期刊文献+
共找到19,034篇文章
< 1 2 250 >
每页显示 20 50 100
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
1
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance protection systems Vehicle protection Armor design
下载PDF
Introduction to Enhanced Protective Film Systems
2
作者 LIU Chunlin DAVID Palermo +2 位作者 LI Guoqiang SUN Jianyun CHEN Suwen 《Transactions of Tianjin University》 EI CAS 2008年第B10期491-494,共4页
An explosive blast mitigation alternative has increased the safety of structures by using " catcher" systems. These systems " catch" or repel the failure of the window or in-fill wall pro-tecting l... An explosive blast mitigation alternative has increased the safety of structures by using " catcher" systems. These systems " catch" or repel the failure of the window or in-fill wall pro-tecting life and property from ballistic shards or fragments. They can be designed to be stand-alone in new construction and structural retrofits or used to augment structural hardening tech-niques. Cables, fabrics, and thin gauge sheet steel are examples of catcher systems used in the past. A new and evolving category of catcher systems are based on polymeric materials that can be used for both wall and window upgrades. These products are a proven blast mitigation concept and K&C Protective Technologies Pte Ltd (KCPT) together with Sherwin-Williams(SW) use KCPT′s blast engineering capacity and SW′s material engineering principles to create engineered systems for even greater in-use performance. 展开更多
关键词 explosion blast mitigation catcher system protective film systems
下载PDF
Assessment of the Protective Capacity of Vadoze Zone over Aquifer Systems Using Secondary Geoelectrical Parameters: A Case Study of Kaltungo Area North East, Nigeria
3
作者 E.Y.Mbiimbe I.B.Goni +1 位作者 J.M.El-Nafaty A.U.Yuguda 《Journal of Environmental & Earth Sciences》 2020年第2期1-11,共11页
An assessment of the protective capacity of the vadose zone overlyingthe aquifer systems in the Kaltungo area was carried out to determine itsinfluence on groundwater quality. Applying the schlumberger array with amax... An assessment of the protective capacity of the vadose zone overlyingthe aquifer systems in the Kaltungo area was carried out to determine itsinfluence on groundwater quality. Applying the schlumberger array with amaximum electrode spread AB/2 = 100m through VES, thirty water wellpoints were surveyed using Omega terrameter (PIOSO1) resistivity meter.The field data was first subjected to manual interpretation through curvemarching and then digitized modeled curves using computer software. Theinterpreted data revealed that the area is characterized by eleven differentcurve types representing three to five geo electrical layers. In order toassess the protective capacity of the vadoze zone over the aquifer systems,the longitudinal conductance (S) and transverse resistance (T) (secondarygeoelectric parameters) were computed from the primary data using theDar Zarouk formula. The values of S obtained range from 0.0018 to 0.4056ohms with a mean value of 0.0135 ohms while the values of T range from0.55 ohms to 1195.68 ohms with a mean value of 39.84 ohms. The valuesof S and T obtained reveal that 90% of probed points has poor protectivecapacity, 10 % has moderate protective capacity and 83 % has hightransmissivity, 17 % has intermediate transmissivity. The T and S values areskewed towards poorly protective capacity thus making groundwater in thearea highly vulnerable to contamination from the surface. To achieve goodgroundwater quality in the area, proper completion of newly constructedwells should install protective casing through the entire vadose zone. 展开更多
关键词 ASSESSMENT protective Capacity Vadose zone Aquifer systems Secondary Geoelectric Parameters and Kaltungo Area
下载PDF
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
4
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
5
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 Cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
下载PDF
Design and Testing of Three Earthing Systems for Micro-Grid Protection during the Islanding Mode 被引量:2
6
作者 Rashad M. Kamel Aymen Chaouachi Ken Nagasaka 《Smart Grid and Renewable Energy》 2010年第3期132-142,共11页
This paper presents and tests three earthing systems (TT, TN and IT) for Micro-Grid (MG) protection against various fault types when the MG transferred to the islanding mode. The main contribution of this work is incl... This paper presents and tests three earthing systems (TT, TN and IT) for Micro-Grid (MG) protection against various fault types when the MG transferred to the islanding mode. The main contribution of this work is including the models of all micro sources which interfaced to the MG by power electronic inverters. Inverters in turns are provided with current limiters and this also included with the inverter models to exactly simulate the real situation in the MG during fault times. Results proved that the most suitable earthing system for MG protection during the islanding mode is the TN earthing system. That system leads to a suitable amount of fault current sufficient to activate over current pro-tection relays. With using TN earthing system, touch voltages at the faulted bus and all other consumer’s buses are less than the safety limited values during islanding mode. For the two others earthing systems (TT and IT), fault currents are small and nearly equal to the over load currents which make over current protection relay can not differentiate between fault currents and overload currents. All models of micro sources, earthing systems, inverters and control schemes are built using Matlab?/Simulink? environment. 展开更多
