期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
开关电源安全通电检修新法
1
作者 武宽清 《山西电子技术》 1993年第3期29-30,共2页
关键词 开关电源 安全通电 检修
下载PDF
西湖牌C6405型彩电屡烧“行管”的安全通电检修方法
2
作者 肖为民 《家电检修技术》 2001年第6期10-11,共2页
故障现象:据用户反映,电视机在收看过程中突然出现“三无”故障,前维修人员先后更换过3个2SD1556行输出管,故障依旧,因找不出故障隐患,转到我处。
关键词 彩电 行输出管 集电极 C6405型 安全通电检修法 西湖牌
原文传递
Protocol for Trusted Channel Based on Portable Trusted Module 被引量:1
3
作者 张大伟 韩臻 +2 位作者 蒋逸尘 杜晔 黎妹红 《China Communications》 SCIE CSCD 2013年第11期1-14,共14页
Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A us... Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A user-oriented trusted computing system based on Portable Trusted Module(PTM)is presented.Remote attestation is incorporated into Transport Layer Security(TLS)handshake protocol based on PTM so as to establish a trusted channel between two endpoints in network.This protocol can resist masquerading,trusted path and runtime attacks and propagate the trust in the computing system to the end user effectively.The test results of our proof-of-concept prototype show that our protocol for trusted channel is feasible for deployment in e-commerce applications on the Internet. 展开更多
关键词 trusted computing trusted module remote attestation transport layer security
下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:1
4
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
下载PDF
船舶应急配电板功能及调试 被引量:2
5
作者 张闯 刘杰 +1 位作者 李志良 张华 《中国水运》 2020年第5期85-87,共3页
本文综述了船舶应急配电板功能和调试工作过程及通电前安全注意要求。概述了应急配电板的结构与功能及通电过程,并详细阐述了应急配电板通电调试过程中工作事项和操作要领,以及应急配电板绝缘检测方法。
关键词 应急配电板功能试验 调试工作 通电安全操作注意事项
下载PDF
Research on communication system of underground safety management based on leaky feeder cable
6
作者 陈建宏 张涛 +1 位作者 程运材 张晗 《Journal of Coal Science & Engineering(China)》 2007年第4期537-543,共7页
According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle a... According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well. 展开更多
关键词 leaky feeder cables safety management mines radio communication mine communication
下载PDF
Geometry Modeling of an Electronic Expansion Valve Head
7
作者 张川 马善伟 +3 位作者 陈江平 陈芝久 陈文勇 王健 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第4期57-61,共5页
This paper proposed that the flow characteristic of electronic expansion valve should be adapted to the evaporator superheat gain to refrigerant flow rate under different working conditions. Two native methods of geom... This paper proposed that the flow characteristic of electronic expansion valve should be adapted to the evaporator superheat gain to refrigerant flow rate under different working conditions. Two native methods of geometry modeling of electronic expansion valve head were introduced. By analysis of them, some shortcoming was detected and a universal modeling method of electronic expansion valve head was put forward. Through this model, the flow characteristic of EEV and the influence factors can be investigated more deeply. 展开更多
关键词 valve head flow area flow characteristic
下载PDF
PBRRI: A Hybrid Peer-to-Peer Communication Model in Distributed Systems
8
作者 张亚英 尤晋元 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期128-132,共5页
In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them coope... In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them cooperate with each other. But in fact, access control should also be considered to limit interaction to make it harmless. This paper proposed a proxy based rule regulated interaction (PBRRI) model. Role based access control is introduced for security concerns. Regulation rules are enforced in a distributed manner so that PBRRI can be applied to the open distributed systems such as Internet. 展开更多
关键词 PEER-TO-PEER interaction rules regulation GROUP role based access control
下载PDF
On modeling of electrical cyber-physical systems considering cyber security 被引量:9
9
作者 Yi-nan WANG Zhi-yun LIN +3 位作者 Xiao LIANG Wen-yuan XU Qiang YANG Gang-feng YAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第5期465-478,共14页
This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmis... This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model,the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service(Do S) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks. 展开更多
关键词 Cyber-physical systems Cyber attacks Cascading failure analysis Smart grid
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部