期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
制造环境下应用数据库系统安全性设计
1
作者 姜艳 张建立 +2 位作者 林田 江岩 张岳新 《长春理工大学学报(自然科学版)》 2001年第1期34-37,共4页
本文以长春柔性制造系统(CHFMS)技术重点实验室主实验系统为背景,采用Sybase数据库完成FMS安全技术改造中系统安全性设计、实施。
关键词 FMS 系统安全性技术
下载PDF
多天线频谱共享CR-NOMA系统安全中断性能分析
2
作者 吕铄 嵇建波 《电子测量技术》 北大核心 2023年第17期71-78,共8页
认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线... 认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线选择(OAS)方案的安全中断概率(SOP),并推导了其精确的闭合表达式。其次,分析了空时传输(STT)方案的SOP,并推导了其精确的闭合表达式。最后,对次用户两种方案的SOP渐近性能进行了分析,揭示了系统参数对SOP的影响。最后,采用Monte Carlo仿真验证了理论分析的正确性。研究发现,两种方案基站分别存在一个最优峰值发射功率,使得远距离次用户的安全中断性能最佳。仿真结果表明增大基站峰值发射功率,OAS方案的近距离次用户的SOP会始终优于STT方案,远距离次用户的SOP会劣于STT方案。 展开更多
关键词 认知无线电 非正交多址接入 安全中断性能 安全中断概率
下载PDF
黑龙江电视台150平方米虚实结合演播室系统设计与实现 被引量:1
3
作者 焦飞 《现代电视技术》 2016年第9期96-101,共6页
本文介绍了黑龙江电视台150平方米虚实结合演播室系统设计与实现,对演播室舞美灯光的改造、视音频高清化系统集成设计以及制作播出安全性考虑与实现进行了分析。
关键词 虚实结合演播室技术 ORAD虚拟前置和绿箱抠像技术 技术系统安全性
下载PDF
Effectiveness and Safety of Computer-controlled Periodontal Ligament Injection System in Endodontic Access to the Mandibular Posterior Teeth 被引量:3
4
作者 Quan Jing Kuo Wan +1 位作者 Xiao-jun Wang Lin Ma 《Chinese Medical Sciences Journal》 CAS CSCD 2014年第1期23-27,共5页
Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posteri... Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. Methods A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth: the premolar group (PM, z2=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4% articaine and 1 ' 100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. Results The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively; 2 X =34.3, P〈0.01). Both the PM and SM groups showed higher success rates than that of the FM group (v=l, f=16.73, P〈0.01, v=l, Z = 4.5, X2 2 P〈0.01). No irreversible adverse effects on the periodontal soft tissues at the injection sites were observed in the follow-up visits in any of the groups. Conclusion The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis. 展开更多
关键词 periodontal ligament injection endodontic access irreversible pulpitis
下载PDF
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
5
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed System Secure Storage Information Dispersal knight's tour problem
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部