期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
一种新型钢骨混凝土柱基节点抗震性能试验研究
1
作者 叶澄 《建筑技术开发》 2022年第24期60-62,共3页
装配式结构由于其施工速度快、湿作业量小、绿色环保等优势已经成为我国建筑业转型升级的趋势,但是钢混框架结构的节点连接性能对结构整体的各项性能至关重要,现在也是制约钢混结构在建筑领域发展的主要问题。基于此,提出了一种新型的... 装配式结构由于其施工速度快、湿作业量小、绿色环保等优势已经成为我国建筑业转型升级的趋势,但是钢混框架结构的节点连接性能对结构整体的各项性能至关重要,现在也是制约钢混结构在建筑领域发展的主要问题。基于此,提出了一种新型的连接方法,节点连接处后期不用绑扎钢筋和混凝土浇筑,进一步降低的施工成本,并设计了相关试验,研究了设计的新型连接方式的作用,说明了设计的新型节点连接方式的有效性,为相关研究提供了理论基础。 展开更多
关键词 钢骨混凝土柱 基节点 抗震性能
下载PDF
基于服务映射与分块调度的天基接入点密码资源调度算法 被引量:1
2
作者 易卓 孙慕明 杜学绘 《信息安全研究》 2019年第9期805-811,共7页
接入认证、安全传输等密码服务是保障天地一体化网络安全的重要途径.针对大量用户并发访问天地一体化网络接入节点密码服务时面临密码资源受限、利用率不高等问题,提出一种基于服务映射和分块调度的2级密码资源调度算法.该算法利用可重... 接入认证、安全传输等密码服务是保障天地一体化网络安全的重要途径.针对大量用户并发访问天地一体化网络接入节点密码服务时面临密码资源受限、利用率不高等问题,提出一种基于服务映射和分块调度的2级密码资源调度算法.该算法利用可重构密码服务可分块的特点,首先采用改进布谷鸟算法将服务分块映射到密码资源等待队列,其次,引入“最小影响分块优先”规则,对密码资源等待队列的分块进行局部优化调度.仿真结果表明,算法有效地提高了密码资源利用率和密码服务并发执行效率. 展开更多
关键词 密码资源调度 服务映射 分块调度 可重构密码服务 接入节点 天地一体化网络
下载PDF
高血压基底节区脑出血的微创外科临床治疗进展 被引量:3
3
作者 李海昆 《中国处方药》 2018年第6期17-18,共2页
高血压脑出血的发病率随着近年来我国人口老龄化问题日益凸显。而随着医疗水平在逐步提升,神经外科手术治疗脑出血领域取得较多成就,然而外科手术由于其会产生创伤也会对患者的恢复造成影响,对基底节区脑出血患者尤是如此。微创手术治... 高血压脑出血的发病率随着近年来我国人口老龄化问题日益凸显。而随着医疗水平在逐步提升,神经外科手术治疗脑出血领域取得较多成就,然而外科手术由于其会产生创伤也会对患者的恢复造成影响,对基底节区脑出血患者尤是如此。微创手术治疗基底节区脑出血的方法能将对患者造成二次创伤的可能降到最低,相较于传统外科手术方法优势明显,本文将就微创治疗高血压基底节区脑出血的进展进行综述。 展开更多
关键词 节点 脑出血 微创外科
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
4
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
Node scattering manipulation based on trajectory model in wireless sensor network 被引量:2
5
作者 裴智强 徐昌庆 藤劲 《Journal of Central South University》 SCIE EI CAS 2010年第5期991-999,共9页
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ... To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced. 展开更多
关键词 WORK node scattering manipulation trajectory model energy consumption
下载PDF
PIR-based data integrity verification method in sensor network
6
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
7
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
关于平板屈曲重调和特征值问题的H^2协调谱元法
8
作者 王世杰 闭海 《贵州师范大学学报(自然科学版)》 CAS 2019年第3期77-83,共7页
通过使用H^2协调谱元法,具体求解了平板屈曲重调和特征值问题。首先给出H^2协调谱元法的误差估计,然后利用广义雅可比多项式和节点基函数构造二维谱元空间的基函数,最后报道了L形区域和方形区域上的数值实验,实验结果表明谱元法所计算... 通过使用H^2协调谱元法,具体求解了平板屈曲重调和特征值问题。首先给出H^2协调谱元法的误差估计,然后利用广义雅可比多项式和节点基函数构造二维谱元空间的基函数,最后报道了L形区域和方形区域上的数值实验,实验结果表明谱元法所计算的特征值受网格直径和多项式次数的影响,在区域选择上较谱方法更为灵活,适用于平板屈曲重调和特征值问题。 展开更多
关键词 重调和特征值 平板屈曲 H^2协调谱元法 节点函数 广义雅可比多项式 误差估计
下载PDF
Graph-based single-copy routing in delay tolerant networks
9
作者 于海征 Ma Jianfeng 《High Technology Letters》 EI CAS 2011年第1期52-56,共5页
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, a... This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist. 展开更多
关键词 delay tolerant network DTN) MESSAGE single-copy ROUTING GRAPH
下载PDF
DELETIONS AND POINT MUTATIONS OF p16,p15 GENE IN PRIMARY TUMORS AND TUMOR CELL LINES 被引量:2
10
作者 陶勇浩 黄倩 +1 位作者 李川源 DavidW.Yandell 《Chinese Medical Sciences Journal》 CAS CSCD 1999年第4期200-205,共6页
