期刊文献+
共找到83篇文章
< 1 2 5 >
每页显示 20 50 100
浅析汽车车身结构安全部件材料匹配优化设计 被引量:4
1
作者 许宝星 王靖博 《山东工业技术》 2016年第8期200-200,共1页
虽然汽车产业取得了迅速发展,汽车逐渐普及,设计水平也有显著提升,但是从汽车车身结构安全部件材料匹配的设计现状来看,还存在很多问题,其中表现最突出的就是安全部件的选择具有较大的盲目性,在优化设计的过程中,对材料的厚度和交互性... 虽然汽车产业取得了迅速发展,汽车逐渐普及,设计水平也有显著提升,但是从汽车车身结构安全部件材料匹配的设计现状来看,还存在很多问题,其中表现最突出的就是安全部件的选择具有较大的盲目性,在优化设计的过程中,对材料的厚度和交互性没有进行充分考虑。为了解决这些问题,提高汽车车身结构安全部件的设计水平,本文从碰撞安全性、关键安全部件的选择等方面进行了讨论和分析。 展开更多
关键词 汽车车身结构安 全部件 材料匹配 优化设计
下载PDF
反应堆直接安注结构优化及三维流动仿真研究
2
作者 朱紫豪 李国栋 +3 位作者 于天达 莫锦涛 谭佳琦 田长庆 《广东化工》 CAS 2024年第11期24-25,6,共3页
安注结构对于压水堆一回路的压力边界失效时防止堆芯将因为持续的发热而“蒸干”有着重要作用。为此,本文通过对安注结构进行建模仿真计算,分析安注结构对于流动的影响,并基于代理模型进行多目标优化,得出文丘里形式的直接安注结构安注... 安注结构对于压水堆一回路的压力边界失效时防止堆芯将因为持续的发热而“蒸干”有着重要作用。为此,本文通过对安注结构进行建模仿真计算,分析安注结构对于流动的影响,并基于代理模型进行多目标优化,得出文丘里形式的直接安注结构安注管有两个作用。一是节流作用,防止反应堆内的流体倒流,二是与挡流板配合使用,防止安注冷水在大流量时冲到吊篮组件上。通过优化使导流板两侧流动顺畅,导流板两侧压力分布接近,都较为均匀,优化后的导流板受力降低,优化的效果较为明显。 展开更多
关键词 结构 流动仿真 优化
下载PDF
浅议三峡工程金属结构制安质量管理
3
作者 孙柏 赵贵 《青海水力发电》 2007年第1期39-40,43,共3页
三峡工程金属结构制安量达到25.65万吨,主要分布在输水、泄水、进水、发电等建筑物内,工作条件复杂,施工难度大,其安装质量直接影响到整个水利枢纽的运行安全和效益。三峡工程金属结构制安质量管理采用“4+1”体系模式,形成了一... 三峡工程金属结构制安量达到25.65万吨,主要分布在输水、泄水、进水、发电等建筑物内,工作条件复杂,施工难度大,其安装质量直接影响到整个水利枢纽的运行安全和效益。三峡工程金属结构制安质量管理采用“4+1”体系模式,形成了一套完整的质量管理程序和控制措施。 展开更多
关键词 金属结构 质量管理
下载PDF
The Study on Tourist Destination Tourism Image Perception and Evaluation in Xi'an City 被引量:2
4
作者 王东红 李开宇 +2 位作者 郝凤娇 孙鹏 姚蓉 《Agricultural Science & Technology》 CAS 2013年第9期1285-1288,1343,共5页
[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionna... [Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction. 展开更多
关键词 Tourism destination Image perception Structural method Non-structural method Xi'an
下载PDF
Phytoplankton Community Structure and Its Spatial Distribution along Anhui-Jiangsu Reaches of the Yangtze River in Autumn 2009 被引量:2
5
作者 孟顺龙 陈家长 +4 位作者 胡庚东 吴伟 瞿建宏 范立民 裘丽萍 《Agricultural Science & Technology》 CAS 2012年第1期220-226,共7页
[Objective] Surveys of phytoplankton were taken during the autumn of 2009 along Anhui-Jiangsu reaches of the Yangtze River to understand the species com- position and their spatial distributions. [Method] Phytoplankto... [Objective] Surveys of phytoplankton were taken during the autumn of 2009 along Anhui-Jiangsu reaches of the Yangtze River to understand the species com- position and their spatial distributions. [Method] Phytoplankton species, their quanti- ties, biomass and the Mcnaughton's dominance indices were all measured and their spatial distribution characteristics were determined using cluster analysis. [Result] There were 27 species, belonging to 5 phyla, namely Chlorophyta, Bacillariophyta, Cyanophyta, Euglenophyta and Cryptophyta, of phytoplankton collected and identified from the surveys. Results showed that Bacillariophyta was the predominant phyto- plankton with 16 species collected which accounted for 59.3% of the total species identified. The number of species collected belonging to Chlorophyta, Cyanophyta, Cryptophyta and Euglenophyta were 6, 2, 2, and 1, accounting for 22.2%, 7.4%, 7.4% and 3.7% of the total number identified, respectively. At the species level, the predominant species were Fragilaria crotonensis, Melosira italica, Navicula crypto- cephala, Cyclotella striata and Chroomonas acuta. Phytoplankton abundance was ranging from 5.68×10^4 to 7.08×10^4 cells/L with its average of 6.01×10^4 cells/L. Phyto- plankton biomass was ranging from 30.43 to 34.73 μg/L with its average of 32.46 μg/L. Compared with the previous reports, the number of phytoplankton species was decreased but its abundance and biomass was increased along the Jiangsu reach of the Yangtze River. However, Bacillariophyta species were still the predominant species and the phytoplankton community structure had not significantly changed from the previous studies. [Conclusion] These results might be explained as that the water quality in the Yangtze River was deteriorated but had not come to the worst. The results of similarity analysis gave two clusters of phytoplankton community as Nanjing, Wuhu and Jiangyin sampling sites were clustered into one group and Tongling and Anqing were clustered into another group. 展开更多
关键词 PHYTOPLANKTON Community structure Yangtze River Anhui-Jiangsu reaches Spatial characteristics
下载PDF
Investigation on the Pointed Cocoon of Wild Silkworm Descendant
6
作者 陈义安 张友洪 +5 位作者 王晓芬 刘彬斌 杜周和 刘俊凤 韩兵 胡春梅 《Agricultural Science & Technology》 CAS 2012年第1期217-219,226,共4页
