期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
基于角色的区块链拍卖合约抽象建模及其时间安全性与公平性验证
1
作者 王昌晶 欧阳俊媛 +3 位作者 张取发 左正康 程着 卢家兴 《通信学报》 EI CSCD 北大核心 2024年第10期225-242,共18页
为提升拍卖合约时间安全性验证效率及验证公平性,提出基于角色的拍卖合约抽象建模及其验证方法。首先,对合约源代码进行基于账户角色的抽象建模,转换为时间自动机网络模型,并对时间安全性进行形式化描述,用UPPAAL工具验证。其次,提取合... 为提升拍卖合约时间安全性验证效率及验证公平性,提出基于角色的拍卖合约抽象建模及其验证方法。首先,对合约源代码进行基于账户角色的抽象建模,转换为时间自动机网络模型,并对时间安全性进行形式化描述,用UPPAAL工具验证。其次,提取合约源代码机制,建立智能合约机制模型,同样转换为时间自动机网络模型,并对4种公平性进行形式化描述,再用UPPAAL验证。最后,通过2个经典案例证明了所提方法的可行性和有效性。 展开更多
关键词 拍卖合约 时间安全性 公平性 时间自动机 UPPAAL
下载PDF
冠脉介入检查和治疗术后患者应用经皮血管缝合器离床活动时间安全性的临床研究
2
作者 张景玲 唐玉龙 李和翠 《黑龙江医学》 2008年第10期788-789,共2页
目的观察应用经皮血管缝合器后,离床活动的安全时间,减少病人的痛苦及预防各种并发症的发生。方法119例心脏介入检查和治疗术后,应用美国Perclose Ine生产的血管缝合器缝合;术后随机分为术后2 h活动、术后4 h活动两组,行心电、血压监护... 目的观察应用经皮血管缝合器后,离床活动的安全时间,减少病人的痛苦及预防各种并发症的发生。方法119例心脏介入检查和治疗术后,应用美国Perclose Ine生产的血管缝合器缝合;术后随机分为术后2 h活动、术后4 h活动两组,行心电、血压监护,随时监测穿刺处切口渗血、血肿、血栓形成、假性动脉瘤、动静脉瘘并记录。结果2 h活动组,有4例活动后局部渗血,量约5.0 mL,立即卧床,术侧肢体制动,局部压迫;有1例回室后,即因小便而离床,无意外情况发生;4 h活动组,有2例活动后局部少量渗血,量约3.0 mL,立即卧床,术侧肢体制动,局部压迫;有2例回室后因排尿而离床,无意外情况发生。结论应用美国Perclose Ine生产的血管缝合器缝合穿刺部位4 h后离床活动为宜,可以减少并发症的发生,保证治疗的效果。 展开更多
关键词 冠脉介入 经皮血管缝合器 活动时间安全性
下载PDF
基于分数阶统一混沌系统的图像加密算法 被引量:8
3
作者 毛骁骁 孙克辉 刘文浩 《传感器与微系统》 CSCD 2017年第6期138-141,共4页
为了解决数字图像信息传输所面临的安全性问题,基于分数阶统一混沌系统,提出了一种新的图像加密算法。采用经典的置乱—扩散机制,整个加密策略分为图像像素位置置乱和像素值替代两个过程。在像素置乱的过程中,采用排序的方式分别对图像... 为了解决数字图像信息传输所面临的安全性问题,基于分数阶统一混沌系统,提出了一种新的图像加密算法。采用经典的置乱—扩散机制,整个加密策略分为图像像素位置置乱和像素值替代两个过程。在像素置乱的过程中,采用排序的方式分别对图像的行和列进行置乱。在像素值替代的过程中,通过与密钥序列进行异或运算来实现加密。而混沌系统则作为伪随机序列发生器,并作用于加密的各个阶段。安全性和时间复杂度分析表明:该算法具有高的安全性和低的时间复杂度,且能够抵御几种常见的攻击方式。 展开更多
关键词 分数阶统一混沌系统 图像加密 安全性时间复杂度分析
下载PDF
A software cost model with maintenance and risk costs for safety-critical systems
4
作者 刘宏伟 杨孝宗 +1 位作者 曲峰 董剑 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期584-587,共4页
According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are ... According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained. 展开更多
关键词 safety-critlcal system software reliability growth model software cost model optimal software release time
下载PDF
Clinical Efficacy and Safety Analysis of Laparoscopic- assisted Vaginal Surgery and Laparoscopic-alone Surgery in Treatment of Endometrial Cancer
5
作者 HU Duoduo XU Ming-juan 《International Journal of Technology Management》 2014年第10期91-93,共3页
Objective: Assess clinical efficacy and safety analysis of laparoscopic-assisted vaginal surgery and laparoscopic-alone surgery in treatment of endometrial cancer. Methods: select 76 cases of endometrial cancer pati... Objective: Assess clinical efficacy and safety analysis of laparoscopic-assisted vaginal surgery and laparoscopic-alone surgery in treatment of endometrial cancer. Methods: select 76 cases of endometrial cancer patients, divided into two groups, 40 in laparoscopic-alone group and 36 in laparoscopic-assisted group, and compare operation time, intraoperative blood loss, intraoperative complications, postoperative complications, lymph node number, anal exhaust time, indwelling catheter days and hospitalization days by group. Result: compared with laparoscopic-alone surgery, laparoscopic-assisted vaginal surgery has certain advantages in reducing intraoperative blood loss, intraoperative and postoperative complications, anal exhaust time, indwelling catheter days and hospitalization days. Discussion: laparoscopic-assisted vaginal surgery is a relatively safe, effective and good economic benefit surgical method in treatment of endometrial cancer. 展开更多
关键词 Clinical Efficacy Laparoscopic Surgery Vaginal Surgery Endometrial Cancer
下载PDF
An Analysis on the Inconsistency of the Security Supervision Policy in the Method of Game Theory
