期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
气动-机械微安保结构设计与性能测试 被引量:1
1
作者 王儒文 邹振游 +1 位作者 黄中雨 叶迎华 《火工品》 CAS CSCD 北大核心 2016年第5期10-13,共4页
针对新型火工品的微型化、可靠性要求,设计了一种气体驱动的机械微安保结构,对其核心的机械安保层进行了静力学仿真,确定微弹簧最佳加工材料为65Mn弹簧钢,线宽为0.2mm时微弹簧解除保险所需的理论压强为4.3MPa。通过微加工技术,制作了原... 针对新型火工品的微型化、可靠性要求,设计了一种气体驱动的机械微安保结构,对其核心的机械安保层进行了静力学仿真,确定微弹簧最佳加工材料为65Mn弹簧钢,线宽为0.2mm时微弹簧解除保险所需的理论压强为4.3MPa。通过微加工技术,制作了原理样机,并测试其性能。结果表明样机可以成功解除保险,并实现安保功能。 展开更多
关键词 安保结构 气动 微机械 静力学仿真 性能测试
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
2
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
Development of Light Weight Structures to Provide Blast-Resistant Designs
3
作者 CRAWFORD John E 《Transactions of Tianjin University》 EI CAS 2006年第B09期16-21,共6页
In the past, blast-resistant designs for structures were often constructed with massive type structural systems, which relied more on brute strength than on finesse to achieve the required blast resistance. However, s... In the past, blast-resistant designs for structures were often constructed with massive type structural systems, which relied more on brute strength than on finesse to achieve the required blast resistance. However, structures composed of COLD-FORMED steel components, such as sheet metal and metal studs, have shown great promise in providing blast resistance with the added benefits of low cost and ease of construction. Some examples of using such structures to provide containment for package handling facilities (PHF) are described in the paper for situations where blast containment is needed, such as a potential package bomb being discovered during the package vetting process. Results from tests and analytic data are used to illustrate aspects of design peculiar to such types of applications. Designs for specific capacities of PHF are described. 展开更多
关键词 blast containment package handling facility hardened design light weight structures COLD-FORMED steel structures
下载PDF
A Key Management Scheme Based on Hypergraph for Fog Computing
4
作者 Zhi Li Yanzhu Liu +3 位作者 Di Liu Chunyang Li Wei Cui Guanglin Hu 《China Communications》 SCIE CSCD 2018年第11期158-170,共13页
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s... Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme. 展开更多
关键词 fog computing fog security keymanagement HYPERGRAPH
下载PDF
Assessment of Containment Structures Against Missile Impact Threats
5
作者 LIQ M 《Transactions of Tianjin University》 EI CAS 2006年第B09期22-30,共9页
In order to ensure the highest safety requirements, nuclear power plant structures (the containment structures, the fuel storages and transportation systems) should be assessed against all possible internal and extern... In order to ensure the highest safety requirements, nuclear power plant structures (the containment structures, the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats. The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes, the failure of high speed rotating machineries and accidental drops. The external impact threats may come from airborne missiles, aircraft impact, explosion blast and fragments. The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed. Methods and procedures for the impact assessment of nuclear power plants are introduced. Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures. 展开更多
关键词 impact threats protective design and assessment containment structure nuclear power plant
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部