期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
西屋先进无源安全系统轻水反应堆
1
《山东电力技术》 1995年第1期68-68,共1页
西屋公司在开发一种按无源式安全系统设计的轻水反应堆AP600。它具有600MW电功率,一个总体的、较简单的设计。该系统应用自然重力、对流、冷凝、蒸发原理,增加的安全系数要高于常规的压水堆设计。
关键词 无源安全 安全系统设计 轻水反应堆 压水堆 系统应用 西屋公司 全系数 控制电缆 抗震建筑 应急设备
下载PDF
Current State of Numerical Simulations and Testing for the Blast and Impact Protection of the Build Civil Engineering Infrastructure
2
作者 GEBBEKEN Norbert 《Transactions of Tianjin University》 EI CAS 2006年第B09期1-7,共7页
The identification of the critical infrastructure has shown that the build civil engineering infrastructure is almost involved everywhere, even with the IT-infrastructure. Therefore, the passive safety of structures i... The identification of the critical infrastructure has shown that the build civil engineering infrastructure is almost involved everywhere, even with the IT-infrastructure. Therefore, the passive safety of structures is demanded. Security associations have analysed that most assaults came along with explosion and impact scenarios, which amount in 80% of assaults. Consequently, these are the extraordinary loads the structures have to be planned and designed for. To carry out such an engineering job, the engineer has to be educated in multiple disciplines as physics, material science , continuum mechanics, numerical mechanics, testing, structural engineering and related specific fields as wave propagation etc. In this paper we will concentrate on the subjects of numerical simulation and testing. 展开更多
关键词 BLAST IMPACT numerical simulation testing passive structural safety
下载PDF
Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling 被引量:1
3
作者 Ding Xiaojin Song Tiecheng Zhang Gengxin 《Journal of Southeast University(English Edition)》 EI CAS 2019年第3期318-324,共7页
In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pa... In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS. 展开更多
关键词 wireless heterogeneous network physical-layer security source-destination pair scheduling
下载PDF
Key Rate of Practical Quantum Communication Network
4
作者 黄娜 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第8期201-205,共5页
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the... The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment. 展开更多
关键词 quantum key distribution decoy state untrusted source statistical fluctuation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部