关键词 MICRO Grid protectION EARTHING systems Fault Current Touch Voltage MICRO Sources and INVERTERS
下载PDF
Comparison the Performances of Three Earthing Systems for Micro-Grid Protection during the Grid Connected Mode 被引量:2
7
作者 Rashad Mohammedeen Kamel Aymen Chaouachi Ken Nagasaka 《Smart Grid and Renewable Energy》 2011年第3期206-215,共10页
This paper presents, tests and compares three earthing systems (TT, TN and IT) for Micro-Grid (MG) protection against various fault types during the connected mode. The main contribution of this work is including the ... This paper presents, tests and compares three earthing systems (TT, TN and IT) for Micro-Grid (MG) protection against various fault types during the connected mode. The main contribution of this work is including the models of all the micro sources which interfaced to the MG by power electronic inverters. Inverters in turns are provided with current limiters and this also included in the inverter models to exactly simulate the real situation in the MG during fault times. Results proved that the most suitable earthing system for MG protection during the connecting mode is the TN earthing system. That system leads to a suitable amount of fault current sufficient to activate over current protection relays. With using TN system, Touch voltages at the faulted bus and all other consumer’s buses are less than the safety limited value if current limiter is included with the transformer of the main grid which connects MG. For the two others earthing systems (TT and IT), fault current is small and nearly equal to the over load current which make over current protection relay can not differentiate between fault current and overload current. All models of micro sources, earthing systems, inverters, main grid and control schemes are built using Matlab?/Simulink? environment. 展开更多
关键词 MICRO GRID protectION EARTHING systems Fault Current Touch Voltage MICRO Sources and Inverters GRID Connecting MODE
下载PDF
Composition of HT-7 LHCD and its Protection Systems
8
作者 林建安 匡光力 +7 位作者 刘岳修 单家芳 刘登成 商连全 俞家文 黄懿云 郑光华 沈慰慈 《Plasma Science and Technology》 SCIE EI CAS CSCD 2001年第6期1075-1084,共10页
In this paper, the composition of HT-7 LHCD system along with its protection systems is introduced. It is very important for us to run the LHCD system safely and efficiently.
关键词 LHCD Composition of HT-7 LHCD and its protection systems HT
下载PDF
Protected Areas, Subsistence Farming Systems and Nature Conservation
9
作者 Luis Tiberio Filipa Manso Ana Marta-Costa Carlos Fonseca Aurora Monzon 《Journal of Agricultural Science and Technology(A)》 2012年第3期402-411,共10页
The preservation of the traditional subsistence farming systems and the conservation of natural values (habitats, fauna and flora), in articulation with local development, was the key issues in this paper. The farme... The preservation of the traditional subsistence farming systems and the conservation of natural values (habitats, fauna and flora), in articulation with local development, was the key issues in this paper. The farmers have been able to manage the systems so as to cope with adverse conditions, but their future is quite uncertain. The methodology included: (1) field observation visits and cartographic information analysis of land use; (2) structured interviews with animal production and agro-forestry specialists; and (3) meetings with the participation of stakeholders. The paper concludes that depopulation is responsible for the increasing decline of agriculture and livestock. The decrease in agricultural activity in general and the consequent practices and traditional systems of agriculture causes changes in the landscape and has negative effects on nature conservation and biodiversity. Thus, we believe that the preservation and development of traditional economic activities linked to agriculture, agro-forestry and food processing are essential to maintain the typical landscape and to preserve natural values of Montemuro Site. The paper shows that in mountain areas, particularly those classified as nature network sites, farming, economic development and nature conservation are not antagonistic objectives. 展开更多
关键词 Farming systems protected areas nature conservation BIODIVERSITY local development.
