期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
问题定态转化,关系递推求解——以结合图像的电路安全题为例
1
作者 李艳玲 《华夏教师》 2020年第25期65-66,共2页
结合图像的电路安全题是中考的重点题型,可以考查学生的综合能力,分析过程需要理解图像信息,充分利用电表保护对电流、电压的限制作用,实现问题的定态转化,然后结合递推关系来求解。本文将结合实例简要讲解该类题的解题思路,开展相应的... 结合图像的电路安全题是中考的重点题型,可以考查学生的综合能力,分析过程需要理解图像信息,充分利用电表保护对电流、电压的限制作用,实现问题的定态转化,然后结合递推关系来求解。本文将结合实例简要讲解该类题的解题思路,开展相应的教学探索和思考。 展开更多
关键词 图像 安全题 转化 定态 递推关系 电路
下载PDF
规范化运用智能车辆管理系统解决校园交通安全难题 被引量:1
2
作者 孙宁 《科教导刊(电子版)》 2015年第35期147-148,共2页
随着大学校园越来越开放,校园内的机动车越来越多,校园内的交通安全事故频发,“停车难、行车难”的情况越来越严重。为切实保障校园内的道路交通秩序,确保教学、科研等各项工作的顺利进行,各高校都加强了对校园交通管理的研究,其... 随着大学校园越来越开放,校园内的机动车越来越多,校园内的交通安全事故频发,“停车难、行车难”的情况越来越严重。为切实保障校园内的道路交通秩序,确保教学、科研等各项工作的顺利进行,各高校都加强了对校园交通管理的研究,其中运用校园智能车辆管理系统,作为辅助管理和规范手段是很多学校尝试和探索的方法之一,但在使用过程中虽然解决了一些问题,同时也产生了一些新的问题。如何通过规范的管理提高校园智能车辆管理系统使用效率,使之在解决高校校园交通安全难题中更好地发挥作用,已成为高校交通管理部门研究的新课题之一。本文就武汉科技大学如何通过规范管理,发挥智能车辆管理系统在高校交通安全管理中的作用作初步探讨。 展开更多
关键词 智能车辆管理系统 高校 交通安全 规范化
下载PDF
经典谜题中的递推关系及其求解研究
3
作者 李远哲 高世乐 《无线互联科技》 2019年第21期52-53,132,共3页
递推是研究算法和编程的重要内容,传统谜题有着受众广、社会影响力大的特征,主要探讨递推关系的谜题更具特色。文章以受限的汉诺塔、Reve谜题和安全开关谜题为例,来探讨递推关系及其显式公式,以期对计算机专业师生学习递推关系的研究有... 递推是研究算法和编程的重要内容,传统谜题有着受众广、社会影响力大的特征,主要探讨递推关系的谜题更具特色。文章以受限的汉诺塔、Reve谜题和安全开关谜题为例,来探讨递推关系及其显式公式,以期对计算机专业师生学习递推关系的研究有所启发。 展开更多
关键词 递推关系 受限的汉诺塔 Reve谜 安全开关谜
下载PDF
New signature scheme based on two cryptographic assumptions 被引量:2
4
作者 郑明辉 崔国华 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期461-464,共4页
In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mat... In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities. 展开更多
关键词 digital signature SECURITY factoring problem discrete logarithm problem
下载PDF
Soil Degradation and Food Security Coupled with Global Climate Change in Northeastern China 被引量:3
5
作者 GONG Huili MENG Dan +1 位作者 LI Xiaojuan ZHU Feng 《Chinese Geographical Science》 SCIE CSCD 2013年第5期562-573,共12页
The northeastern China is an important commodity grain region in China,as well as a notable corn belt and major soybean producing area.It thus plays a significant role in the national food security system.However,larg... The northeastern China is an important commodity grain region in China,as well as a notable corn belt and major soybean producing area.It thus plays a significant role in the national food security system.However,large-scale land reclamation and non-optimum farming practices give rise to soil degradation in the region.This study analyzed the food security issues coupled with global climate change in the northeastern China during 1980–2000,which is the period of modern agriculture.The results of statistical data show that the arable land area shrank markedly in 1992,and then increased slowly,while food production generally continually increased.The stable grain yield was due to the increase of applied fertilizer and irrigated areas.Soil degradation in the northeastern China includes severe soil erosion,reduced soil nutrients,a thinner black soil layer,and deterioration of soil physical properties.The sustainable development of the northeastern China is influenced by natural-artificial binary disturbance factors which consist of meteorological conditions,climate changes,and terrain factors as well as soil physical and chemical properties.Interactions between the increasing temperature and decreasing precipitation in the region led to reduced accumulation of soil organic matter,which results in poor soil fertility.Human-induced factors,such as large-scale land reclamation and non-optimum farming practices,unsuitable cultivation systems,dredging,road building,illegal land occupation,and extensive use of fertilizers and pesticides,have led to increasingly severe soil erosion and destruction.Solutions to several problems of soil degradation in this region requiring urgent settlement are proposed.A need for clear and systematic recognition and recording of land use changes,land degradation,food production and climate change conditions is suggested,which would provide a reference for food security studies in the northeastern China. 展开更多
关键词 food security soil degradation climate change northeastern China black soil region
下载PDF
Design of Anti-Collision Integrated Security Mechanism Based on Chaotic Sequence in UHF RFID System 被引量:5
6
作者 YUE Keqiang SUN Lingling +1 位作者 QIN Xing ZHENG Zhonghua 《China Communications》 SCIE CSCD 2014年第3期137-147,共11页
Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFI... Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system. 展开更多
关键词 ANTI-COLLISION SECURITY chaoticsequence discrete Markov process performance analysis
下载PDF
Discrete element approach for mine dump stability analysis 被引量:8
7
作者 RADHAKANTA Koner DEBASHISH Chakravarty 《Mining Science and Technology》 EI CAS 2010年第6期809-813,共5页
Mine overburden dumps have posed significant safety issues in the operations of various unit operations of open pit min-ing especially the external dumps. The external dumps are composed of a mixture of fragmented roc... Mine overburden dumps have posed significant safety issues in the operations of various unit operations of open pit min-ing especially the external dumps. The external dumps are composed of a mixture of fragmented rocks and loose soil. Their charac-teristic is comparable to heavily discontinuous solid mass. The conventional approach of limit equilibrium methods provide safety factors for the slope but nothing about the stress-strain characteristics of the large dump mass. The designs of dump location and their respective geometry are integrated for the know-how of the stability characteristics of these dumps. The discrete element method uses a circular disk to represent the granular solid mass and their interactions are described by the Newton’s third law of motion. The displacement is described by the sliding of the circular disk. This work is focused on the modeling efficiency of the discrete element methods to represent the behaviour of mine dump masses with the specified joint plane for the limit equilibrium method. The advantage of the work lies on the ease of information retrieval at any point at the dump mass concerning the stress and strain histories, displacement, failures etc. which when integrated produces a better understanding of the stability of the dump masses. 展开更多
