期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
CYJQ14-5-73HYⅡ型抽油机的安全分析与计算
1
作者 崔朋伟 《化工设计通讯》 CAS 2017年第8期45-45,69,共2页
塔河油田为提高井控能力,陆续将250型常规井口(25MPa)更换为350型高压井口(35MPa),采油树高度增加,以加高基础的方式解决防撞距的问题,为实现安全生产,需对抽油机进行安全分析与计算,以确定基础的高度。
关键词 抽油机 基础加高 安全分析计算
下载PDF
完善计算机通信网络安全的策略分析 被引量:5
2
作者 范才元 《中国新通信》 2014年第1期9-10,共2页
随着我国经济与科技的飞速发展以及现代化建设的进一步完善,我国的计算机技术也在逐渐提高,计算机网络得到了更为广泛的运用。但是,与此同时,各种信息安全问题也逐步暴露了出来,并对整个计算机网络安全系统造成了极大的威胁,严重影响了... 随着我国经济与科技的飞速发展以及现代化建设的进一步完善,我国的计算机技术也在逐渐提高,计算机网络得到了更为广泛的运用。但是,与此同时,各种信息安全问题也逐步暴露了出来,并对整个计算机网络安全系统造成了极大的威胁,严重影响了计算机的正常使用。针对这样的情况,本文就结合实际进行出发,从计算机通信技术的现状入手进行全面分析,对现如今的各种网络问题提出行之有效的解决措施,从而为通信网络的安全运行奠定坚实的基础。 展开更多
关键词 计算机网络通信安全策略分析
下载PDF
既有桥梁改造加宽后安全性评估分析 被引量:1
3
作者 夏昆 白胜伟 《北方交通》 2015年第3期33-35,38,共4页
介绍既有桥梁的概况,建立了桥梁计算分析模型。分析结果表明:加宽改造后既有桥梁结构满足现行公路钢筋混凝土规范要求,为加宽改造后桥梁结构的安全提供理论依据。
关键词 改造加宽 上部构造 安全分析计算
下载PDF
计算机技术在煤矿安全生产中的实际应用
4
作者 蔡发 《中国电子商务》 2014年第2期226-226,共1页
近年来,我国科学技术的飞速发展,使我国逐渐进入了信息化时代。随着计算机技术在我国煤矿安全管理中的应用,有效地保障了我国煤矿产业在运行等方面的安全。本文结合煤矿在实际生产中的几个具体环节,对计算机技术在我国煤矿安全生产... 近年来,我国科学技术的飞速发展,使我国逐渐进入了信息化时代。随着计算机技术在我国煤矿安全管理中的应用,有效地保障了我国煤矿产业在运行等方面的安全。本文结合煤矿在实际生产中的几个具体环节,对计算机技术在我国煤矿安全生产中的实际应用进行分析。 展开更多
关键词 计算机技术煤矿安全生产应用分析
下载PDF
向家坝—上海±800kV特高压直流输电工程系统调试技术分析 被引量:27
5
作者 杨万开 印永华 +3 位作者 曾南超 王华伟 王明新 张健 《电网技术》 EI CSCD 北大核心 2011年第7期19-23,共5页
对世界上输送容量最大、输电距离最长的±800 kV特高压直流输电工程'向家坝—上海特高压直流输电工程'的系统调试进行了介绍,包括系统计算分析、系统调试方案和现场调试实施计划编写以及现场系统调试情况等;对现场系统调试... 对世界上输送容量最大、输电距离最长的±800 kV特高压直流输电工程'向家坝—上海特高压直流输电工程'的系统调试进行了介绍,包括系统计算分析、系统调试方案和现场调试实施计划编写以及现场系统调试情况等;对现场系统调试分阶段完成的试验项目进行了分类,对每一类试验项目的结果进行了分析,并给出了结论。对系统调试过程中的主要技术问题,特别是大负荷试验过程中发现的问题进行了详细探讨。这些问题的解决保证了特高压直流输电工程系统调试的顺利进行和工程的按期投入运行。 展开更多
关键词 特高压直流输电工程 系统调试 系统安全稳定计算分析 现场调试实施计划编写
下载PDF
基于CMDB的资产识别与管理系统设计与实现 被引量:1
6
作者 蔚周鹏 陈俊丽 张汉举 《计算机技术与发展》 2023年第12期106-112,共7页
随着信息技术的迅速发展,针对企事业单位在资产识别与管理相关业务的开展过程中资产属性标准不健全、资产演变分析灵活性不足、安全分析不够完善等问题,设计基于配置管理数据库的资产识别与管理系统,推进企事业单位的资产信息化管理。... 随着信息技术的迅速发展,针对企事业单位在资产识别与管理相关业务的开展过程中资产属性标准不健全、资产演变分析灵活性不足、安全分析不够完善等问题,设计基于配置管理数据库的资产识别与管理系统,推进企事业单位的资产信息化管理。该系统通过对资产信息的加工利用,覆盖到资产标准、资产质量、资产集成、资产安全等相关领域,充分标注资产各方面特征信息,完善了资产的演变分析。系统设计了一种安全分析计算的方法,收集资产的自有特征、脆弱特征、威胁特征完成资产的安全分析计算,通过信息安全技术方面的测试结果,明确目标资产自身的安全状态,及时对存在安全风险的资产采取合理的安全措施,对目标资产发生安全事件的可能性和抵御安全风险的能力做出评估。该系统应用突破了传统台账式资产管理,实现资产价值、脆弱和威胁的分析计算,对组织资产的信息安全建设有着积极推动作用。 展开更多
关键词 资产识别与管理 配置管理数据库 演变分析 安全分析计算 信息安全
下载PDF
稳控装置无故障跳闸判据存在的问题及解决方案 被引量:6
7
作者 董希建 李雪明 +1 位作者 秦天 李惠军 《电力系统保护与控制》 EI CSCD 北大核心 2015年第17期113-118,共6页