下载PDF
Wind and sand control by an oasis protective system: a case from the southeastern edge of the Tengger Desert, China 被引量:2
10
作者 XIE Yun-hu DANG Xiao-hong +10 位作者 MENG Zhong-ju JIANG Hong-tao LI Xiao-jia ZHOU Rui-ping ZHOU Dan-dan LIU Xiao-xi DING Jing WU Xue-qin WANG Yu-hao HAI Chun-xing WANG Ji 《Journal of Mountain Science》 SCIE CSCD 2019年第11期2548-2561,共14页
Wind and sand control are important factors in combating desertification and protecting oases.An oasis protective system can provide these benefits,but quantitative research on protection effects has been lacking to d... Wind and sand control are important factors in combating desertification and protecting oases.An oasis protective system can provide these benefits,but quantitative research on protection effects has been lacking to date.This research describes an oasis protective system in the southeastern border of the Tengger Desert.The system consists of a sand barrier belt,a shrub and herbaceous plant belt,and a farmland shelter belt.The system was compared to a bare dunes area as the control zone.The study investigated windproof effect,sediment transport,and erosion through field observations.Results showed that the roughness of the shrub and herbaceous plant belt,farmland shelter belt,and sand barrier belt were increased compared with bare dunes.The shrub and herbaceous plant belt provided the highest windproof effect values for the same wind velocity measurement height,and the windproof effect values for different protective belts were as follows:shrub and herbaceous plant belt>farmland shelter belt>sand barrier belt.The sand barrier belt provided effective wind and sand control at heights from 0 to 50 cm above the ground.The total sediment transport for each protective belt is as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.The sediment transport decreased exponentially as the height increased.In the bare dunes and protective systems,the sediment transport is mainly within 30 cm of the ground surface.The wind erosion intensity for this protective system was as follows:bare dunes>sand barrier belt>shrub and herbaceous plant belt>farmland shelter belt.This research offers quantitative evidence for how oasis protective systems can effectively intercept sand and prevent erosion in oases.The results of this study can be applied in similar regions. 展开更多
关键词 OASIS protective system Windproof effect Sediment transport WIND erosion intensity Tengger DESERT DESERTIFICATION
下载PDF
Governance of Marine Protected Areas: An Approach Using Public Participation Geographic Information Systems--The MARGov Project
11
作者 Marco Painho Tiago H. Moreira de Oliveira Lia Vasconcelos 《Journal of Environmental Science and Engineering(B)》 2013年第1期25-35,共11页
The MARGov Project consisted in strengthening the interaction among the Professor Luiz Saldanha Marine Park stakeholders, and to collaboratively construct, with social and institutional actors, a governance model for ... The MARGov Project consisted in strengthening the interaction among the Professor Luiz Saldanha Marine Park stakeholders, and to collaboratively construct, with social and institutional actors, a governance model for the Marine Park, located in the municipality of Sesimbra (Portugal). To pursue this goal, a PPGIS (public participation geographic information system) was developed, allowing the interaction, discussion and public participation of the stakeholders and actors involved. This PPGIS emerged as a crowdsourcing tool, with the purpose of assisting the georeferenced contributes from the local users of the Marine Park, regarding several relevant subjects, such as pollution, economic activities, opportunities and threats to the Marine Park, providing visual, analytical, and demonstrative qualities. 展开更多
关键词 GIS (geographic information systems PPGIS WebGIS (GIS Web applications) crowdsourcing marine protected areas.
