期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Code mechanical solidification and verification in MEMS security devices
1
作者 张卫平 陈文元 +2 位作者 赵小林 李胜勇 姜勇 《Journal of Shanghai University(English Edition)》 CAS 2006年第4期334-338,共5页
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c... The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective. 展开更多
关键词 MEMS (micro-electromechanical systems) security device code mechanical solidification and verification virtual machine of code mechanism (VMCM) ternary system.
下载PDF
Healthcare Device Security Assessment through Computational Methodology
2
作者 Masood Ahmad Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Sabita Khatri Adil Hussain Seh Mohd Nadeem Alka Agrawal 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期811-828,共18页
The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy... The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances.The study uses the Hesitant Fuzzy(HF),Analytic Hierarchy Process(AHP)integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS)to classify the best alternatives to security techniques for healthcare devices to securing the devices.The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights.The ranks of the alternatives consequently decide the order of priority for the techniques.A1 was the most probable alternative of all the alternatives,according to the ranks of the alternatives acquired.This means that the security of A2 healthcare devices is the greatest of all the alternatives picked.A corroborative guide for the developers and the makers in quantitatively determining the security of healthcare devices to engineer efficacious devices will be the findings drawn up with the assistance of the proposed framework.The assessments performed using the proposed framework are systematic,precise,and definitive.Therefore,the results of the present empirical analysis are a stronger and accurate choice than the manual assessment of the device’s security. 展开更多
关键词 Healthcare devices HF-AHP.TOPSIS device security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部