为提高电网安全稳定控制系统运行的可靠性,提出防止无故障跳闸判据误判的诸多防误判据。指出在当前网内安全稳定控制系统中运行的仅基于本地电气量的无故障跳闸判据对一些方式和扰动的不适或缺陷。研究了安全稳定计算分析的稳定判据,指... 为提高电网安全稳定控制系统运行的可靠性,提出防止无故障跳闸判据误判的诸多防误判据。指出在当前网内安全稳定控制系统中运行的仅基于本地电气量的无故障跳闸判据对一些方式和扰动的不适或缺陷。研究了安全稳定计算分析的稳定判据,指出应根据系统所要解决的具体稳定问题,有针对性地设计行之有效的防误判据。基于本地电气量的无故障跳闸判据,在结合了有效的防误判据之后,在各级电网的安全稳定控制系统中得到了广泛应用。运行经验表明,这些防误判据在保证安全稳定控制措施时效性的基础上,有效地提高了安全稳定控制系统运行的安全性,证明了防误判据的可靠性。 展开更多
关键词 安全稳定控制系统 无故障跳闸 防误判据 安全稳定计算分析 稳定判据
下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
8
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
下载PDF
Multiparty Quantum Secret Sharing Using Quantum Fourier Transform 被引量:3
9
作者 HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期221-226,共6页
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode... A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 展开更多
关键词 quantum secret sharing quantum Fourier transform quantum error correction code
下载PDF
Key Exchange Protocol Based on Tensor Decomposition Problem 被引量:1
10
作者 MAO Shaowu ZHANG Huanguo +3 位作者 WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 《China Communications》 SCIE CSCD 2016年第3期174-183,共10页
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols. 展开更多
关键词 key exchange resistant quantum hard problem tensor decomposition
下载PDF
Secure Network Coding Based on Lattice Signature 被引量:2
11
作者 SHANG Tao PEI Hengli LIU Jianwei 《China Communications》 SCIE CSCD 2014年第1期138-151,共14页
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u... To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation. 展开更多
关键词 secure network coding pollution attack lattice signature fixed length vector problem
下载PDF
Data Mining and Visualization of Grid-Based City Emergency System
12
作者 薛京生 孙济洲 +2 位作者 刘牧星 张旭 何宏 《Transactions of Tianjin University》 EI CAS 2005年第2期125-128,共4页
A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing poi... A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing points and lines, which was not efficient enough in dealing with the geographic information in units of police areas. The proposed algorithm maps an event set stored as a point set to a grid unit set, utilizes the cluster algorithm based on grids to find out all the clusters, and shows the results in the method of visualization. The algorithm performs well when dealing with high dimensional data sets and immense data. It is suitable for the data mining based on geogra-(phic) information system and is supportive to decision-makings in the city emergency system. 展开更多
关键词 GRID EMERGENCY data mining VISUALIZATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部