings of 7th Joint International Computer Conference,Shantou, China, 2001:1 339- 1 452.
  • 3L Wang, D Wijesekera, J Sushil. Cardinality- based inference control in sum - only data cubes [J]. In Proceedings of the 7th European Symposium on Research in Computer Security, 2002.
  • 4J Domingo- Ferrer. Advances in inference control in statistical databases: An overview in inference control in statistical databases: from theory to practice [ J ]. LNCS 2316, Springer - Verlag, 2002:1 -7.
  • 5T Su, G Ozsoyogiu. Data dependencies and inference control in multilevel relational database systems [ J ]. In Proceedings of the IEEE Symposium on Security and Privacy,1987:202-211.
  • 6J Millen. Honesty is the best policy [J]. In Proceedings of the 3rd Rome Laboratory Database Security Workshop, 2001.
  • 7S Rizvi, J Haritsa. Maintaining data privacy in association rule mining [ J ]. In Proceedings of the 28th International Conference on Very Large Data Bases, 2002:682 -693.
  • 8A Evfimievski, J Gehrke, R Srikant. Limiting privacy breaches in privacy preserving data mining [ J ]. In Proceedings of the 22nd Symposium on Principles of Database Systems, ACM Press, 2003:211-222.
  • 9王艳梅,侯立刚,杜文军.DCS系统接地的探讨[J].工业仪表与自动化装置,2009(2):83-85. 被引量:3
  • 10吴春明,郑志强.基于WEB数据库加密研究[J].西南农业大学学报(自然科学版),2004,26(2):220-222. 被引量:8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部