下载PDF
Effects of PQQ on Protective System in Cucumber Cotyledons under Low Temperature Stress 被引量:1
12
作者 Zhao Yongfang Liu Weiqun +2 位作者 Zhu Yunji Wang Yonghua Wang Guanfang 《Wuhan University Journal of Natural Sciences》 EI CAS 1998年第2期235-238,共4页
The authors have studied the effects of Pyrroioguinloine quinone (PQQ) on superoxide dismutase (SOD), Ascorbid acid(AsA) peroxidase (AsAPOD), glutathion (GSH) and electrolytic leakage of cotyledon in cucumber seedling... The authors have studied the effects of Pyrroioguinloine quinone (PQQ) on superoxide dismutase (SOD), Ascorbid acid(AsA) peroxidase (AsAPOD), glutathion (GSH) and electrolytic leakage of cotyledon in cucumber seedling under low temperature stress, meanwhile, 8-hydroquinone (8-HQ) and AsA (activeoxiygen scavengers) have been made use of in comparison with PQQ. The results indicate that the activities of SOD, AsAPOD and content of GSH can be increased by PQQ. The relative conductivity of cotyledon in cucumber seedling is decreased for PQQ possesses the ability of cleaning up free redical of oxygen. We came to the conclusion that PQQ can act as a kind of active oxygen scavenger and adjust the metabolism on free radical of oxygen to balance in plants and enhance resistance finally in plants. 展开更多
关键词 pyrroloquinloine quinone (PQQ) protect system low temperatural stress cucumber seedling active oxygen scavenger
下载PDF
People's Assessor Systems Pivotal to Protection of Human Rights
13
作者 WANG YANBING 《The Journal of Human Rights》 2007年第4期31-32,共2页
Back in August 2004, the Standing Committee of the National People's Congress, the highest legislature of China, published the Decision on Improving the People's Assessor System (hereinafter referred to as the Deci... Back in August 2004, the Standing Committee of the National People's Congress, the highest legislature of China, published the Decision on Improving the People's Assessor System (hereinafter referred to as the Decision). Since it became effective on May 1, 2005, the Decision has proved important to ensuring the right of citizens to participate in activities of adjudication in accordance with the law. It has helped expand judicial democracy and safeguard the legitimate rights and interests of the litigant parties. 展开更多
关键词 PRO People’s Assessor systems Pivotal to protection of Human Rights
下载PDF
Protection Model of Security Systems Based on Neyman-Person Criterion
14
作者 Haitao Lv Ruimin Hu +1 位作者 Jun Chen Zheng He 《Communications and Network》 2013年第3期578-583,共6页
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr... In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model. 展开更多
关键词 SECURITY system protectION PROBABILITY SECURITY Network Breach protectION PROBABILITY Breach Path
下载PDF
The Mental Protection System for Protective Behaviors: The Social Brain and the Mental Immune System
15
作者 Dingyu Chung 《Journal of Behavioral and Brain Science》 2018年第1期31-55,共25页
The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires ... The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires the protective social groups for vulnerable social members-functions and the protective instinctive mental countermeasures against adversities such as hardship, danger, and unfamiliarity-uncertainty. As a result, this paper proposes that the mental protection system of the body consists of the social brain to set up the protective social groups for vulnerable social members-functions and the mental immune system to produce the protective mental countermeasures against adversities. This paper proposes that from the social brain, the protective social groups include alliance group for vulnerable individuals, kinship-friendship group for vulnerable children, interdependent specialists group for vulnerable pregnant females, territorial group for social boundary, connective group for social connection, and competitive group for social competition. From the mental immune system, the mental protective countermeasures include comforter against hardship, hyperactivity against danger, phobia against unfamiliarity-uncertainty, and rationality against unfamiliarity-uncertainty. The overactive mental immune system causes mental allergies and auto immune diseases as personality-mental disorders against ubiquitous harmful and harmless perceived adversities, correlating to physical allergies and auto immune diseases against ubiquitous harmful and harmless detected invaders. The mental protection system also produces personality traits, social moralities, social organizations, social systems, religions, and cultures as described in this paper. The mental protective system is the source of protective behaviors. 展开更多
关键词 MENTAL protection system SOCIAL Brain MENTAL Immune system Big Five PERSONALITY TRAITS SOCIAL system TRAITS PERSONALITY Disorders Psychotherapy Religions Western Culture Eastern Culture protective BEHAVIORS
下载PDF
Testing of Lightning Protective System of a Residential Structure: Comparison of Data Obtained in Rocket-triggered Lightning and Current Surge Generator Experiments
16
作者 G. Maslowski V.A. Rakov +9 位作者 S. Wyderka J. Bajorek B.A. DeCarlo J. Jerauld G.H. Schnetzer J. Schoene M.A. Uman K.J. Rambo D.M. Jordan W. Krata 《高电压技术》 EI CAS CSCD 北大核心 2008年第12期2575-2582,共8页