[Objective] To study the cocoon traits of wild silkworm descendants. [Method] In the selective breeding of domesticated raising wild silkworm and wild silkworm descendants, investigation on the traits of the built coc... [Objective] To study the cocoon traits of wild silkworm descendants. [Method] In the selective breeding of domesticated raising wild silkworm and wild silkworm descendants, investigation on the traits of the built cocoons was carried out. [Result] The pointed traits of cocoons displayed obviously in the wild silkworm descendants, its pointed parts were consistent with the rear part of silkworm chrysalis, and the female silkworm has slight difference, indicating the silkworm co- coon pointed trait was hereditary. [Conclusion] This study provided references for the study of silkworm cocoon traits of wild silkworm descendant and guides the selective breeding of silkworm variety. 展开更多
关键词 Silkworm cocoon Pointed Wild silkworm
下载PDF
Scalable single sign-on system 被引量:2
7
作者 黄河 单志广 黄冬泉 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期465-468,共4页
To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own ... To address the scalability and identity federation problems of the traditional single sign-on system, the proposed scheme divides the security systems into different security domains. Each security domain has its own security servers and service providers, and there are trust relationships between different security domains for identity federation. The security server is responsible for authentication and authorization inside the domain, and offers identity federation capability for different domains. The security assertion markup language (SAML) assertion is used as security token in the system for authentication, authorization, and identity federation. The design of the proposed single sign-on process is based on web service security framework and multiple security domains, and the authorization is always deployed in the local area inside the service provider' s security domain, which enables web service clients, both inside and outside their security domains, to access the services in a simple, scalable, standard and secure way. 展开更多
关键词 security systems ARCHITECTURE web service single sign-on identity federation
下载PDF
APPLICATIONS OF PIEZOELECTRIC MATERIAL SENSORS IN SMART STRUCTURES 被引量:1
8
作者 石立华 陶宝祺 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1996年第2期90+87-89,共4页
The use of piezoelectric material sensors in smart composite structures is investigated. An experimental structure bonded with lead zirconate titanate piezoelectric ceramic(PZT) sensors is developed. These bonded sens... The use of piezoelectric material sensors in smart composite structures is investigated. An experimental structure bonded with lead zirconate titanate piezoelectric ceramic(PZT) sensors is developed. These bonded sensors are employed to monitor load variations and transient impacts in the structure. Incorporated with pattern recognition approach, PZT sensors have succeeded in detecting the onset and location of damages. 展开更多
关键词 piezoelectric materials SENSORS DAMAGE health monitoring smart structure
下载PDF
The Study of Farmland Information Management System based on Wireless Sensor Networks 被引量:2
9
作者 余华 吕宁波 《Agricultural Science & Technology》 CAS 2010年第7期183-185,188,共4页
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t... To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning. 展开更多
关键词 Wireless Sensor Network System structure Energy control System safety
下载PDF
Damage and penetration behavior of aluminum foam at various impacts 被引量:6
10
作者 CHO Hosun CHO Jaeung 《Journal of Central South University》 SCIE EI CAS 2014年第9期3442-3448,共7页
In this work, the damage and penetration behavior of aluminum foam at various types of impact were examined through experiments. The impact energy of a striker was applied on the fixed aluminum foam having a thickness... In this work, the damage and penetration behavior of aluminum foam at various types of impact were examined through experiments. The impact energy of a striker was applied on the fixed aluminum foam having a thickness of 25 mm while increasing its impact by 2 J at each strike from 6 J to 16 J. The results show that the impact energies from 6 J to 12 J could not penetrate aluminum foam. However, the aluminum foam applied with the impact energy of 12 J incurred severe damages on its lower part. Finally, the aluminum foam applied with the impact energy of 14 J was penetrated. The striker having the impact energy of 6 J could penetrate aluminum foam around 10 mm. At this moment, aluminum foam could absorb the impact energy of around 9 J. When the impact energy of 14 J was applied on the aluminum foam, the aluminum foam was penetrated and it absorbed the impact energy of around 17.2 J. It is possible to create the safer structure against impact using the results of this work. The simulation results for the verification of the experimental results imply that the results for all the experiments in this work are reliable. It is possible to predict the structural safety of the aluminum foam for an impact if the impact behavior of aluminum foam performed in this work is utilized. 展开更多
