期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于数字信号处理的CO_2短路过渡数字信息控制 被引量:5
1
作者 华学明 张勇 +2 位作者 吴毅雄 焦馥杰 李铸国 《上海交通大学学报》 EI CAS CSCD 北大核心 2003年第2期161-163,共3页
提出了数字信息控制 CO_2 短路过渡稳定性的思想 ,研制了基于数字信号处理 (DSP)芯片信息化控制的 CO_2 焊机 .讨论了用 DSP芯片对焊接过程信息进行实时处理的 DSP硬件设计、软件编程及电弧电压、电流信号的数字信号处理模式等内容 .试... 提出了数字信息控制 CO_2 短路过渡稳定性的思想 ,研制了基于数字信号处理 (DSP)芯片信息化控制的 CO_2 焊机 .讨论了用 DSP芯片对焊接过程信息进行实时处理的 DSP硬件设计、软件编程及电弧电压、电流信号的数字信号处理模式等内容 .试验证明 ,研制的数字化、信息化控制 CO_2焊机工作稳定可靠 ,能较好地满足工艺性能 . 展开更多
关键词 CO2短路过渡焊接 数字信号处理 数字信息控制
下载PDF
The Information Security of Digital Control Systems for Nuclear Power Plants
2
作者 Nadir Mengazetdinov Alexey Poletykin Vitaly G. Promyslov 《Journal of Energy and Power Engineering》 2012年第5期744-754,共11页
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper... The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level. 展开更多
关键词 SECURITY instrumentation and control system expert system nuclear plant.
下载PDF
Watermarking Data Cubes
3
作者 郭捷 邱卫东 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期117-121,共5页
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u... We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications. 展开更多
关键词 data cube WATERMARKING digital right management ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部