6
作者 WANGXing-yu JIAXing-qin 《Chinese Quarterly Journal of Mathematics》 CSCD 2003年第1期93-98,共6页
This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate pol... This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate policy, concludes that the security supervision department is inclined to increase or decrease the security transaction tax rate, thus points out ways for supervision department to surmount this difficulty. 展开更多
关键词 SECURITY supervision policy GAME
下载PDF
Analysis of low energy arc discharge characteristics based on dynamic V-A characteristics model
7
作者 井莉楠 王立功 《Journal of Coal Science & Engineering(China)》 2006年第2期91-93,共3页
Low energy arc discharge characteristics was analyzed based on dynamic V-A characteristics model. It draws conclusions that discharge time relates to the source voltage and the product of inductance and stable current... Low energy arc discharge characteristics was analyzed based on dynamic V-A characteristics model. It draws conclusions that discharge time relates to the source voltage and the product of inductance and stable current, discharge time will increase when the source voltage increases; current reduce rate is in inverse proportion to the value of inductance; arc resistance when the arc occurs is the ratio of minimum arcing voltage to stable current. It also gains the expressions of arc resistance and arc power, arc resistance and arc power both increase as the source voltage increases and decrease as the value of inductance increases. Conclusions above mentioned are helpful to design intrinsically safe circuits. 展开更多
关键词 intrinsically safe circuit discharge time arc resistance arc power
下载PDF
Improvement of Pseudo-static Method for Slope Stability Analysis 被引量:3
8
作者 YANG Chang-wei ZHANG Jian-jing +2 位作者 FU Xiao ZHU Chuan-bin BI Jun-wei 《Journal of Mountain Science》 SCIE CSCD 2014年第3期625-633,共9页
traditional In this paper, two drawbacks pseudo-static method (vertical of the slice method) in the slope stability evaluation have been studied. First, the sliding mass is divided into vertical slices according to... traditional In this paper, two drawbacks pseudo-static method (vertical of the slice method) in the slope stability evaluation have been studied. First, the sliding mass is divided into vertical slices according to this method, which is irrational to some extent in the seismic design of slope. Second, only peak ground acceleration (PGA) is considered, and the effects of shaking frequency and duration on slope stability are neglected. And then, based on the theory of elastic wave and the summarized geological model, this paper put forwards an improved method of pseudo-method by using the theory of elastic wave and Hilbert-Huang transform. The improved pseudostatic method gives reasonable considerations to the time-frequency effects of seismic wave and its rationality has been verified by the shaking table test. This method can evaluate the safety of a slope, the happening time and the scale of landslides. At the same time, this method also can improve the high accuracy of the evaluation of the safety of the slope. 展开更多
关键词 Pseudo-static analysis Slope stability Elastic wave Hilbert-Huang Transform Transfercoefficient slice
下载PDF
Information Security Protocol Based System Identification with Binary-Valued Observations 被引量:2
9
作者 XU Changbao ZHAO Yanlong ZHANG Ji-Feng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期946-963,共18页
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases. 展开更多
关键词 CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部