期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
某研发中心水平遮阳系统制作安装技术
1
作者 杨少余 《绿色建筑》 CAS 2011年第2期76-77,共2页
通过对幕墙水平遮阳系统的制安技术的介绍,在保证该系统美观实用,整体与幕墙协调统一外,且具有结构紧凑、科学,安装方便,耐久性、安全性好,能达到上佳的遮阳、节能效果。
关键词 幕墙 水平遮阳系统 制安技术
下载PDF
某研发中心水平遮阳系统制作安装技术
2
作者 杨少余 《中国建筑金属结构》 2011年第6期54-55,共2页
本文通过对幕墙水平遮阳系统的制安技术的介绍,在保证该系统美观实用,整体与幕墙协调统一外,且具有结构紧凑、科学,安装方便,耐久性、安全性好,能达到上佳的遮阳、节能效果。
关键词 幕墙 水平遮阳系统 制安技术
下载PDF
70Kt/a镍闪速熔炼炉冷修运用电子模拟制安施工技术
3
作者 王砚琦 《甘肃科技纵横》 2012年第4期39-40,106,共3页
采用Solidworks软件细致的制作了闪速炉的三维真实立体图像,通过对三维真实立体图像的制作,逐个验证了各个部件设计尺寸与组装的正确性,增强了专业管理人员的空间感性认识,避免了技术准备的死角现象等现象的发生。
关键词 镍闪速熔炼炉 电子模拟 施工技术
下载PDF
Research Advance on Absorption Law of Cadmium by Rice and Safety Control Technology of Cadmium in Rice Grain 被引量:6
4
作者 陈群芳 叶瑶瑶 +3 位作者 徐青 范克关 王飞娟 朱诚 《Agricultural Science & Technology》 CAS 2014年第10期1801-1804,共4页
Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety contr... Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety control technology of cadmium in rice grain was summarized in this paper. We hoped to lay a foundation for the safety production of rice. 展开更多
关键词 RICE CADMIUM Low accumulation Safety control technology
下载PDF
企业短波
5
《中国工程建设通讯》 2003年第27期21-23,共3页
关键词 电力企业 建筑企业 中国 混凝土施工技术 企业管理 工程质量 “电解槽制安技术 全管理
下载PDF
High-voltage live cleaning robot design based on security 被引量:1
6
作者 谢霄鹏 夏红卫 杨汝清 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期590-594,共5页
High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control sy... High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence. 展开更多
关键词 pollution and flashover high voltage live cleaning robot control system
下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory 被引量:1
7
作者 LIU Qian WANG Guanhai WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con... At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 Virtual Machine System Mandatory Access Control Multi-level Security Virt-BLP
下载PDF
Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
8
作者 徐光伟 史有群 +2 位作者 朱明 吴国文 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期50-52,共3页
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy a... Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated. 展开更多
关键词 Ad Hoc security auditing access control of devices sign of devices property of event.
下载PDF
New development on additive manufacturing technology and its applications 被引量:1
9
作者 Tian Xiaoyong Li Dichen +2 位作者 Zhang Anfeng Lu Zhongliang Lu Bingheng 《Engineering Sciences》 EI 2013年第1期48-53,共6页
Additive manufacturing technology has been developed in Xi' an Jiaotong University for almost 20 years. Up to now~ it is still attracting the attentions of the researchers or manufacturers all over the world. Some in... Additive manufacturing technology has been developed in Xi' an Jiaotong University for almost 20 years. Up to now~ it is still attracting the attentions of the researchers or manufacturers all over the world. Some in- novative processes and frontier application research are all being conducted here to catch up with the new develop- ment of this technology. In the paper, newly developed processes, such as ultraviolet-light emitting diode (UV- LED) stereolithography, ceramic stereolithography, and direct metal forming, were described. Some results of the frontier application researches, such as indirect fabrication of ceramic casting mould, wind-tunnel-testing models, photonic crystals and metamatcrials, were also briefly reviewed. 展开更多
关键词 additive manufacturing rapid prototyping STEREOLITHOGRAPHY
下载PDF
Research on Network Security Algorithm based on ZigBee Technology
10
作者 XiaoleiWu 《International Journal of Technology Management》 2014年第8期164-166,共3页
Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and t... Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and the node clone, proposed a ZigBee routing protocol for the MAC layer security comprehensive detection algorithm. Fuzzing test show that the testing algorithm can not only greatly improve the test efficiency in Fuzzing, more than the structure of Fuzzing is increased by 50% in path coverage. 展开更多
关键词 ZigBee protocol Fuzzing test boundary scan test
下载PDF
Complex Cyber-Physical Networks: From Cybersecurity to Security Control 被引量:13
11
作者 WEN Guanghui YU Wenwu +1 位作者 YU Xinghuo Lü Jinhu 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2017年第1期46-67,共22页
Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infra... Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public trans- portation systems, state financial networks, and the Interact. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in informa- tion and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Interact-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this con- text. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecu- rity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure the achievement of desirable pinning synchronization control strategies are proposed for guaranteeing behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures. 展开更多
关键词 Communication topology complex cyber-physical network CYBERSECURITY Internet ofThings secure control.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部