Aberrations of chromosome 9 p21 22 are involved in the genesis of many forms of cancer.The gene p16 and p15 have been assigned to this region.Both p16 and p15 are an inhibitor of cycli... Aberrations of chromosome 9 p21 22 are involved in the genesis of many forms of cancer.The gene p16 and p15 have been assigned to this region.Both p16 and p15 are an inhibitor of cyclin D cdk4,cyclin D cdk6 complex and have been implicated in a wide variety of cancer types,including the germline of patients with familial melanoma.In order to investigate and compare the status of p16,p15 gene in primary tumors and cell lines,we examined 357 primary tumors and 29 cell lines derived from diverse tumor types.In addition to analysis of these primary tumors and cell lines,blood specimens from 91 patients either with sporadic multiple cancers or from cancer prone families were also analyzed.The data showed the following:1)Homozygous deletions of p16,p15 were comparatively rare and far less common than previously reported,although hemizygous deletions were observed in a significant fraction of many tumor types;2)the incidence of p16,p15 deletions(either homozygous deletions or heterozygous deletions)varied significantly among different tumor types;3)most deletions involved in both p16 and p15 genes;4)sequence variations in the coding sequence of p16,p15 were comparatively rare among these tumor types,though mutations and polymorphisms were identified;5)some tumors which showed LOH at 9p,containing p16 and p15 gene,did not show deletions or point mutations in the p16,p15 gene.6)In a subset of retinoblastoma and osteosarcoma where no Rb gene mutations were present a significant fraction was found to contain p16,p15 gene deletions. 展开更多
关键词 p16 gene p15 gene DELETION point mutation
下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
11
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
下载PDF
In vitro Propagation of Walnut (Juglans regia) by Nodal Explants
12
作者 Layla Shaaban Mohammed A1-Mizory Azad Ahmed Mayi 《Journal of Agricultural Science and Technology(B)》 2012年第6期665-670,共6页
Micropropagation techniques were set up for walnut. Many plantlets were obtained by culturing node explants in MS medium,with 30 g/L sucrose, 7 g/L agar, and different concentrations of BA or Kin alone and different c... Micropropagation techniques were set up for walnut. Many plantlets were obtained by culturing node explants in MS medium,with 30 g/L sucrose, 7 g/L agar, and different concentrations of BA or Kin alone and different concentrations of BA + NAA or BA + Kin. BA at concentration (2 mg L-1 BA) gave the best results in percentage response and number of shoots/plant (100%, 2.84) respectively. While, Kin at 3 mg L-1 gave the highest average shoot length (2.81 cm). However, MS medium supplemented with 2.5 mg L-1 + 0.5 mg L-1 Kin gave the best results compared with all treatment shoot/explants and the highest number of leaves/explants (3.7, 8.2) respectively. While the highest length of shoot (4.7 cm) in MS medium supplemented with 3 mg L-1 Kin. and a high rooting percentage up to 60% at MS medium supplemented with 1 mg L-1 IBA (Indole-3-butyric acid) was obtained. 展开更多
关键词 MICROPROPAGATION WALNUT single-node explants cytokinins.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部