期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Brief introduction of ten-year (1991-2000) programme of science and technology for environmental protection in China (Abstract)
1
作者 Jin Jianming Vice Chairman of SCOPE China/CAST, NEPA 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 1993年第2期249-250,共2页
1 Science and technology for environmental protection in China The guiding principles in formulating the ten-year Programme of science and tech-nology for environmental protection are as follows: 1.1 Science and techn... 1 Science and technology for environmental protection in China The guiding principles in formulating the ten-year Programme of science and tech-nology for environmental protection are as follows: 1.1 Science and technology should be great to the need economic construction and economic construction must rely on science and technology. 展开更多
关键词 ABSTRACT Brief introduction of ten-year programme of science and technology for environmental protection in China
下载PDF
Application of Low Pressure Plasma Technology in the Field of Environmental Protection
2
作者 孙亚兵 李敏 《Plasma Science and Technology》 SCIE EI CAS CSCD 2000年第2期187-194,共8页
The characteristics of low pressure plasma produced by a gas discharges lie in thatthe energy of the electrons are much higher than that of the heavy particles in the system. Inthis paperl the low-pressure plasma trea... The characteristics of low pressure plasma produced by a gas discharges lie in thatthe energy of the electrons are much higher than that of the heavy particles in the system. Inthis paperl the low-pressure plasma treatment technology for the environmental contaminantswas synthetically studied, and the reaction processing and mechanism between the low-pressureplasma and the environmental contaminants were theoretically analyzed. At last, the prospectsand existing problems on the application of low-pressure plasma in the field of environmentalprotection were discussed. 展开更多
关键词 SPM Application of Low Pressure Plasma technology in the Field of Environmental protection
下载PDF
A Special Report of Visit to Director Zhang Xiaolu of Department of Science &Technology and Environmental Protection, the State Power Corporation of China──Top Leveled Enterprise Must Possess Top Leveled Science & Technology Innovation Ability
3
《Electricity》 2000年第2期30-36,共7页
关键词 A Special Report of Visit to Director Zhang Xiaolu of Innovation Department of Science Power Corporation of China technology Innovation Ability technology and Environmental protection Top Leveled Enterprise Must Possess Top Leveled Science the State ZHANG
下载PDF
Technological Situation ofChina's Environmental Protection Industry and Key Sphere of ForeignCooperation
4
《China's Foreign Trade》 1998年第10期18-20,共3页
关键词 Technological Situation ofChina’s Environmental protection Industry and Key Sphere of ForeignCooperation
下载PDF
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks 被引量:2
5
作者 Fei Li Jiayan Zhang +3 位作者 Edward Szczerbicki Jiaqi Song Ruxiang Li Renhong Diao 《Computers, Materials & Continua》 SCIE EI 2020年第10期653-681,共29页
The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these... The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate. 展开更多
关键词 Internet of vehicles safety protection technology intrusion detection system advanced auto-encoder recurrent neural network time-based back propagation algorithm
下载PDF
Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme
6
作者 Yung-Yao Chen Yu-Chen Hu +1 位作者 Ting-Kai Yang You-An Wang 《Computers, Materials & Continua》 SCIE EI 2022年第6期5167-5182,共16页
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication an... Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods. 展开更多
关键词 Content protection technology security for image data absolute moment block truncation coding(AMBTC) direct binary search(DBS)
下载PDF
Development trends of environmental protection technologies for Chinese steel industry 被引量:5
7
作者 Hai-feng Wang Chun-xia Zhang +4 位作者 Jun-mao Qie Ji-cheng Zhou Yang Liu Xiu-ping Li Fang-qin Shangguan 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2017年第3期235-242,共8页
Chinese steel industry has made significant progress on reducing fresh water consumption and CO_2/SO_2/COD( chemical oxygen demand) /dust emissions,and improving comprehensive utilization of solid waste. Some steel ... Chinese steel industry has made significant progress on reducing fresh water consumption and CO_2/SO_2/COD( chemical oxygen demand) /dust emissions,and improving comprehensive utilization of solid waste. Some steel companies have become topped worldwide. However,due to the large output quantity of crude steel,the whole steel industry is still a huge source of pollutants. At present,environmental protection standards are encountering challenges of lack of technical support,taxation policy and other issues. Steel industry is currently facing enormous environmental pressure. The development trends of environmental protection technologies were studied by summarizing different development stages. To realize the development targets,the industry needs to carry out its research with independent intellectual property rights,develop comprehensive management systems and establish ecological chain with other industries. This can not only raise the level of environmental protection in a broader range,but also improve the energy efficiency of iron and steel plants and increase added value of waste utilization. Finally,23 environmental protection technologies were proposed and 4 new environmental protection practices were studied. 展开更多
关键词 ENVIRONMENTAL protection technology Chinese steel industry Development trend Ecological chain Environmental status ENVIRONMENTAL protection practice
原文传递
New Approach to Lightning Strike Risk Assessment of Wind Farm
8
作者 Xiaofei MENG Chiyu ZHONG +5 位作者 Junjie ZHOU Yu HUANG Jinglin LIANG Kuangzheng QING Jianming LI Yan YANG 《Meteorological and Environmental Research》 2024年第5期48-51,55,共5页
In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment ... In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment of wind farms was conducted according to the Lightning Protection for Wind Energy System(IEC 61400-24-2019),which proposed the method of lightning strike risk assessment for wind turbine.In fact,the basic idea of the two is the same,that is,the source of the lightning strike wind turbine is transformed from the former S1-S4 to the latter N D-N DJ.According to the above method,wind farm was evaluated,and it has been proved that the practice can not achieve good results.After 2018,China has issued the Guide to Evaluation of Lightning Protection Technology in Buildings(T/GZLY 3-2022)and the Technical Specifications for Lightning Interception in Forest Areas(T/LYCY 4062-2024)based on semicircle protection,in which the source of risk defined by lightning point was closer to the reality,highly targeted and effective.Taking offshore wind farm as an example,this paper introduced a new method of establishing six evaluation indicators to determine the risk level according to the principle of compliance and the new protection technology of semi-circular method,which can be used as a reference for technical personnel. 展开更多
关键词 Lightning strike risk assessment New protection technology of semi-circular method Basic principle New evaluation method
下载PDF
A Scheme of Memory Privacy Protection in Cloud Computing Environment
9
作者 LIU Kehao CAO Ming +1 位作者 FU Nan MA Jing 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期307-312,共6页
With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhanc... With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhance system security. Based on the monitoring of foreign mapping for Dom0, a memory privacy protection scheme is designed and implemented to prevent process memory pages in DomU being mapped illegally which might result in the leakage of secret data. 展开更多
关键词 virtualization technology virtual domain foreign mapping the protection of memory privacy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部