期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
公路灾后恢复重建规划研究——以黄冈市旅游公路为例 被引量:2
1
作者 柯昌波 郑建振 孔令伟 《青海交通科技》 2020年第4期5-10,共6页
2016年6月,黄冈市全境连续出现四轮强降雨天气,特大暴雨袭击致使黄冈灾情惨重,公路基础设施受到了严重损毁。由于地处山区,红色旅游路损毁更为严重,多处中断,造成重大经济损失。红色旅游公路的损毁对黄冈大别山地区的旅游业带来了巨大... 2016年6月,黄冈市全境连续出现四轮强降雨天气,特大暴雨袭击致使黄冈灾情惨重,公路基础设施受到了严重损毁。由于地处山区,红色旅游路损毁更为严重,多处中断,造成重大经济损失。红色旅游公路的损毁对黄冈大别山地区的旅游业带来了巨大的冲击,也为沿线居民出行带来诸多不便。本文通过对红色旅游公路灾后恢复重建规划的研究,在对灾后恢复重建的公路规划特点分析的基础上,对黄冈市大别山红色旅游公路灾后恢复重建规划进行了分析,从规划和修复原则、修复方案等方面对黄冈市灾后恢复重建规划进行了研究,为以后的灾后恢复重建的公路规划提供一些参考。 展开更多
关键词 灾后恢复重建 黄冈 公路 规划
下载PDF
A user requirements-oriented privacy policy self-adaption scheme in cloud computing
2
作者 changbo ke Fu XIAO +1 位作者 Zhiqiu HUANG Fangxiong XIAO 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第2期33-44,共12页
In an ever-changing environment,Software as a Service(SaaS)can rarely protect users'privacy.Being able to manage and control the privacy is therefore an important goal for SaaS.Once the participant of composite se... In an ever-changing environment,Software as a Service(SaaS)can rarely protect users'privacy.Being able to manage and control the privacy is therefore an important goal for SaaS.Once the participant of composite service is substituted,it is unclear whether the composite service satisfy user privacy requirement or not.In this paper,we propose a privacy policies automatic update method to enhance user privacy when a service participant change in the composite service.Firstly,we model the privacy policies and service variation rules.Secondly,according to the service variation rules,the privacy policies are automatically generated through the negotiation between user and service composer.Thirdly,we prove the feasibility and applicability of our method with the experiments.When the service quantity is 50,ratio that the services variations are successfully checked by monitor is 81%.Moreover,ratio that the privacy policies are correctly updated is 93.6%. 展开更多
关键词 cloud computing SaaS service privacy protec-tion privacy policies update
原文传递
Fine-Grained Bulk NiTi Shape Memory Alloy Fabricated by Rapid Solidifcation Process and Its Mechanical Properties and Damping Performance 被引量:6
3
作者 Hongjie Jiang Shanshan Cao +2 位作者 changbo ke Xiao Ma Xinping Zhang 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2013年第9期855-862,共8页
A near-equiatomic NiTi shape memory alloy was fabricated by rapid solidification process through vacuum arc melting followed by vacuum suction casting in water-cooled thick copper mold. The rapidly solidified (or suc... A near-equiatomic NiTi shape memory alloy was fabricated by rapid solidification process through vacuum arc melting followed by vacuum suction casting in water-cooled thick copper mold. The rapidly solidified (or suction cast) NiTi alloy shows much finer grains and homogenous microstructure, in particular a uniform distribution of various fine precipitates, compared to the conventional cast one. The resultant alloy also exhibits the homogenous Ni distribution in the matrix of the alloy, allowing the martensitic transformation to take place throughout the NiTi alloy matrix simultaneously and resulting in sharper transformation peaks compared to the conventional cast alloy. Moreover, the suction cast NiTJ alloy shows a significant improvement over the conventional cast one, in terms of possessing higher deformation recovery rates and displaying the increased compressive strength and damping capacity by 4% and 20%, respectively. 展开更多
关键词 NiTi shape memory alloy Rapid solidification Mierostructure Mechanical property Damping performance
原文传递
A topology and risk-aware access control framework for cyber-physical space
4
作者 Yan CAO Zhiqiu HUANG +2 位作者 Yaoshen YU changbo ke Zihao WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第4期181-195,共15页
Cyber-physical space is a spatial environment that integrates the cyber world and the physical world,aiming to provide an intelligent environment for users to conduct their day-to-day activities.The interplay between ... Cyber-physical space is a spatial environment that integrates the cyber world and the physical world,aiming to provide an intelligent environment for users to conduct their day-to-day activities.The interplay between the cyber space and physical space proposes specific security requirements that are not captured by traditional access control frameworks.On one hand,the security of the physical space and the cyber space should be both concerned in the cyber-physical space.On the other hand,the bad results caused by failure in providing secure policy enforcement may directly affect the controlled physical world.In this paper,we propose an effective access control framework for the cyber-physical space.Firstly,a topology-aware access control(TAAC)model is proposed.It can express the cyber access control,the physical access control,and the interaction access control simultaneously.Secondly,a risk assessment approach is proposed for the policy enforcement phase.It is used to evaluate the user behavior and ensures that the suspicious behaviors executed by authorized users can be handled correctly.Thirdly,we propose a role activation algorithm to ensure that the objects are accessed only by legal and honest users.Finally,we evaluate our approach by using an illustrative example and the performance analysis.The results demonstrate the feasibility of our approach. 展开更多
关键词 cyber-physical space access control risk management role activation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部