关键词 aluminum foam absorbed energy finite element analysis impact energy impact load
下载PDF
Pressure waves acting on wall of a tunnel and their impact on the tunnel's structural safety 被引量:5
11
作者 LIU Tang-hong WANG Lei +3 位作者 LI Li YANG Fan CHEN Zheng-wei LIU Hong-kang 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第10期3223-3237,共15页
The transient pressures induced by trains passing through a tunnel and their impact on the structural safety of the tunnel lining were numerically analyzed.The results show that the pressure change increases rapidly a... The transient pressures induced by trains passing through a tunnel and their impact on the structural safety of the tunnel lining were numerically analyzed.The results show that the pressure change increases rapidly along the tunnel length,and the maximum value is observed at around 200 m from the entrance,while the maximum pressure amplitude is detected at 250 m from the entrance when two trains meeting in a double-track tunnel.The maximum peak pressure on the tunnel induced by a train passing through a 70 m^(2) single-track tunnel,100 m^(2) double-track tunnel and two trains meeting in the 100 m^(2) double-track tunnel at 350 km/h,are−4544 Pa,−3137 Pa and−5909 Pa,respectively.The aerodynamic pressure induced axial forces acting on the tunnel lining are only 8%,5%and 9%,respectively,of those generated by the earth pressure.It seems that the aerodynamic loads exert little underlying influence on the static strength safety of the tunnel lining providing that the existing cracks and defects are not considered. 展开更多
关键词 high-speed train TUNNEL pressure change tunnel lining structural safety
下载PDF
In Situ Experiments on Supporting Load Effect of Large-span Deep Tunnels in Hard Rock 被引量:4
12
作者 HE Ben-guo ZHU Yong-quan +2 位作者 SUN Ming-lei LIU Hong-yan ZHANG Zhi-qiang 《Journal of Mountain Science》 SCIE CSCD 2013年第6期1125-1136,共12页
A section of the Nanliang high speed railway tunnel on Shijiazhuang-Taiyuan high-speed passenger railway line in China was instrumented and studied for its mechanical properties and performances. The cross section for... A section of the Nanliang high speed railway tunnel on Shijiazhuang-Taiyuan high-speed passenger railway line in China was instrumented and studied for its mechanical properties and performances. The cross section for the tunnel was300 m2and is classified as the largest cross section for railway tunnels in China. Through in situ experimental studies, mechanistic properties of the tunnel were identified, including the surrounding rock pressure, convergences along tunnel perimeter and safety of primary support and lining structure.Based on the field measured data, the surrounding rock pressure demand for large-span deep tunnel in hard rock is recommended as double peak type in the vertical direction and fold line type was recommended for horizontal pressure. The results suggested that Promojiyfakonov's theory was most close to the monitored value. Specific recommendations were also generated for the use of bolts in tunnel structures.Numerical simulation was used to evaluate the safety of the tunnel and it confirmed that the current design can satisfy the requirement of the current code. 展开更多
关键词 Large-span tunnel Railway tunnel Surrounding rock pressure Load distribution In situ experiment
下载PDF
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s 被引量:1
13
作者 Yao Shan Xia Chunhe +2 位作者 Hu Junshun Jiao Jian Li Xiaojian 《China Communications》 SCIE CSCD 2012年第7期22-35,共14页
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given 展开更多
关键词 policy refinement network security policy semantic similarity ontology
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
14
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
Structure buckling and non-probabilistic reliability analysis of supercavitating vehicles 被引量:1
15
作者 安伟光 周凌 安海 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第4期561-569,共9页
To perform structure buckling and reliability analysis on supercavitating vehicles with high velocity in the submarine,supercavitating vehicles were simplified as variable cross section beam firstly.Then structural bu... To perform structure buckling and reliability analysis on supercavitating vehicles with high velocity in the submarine,supercavitating vehicles were simplified as variable cross section beam firstly.Then structural buckling analysis of supercavitating vehicles with or without engine thrust was conducted,and the structural buckling safety margin equation of supercavitating vehicles was established.The indefinite information was described by interval set and the structure reliability analysis was performed by using non-probabilistic reliability method.Considering interval variables as random variables which satisfy uniform distribution,the Monte-Carlo method was used to calculate the non-probabilistic failure degree.Numerical examples of supercavitating vehicles were presented.Under different ratios of base diameter to cavitator diameter,the change tendency of non-probabilistic failure degree of structural buckling of supercavitating vehicles with or without engine thrust was studied along with the variety of speed. 展开更多