We present a comparison of data obtained during testing of lightning protective system of a residential structure in rocket-triggered lightning experiment at the International Center for Lightning Research and Testing... We present a comparison of data obtained during testing of lightning protective system of a residential structure in rocket-triggered lightning experiment at the International Center for Lightning Research and Testing(ICLRT)at Camp Blanding,Florida,and current surge generator experiment at Rzeszow University of Technology in Poland.Three different configurations of LPS were tested in Poland with the dc grounding resistances of the entire system 4.09 Ω(LPS 1a),1.65 Ω(LPS 1b),and 2.88 Ω(LPS 2).For LPS 1a with three ground rods the value of the peak current entering the electrical circuit neutral was about 56% of the injected current peak,and for LPS 1b with two additional ground rods and two 5 m long buried horizontal conductors it was about 16%.For LPS 2 with five ground rods interconnected by a buried loop conductor this ratio was 21%.The current waveshapes in the ground rods differed from the injected current waveshapes and the current waveshapes in other parts of the test system,especially,for poorer-grounding LPS 1a.The surge-generator results are consistent with those of triggered-lightning experiments at Camp Blanding,Florida(DeCarlo et al.,2008 [2]). 展开更多
关键词 居民区 雷电保护系统 试验 电流冲击发生器
下载PDF
Development of an Analytical Model of the Process of Cybersecurity Protection of Distributed Information Systems of Critical Infrastructure
17
作者 Ramaz R. Shamugia 《International Journal of Communications, Network and System Sciences》 2020年第10期161-169,共9页
This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence,... This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence, in the discussed ISCI, of both the intelligent tools of detection, analysis and identification of threats and vulnerabilities and means for restauration and elimination of their consequences. The development of the model also takes into consideration probabilistic nature of flow of events happening in ISCI and transferring the system between different states of cybersecurity. Among such probabilistic events we mean any operational perturbations (that can cause extreme situations) happening in ISCI under the influence of cyber-threats, as well as events concerning restoration and elimination of consequences of such cyber-threats. In this work, as methods of modelling, there have been used methods of system-oriented analysis based on theory of probability, theory of reliability and theory of queues. These methods enabled to describe analytically dependence of effectiveness indices of ISCI operation on abovementioned probabilistic processes. 展开更多
关键词 CYBERSPACE Critical Infrastructure Multichannel Queuing system CYBERSECURITY Cybersecurity protection system
下载PDF
Boost the Modernization of Human Rights Protection Systems and Endeavor to Fulfill the Chinese Dream——An Address at the Opening Ceremony of the 7th Beijing Forum on Human Rights, Sept. 17, 2014
18
作者 LUO HAOCAI 《The Journal of Human Rights》 2014年第6期4-7,共4页
This session of the Forum has the theme, “The Chinese Dream: New Progress in the Cause of Human Rights in China.” This theme concentrates on such important subtopics as “The Chinese Dream and Human Rights” ,
关键词 An Address at the Opening Ceremony of the 7th Beijing Forum on Human Rights Boost the Modernization of Human Rights protection systems and Endeavor to Fulfill the Chinese Dream Sept
下载PDF
The Analysis and Research Based on DEA Model and Super Efficiency DEA Model for Assessment of Classified Protection of Information Systems Security
19
作者 Jing Gao Yongiun Shen Guidong Zhang Qi Zhou 《计算机科学与技术汇刊(中英文版)》 2014年第4期140-145,共6页
关键词 安全等级保护 DEA模型 信息系统 评估模型 系统安全管理 决策单元 数据包络分析 DEA方法
下载PDF
Development of data acquisition and over-current protection systems for a suppressor-grid current with a neutral-beam ion source
20
作者 刘伟 胡纯栋 +5 位作者 刘胜 宋士花 汪金新 王艳 赵远哲 梁立振 《Plasma Science and Technology》 SCIE EI CAS CSCD 2017年第12期154-158,共5页
Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheatin... Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheating, a data acquisition and over-current protection system based on the PXI(PCI e Xtensions for Instrumentation) platform has been developed. The system consists of a current sensor, data acquisition module and over-current protection module. In the data acquisition module,the acquired data of one shot will be transferred in isolation and saved in a data-storage server in a txt file. It can also be recalled using NBWave for future analysis. The over-current protection module contains two modes: remote and local. This gives it the function of setting a threshold voltage remotely and locally, and the forbidden time of over-current protection also can be set by a host PC in remote mode. Experimental results demonstrate that the data acquisition and overcurrent protection system has the advantages of setting forbidden time and isolation transmission. 展开更多
关键词 neutral beam injection high-current ion source suppression grid current data acquisition and protection system
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部