关键词 dump slope safety factor discrete element method micromechanical properties discontinuity plane
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
8
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Swells of the East China Sea 被引量:4
9
作者 TAO Aifeng YAN Jin +2 位作者 PEI Ye ZHENG Jinhai MORI Nobuhito 《Journal of Ocean University of China》 SCIE CAS CSCD 2017年第4期674-682,共9页
Over the past few decades,an increasing number of marine activities have been conducted in the East China Sea,including the construction of various marine structures and the passage of large ships.Marine safety issues... Over the past few decades,an increasing number of marine activities have been conducted in the East China Sea,including the construction of various marine structures and the passage of large ships.Marine safety issues are paramount and are becoming more important with respect to the likely increase in size of ocean waves in relation to global climate change and associated typhoons.In addition,swells also can be very dangerous because they induce the resonance of floating structures,including ships.This study focuses on an investigation of swells in the East China Sea and uses hindcast data for waves over the past 5 years in a numerical model,WAVEWATCH III(WW3),together with historical climate data.The numerical calculation domain covers the entire North West Pacific.Next,swells are separated and analyzed using simulated wave fields,and both the characteristics and generation mechanisms of swells are investigated. 展开更多
关键词 SWELL East China Ocean numerical simulation
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
10
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
11
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
A Sensor Anonymity Enhancement Scheme Based on Pseudonym for Clustered Wireless Sensor Network 被引量:2
12
作者 SHI Leyi FU Wenjing +2 位作者 JIA Cong LIU Xin JIA Chunfu 《China Communications》 SCIE CSCD 2014年第9期6-15,共10页
Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustere... Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustered Wireless Sensor Network,which provides anonymity for both the sensors within a cluster and the cluster head nodes.Simulation experiments are launched through NS2 platform to validate the anonymity performance.The theoretical analysis and empirical study imply that the proposed scheme based on pseudonym can protect the privacies of both the sensor nodes and the cluster head nodes.The work is valuable and the experimental results are convincible. 展开更多
关键词 wireless sensor network (WSN) CLUSTER ANONYMITY PRIVACY pseudonym
下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
13
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
下载PDF
Does Market Timing Affect Capital Structure?: Evidence for Chinese Firms 被引量:1
14
作者 Philip Russel Ken Hung 《Chinese Business Review》 2013年第6期395-400,共6页
This paper investigates the market timing hypothesis of capital structure using a sample of 1,077 Chinese firms for the period 1992 to 2007. We find that market timing plays a significant role in capital structure dec... This paper investigates the market timing hypothesis of capital structure using a sample of 1,077 Chinese firms for the period 1992 to 2007. We find that market timing plays a significant role in capital structure decisions. However, market timing effects are not persistent and disappear within three years. The results suggest the prominent role played by the government in timing of security issues. 展开更多
关键词 capital structure market timing PERSISTENCE China capital market
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
15
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
Research on Systematic Analysis and Countermeasures of the Buildings Construction Safety Problems 被引量:2
16
作者 Shen Liangfeng Li Jie Fan Yeming 《Engineering Sciences》 EI 2008年第1期59-65,共7页
The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects.... The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects. The authors summarize comprehensively the problems of buildings construetion safety in China at present based on grasping the whole safety status of buildings construction, and the synthetic countermeasures including the systems about laws, management, technology and education civilization for buildings construction safety management are brought up based on the viewpoint of safety system theory. Then it is thought that huilding scientific management mechanisms and popularizing effective management methods and measures are the fundamental ways for improving further the level of safety management for buildings construction in China at present. 展开更多
关键词 building construction safety management PROBLEM COUNTERMEASURES
下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
17
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
18
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
19
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
20
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部