关键词 supercavitating vehicles critical buckling load non-probabilistic failure degree Monte-Carlomethod
下载PDF
Trust Management Mechanism for Internet of Things 被引量:4
16
作者 GU Lize WANG Jingpei SUN Bin 《China Communications》 SCIE CSCD 2014年第2期148-156,共9页
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches ab... Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT. 展开更多
关键词 Internet of Things trustmanagement formal semantics trust decision-making
下载PDF
A 3-D DDA damage analysis of brick masonry buildings under the impact of boulders in mountainous areas 被引量:3
17
作者 LIU Shu-guang LI Zhu-jun +3 位作者 ZHANG Hong WU Wei ZHONG Gui-hui LOU Sha 《Journal of Mountain Science》 SCIE CSCD 2018年第3期657-671,共15页
In mountainous areas, geological disasters carrying large boulders can cause severe damage to the widely used masonry buildings due to the high impact forces. To better understand the damage of brick masonry buildings... In mountainous areas, geological disasters carrying large boulders can cause severe damage to the widely used masonry buildings due to the high impact forces. To better understand the damage of brick masonry buildings under the impact of boulders, a "block-joint" model is developed using threedimensional discontinuous deformation analysis(3-D DDA) to simulate the behaviour of the "brick-mortar" structure. The "block-joint" model is used to capture not only the large displacement and deformation of individual bricks but also the large-scale sliding and opening along the mortar between the bricks. The linear elastic constitutive model is applied to account for the non-plastic deformation behaviour of brick materials. Furthermore, the mechanical characteristics of the mortar are represented using the Mohr-Coulomb and Drucker-Prager criteria. To propose safe structural design schemes and effective reinforcement for brick masonry buildings, seven construction techniques are considered, includingdifferent grades of brick and mortar, effective shear areas and reinforced members. The proposed 3-D DDA model is used to analyse the velocity distribution and the key point displacements of the brick masonry building under the impact of boulders. The results show that upgrading the brick and mortar, increasing the wall thickness, making full use of the wall thickness, and adding a circular beam and structural column are very effective approaches for improving the impact resistance of brick masonry buildings. 展开更多
关键词 Damage analysis Brick masonry building Boulder impact Brick-mortar structure Block-joint model Discontinuous deformation analysis
下载PDF
Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups 被引量:3
18
作者 Yue Zhang Hanlin Zhang +1 位作者 Rong Hao Jia Yu 《China Communications》 SCIE CSCD 2018年第11期111-121,共11页
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica... Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient. 展开更多
关键词 cloud storage cloud storage auditing large-scale users third party auditor
下载PDF
Towards Efficient Security Policy Lookup on ManyCore Network Processing Platforms 被引量:1
19
作者 WANG Xiang QI Yaxuan +2 位作者 WANG Kai XUE Yibo LI Jun 《China Communications》 SCIE CSCD 2015年第8期146-160,共15页
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing... Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed. 展开更多
关键词 packet classification patternmatching ALGORITHMS data structures
下载PDF
China’s National Research Project on Future Internet: Objectives, Ideas, and Progresses
20
作者 Zhang Hongke Luo Hongbin 《China Communications》 SCIE CSCD 2009年第1期128-138,共11页
The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigiou... The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigious National Basic Research Program (also called the "973 program") of China, was launched in May 2007. This project adopts a clean-slate approach and aims to design a novel future Internet that not only inherits the merit of the Internet today but also overcomes the drawbacks of the current Internet. In this paper, we make an overview of this project with a focus on its objectives, basic ideas, and progresses. Although this is a basic research project, its success will bring significant benefits to China as well as all other countries in the world. 展开更多
关键词 future Internet Internet architecture SECURITY SCALABILITY MOBILITY
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部