期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
碳普惠共同机制下减排量认证法律制度研究
1
作者 茆寒雨 范晶波 《山东商业职业技术学院学报》 2023年第5期82-87,共6页
为了进一步加快实现碳达峰、碳中和目标,碳普惠制度应运而生。碳普惠制度是为了深耕全社会节能减碳的“低碳”意识,可是因为不同区域碳普惠项目所产生的减排量在区域间的认可度不高这一原因阻碍了碳普惠制度的发展。近日,多家国家级碳... 为了进一步加快实现碳达峰、碳中和目标,碳普惠制度应运而生。碳普惠制度是为了深耕全社会节能减碳的“低碳”意识,可是因为不同区域碳普惠项目所产生的减排量在区域间的认可度不高这一原因阻碍了碳普惠制度的发展。近日,多家国家级碳排放权交易平台共同启动“碳普惠共同机制”,目的是让各区域的碳普惠项目相互认可、所产生的减排量可以相互流通最终带动碳普惠制度高效发展。目前,区域间认可度不高的主要原因是对于碳普惠核证减排量并没有统一认证法律制度。通过对碳普惠核证减排量的认证法律制度研究,分析其目前存在的不足并提出相关建议,试图为碳普惠核证减排量全面进入全国碳排放权交易市场提供合理的基础。 展开更多
关键词 碳普惠 碳排放权交易 减排量认证 法律制度
下载PDF
贯彻执行计量认证新准则 加强我省环境监测能力建设——从计量认证评审和持证上岗考核看我省环境监测能力建设
2
作者 潘进夏 王道君 +2 位作者 苏广路 沈炳岗 王群梅 《陕西环境》 2002年第3期8-10,共3页
通过计量认证评审和持证上岗考核工作,发现了制约我省各级环境监测站发展的突出问题。结合计量认证评审新准则,提出了应对措施。
关键词 环境监测 量认证评审 持证上岗考核 能力建设 陕西
下载PDF
基于循环移位的轻量型相互认证协议研究 被引量:5
3
作者 张学军 王玉 +1 位作者 王锁萍 孙知信 《电子学报》 EI CAS CSCD 北大核心 2012年第11期2270-2275,共6页
安全隐私是射频识别系统的关键问题,该文在轻量型相互认证协议的基础上,根据阅读器产生的随机数对将要传送的信息进行循环左移,提出了基于循环移位的轻量型相互认证协议(CSLMAP协议),并用GNY逻辑对协议的安全性进行了证明.结果显示,所... 安全隐私是射频识别系统的关键问题,该文在轻量型相互认证协议的基础上,根据阅读器产生的随机数对将要传送的信息进行循环左移,提出了基于循环移位的轻量型相互认证协议(CSLMAP协议),并用GNY逻辑对协议的安全性进行了证明.结果显示,所提出的CSLMAP协议解决了轻量型相互认证协议中的安全隐私问题,提高了认证协议的执行效率,降低了标签的应用成本. 展开更多
关键词 射频识别技术 安全隐私 认证协议
下载PDF
紧凑型荧光灯含汞量认证情况介绍
4
作者 陈松 盖敏 《中国照明电器》 2013年第3期40-43,共4页
对紧凑型荧光灯含汞量认证范围、技术要求、认证规则几大要素进行归纳,并介绍行业内获证及采信情况。
关键词 紧凑型荧光灯含汞量认证 认证范围 技术要求 认证规则 获证情况
原文传递
清洁发展机制条件下林业可认证减排量成本价格的研究
5
作者 李建华 黄强 彭世揆 《河南农业大学学报》 CAS CSCD 北大核心 2008年第1期35-39,共5页
以杨树为例,结合杨树的林分生长模型和生物量扩展因子的研究,应用净收益法构建了林业可认证减排量成本价格计算模型.结果表明,可认证减排量的价格受造林面积、立地条件及木材价格等方面的影响,并随造林面积的增大而不断减小,尤其在造林... 以杨树为例,结合杨树的林分生长模型和生物量扩展因子的研究,应用净收益法构建了林业可认证减排量成本价格计算模型.结果表明,可认证减排量的价格受造林面积、立地条件及木材价格等方面的影响,并随造林面积的增大而不断减小,尤其在造林面积小于2 000 hm2时,可认证减排量价格变化较大. 展开更多
关键词 清洁发展机制 认证减排 林业碳汇
下载PDF
浅谈四川省水环境监测质量技术监督 被引量:1
6
作者 冷荣艾 《人民长江》 北大核心 2012年第12期92-94,98,共4页
为了使水利行业质量技术监督工作达到规范化、法制化和标准化的要求,需要建立严格的规章制度,并开展科学的审核和监督工作。介绍了四川省水环境监测中心在水利计量、计量认证和质量管理方面所取得的主要成果及具体经验,包括:规范管理,... 为了使水利行业质量技术监督工作达到规范化、法制化和标准化的要求,需要建立严格的规章制度,并开展科学的审核和监督工作。介绍了四川省水环境监测中心在水利计量、计量认证和质量管理方面所取得的主要成果及具体经验,包括:规范管理,提高检验能力;建立仪器设备计量标准,提升质量技术监督水平;强化质量管理,提高社会服务能力等几个方面。指出了下一步工作的重点,为四川省水资源保护工作的进一步发展和深化提供了参考和借鉴。 展开更多
关键词 量认证:计:质管理 水环境监测 四川省
下载PDF
接受经皮冠状动脉介入术患者焦虑情绪的心理应对研究 被引量:7
7
作者 秦发伟 解晨 +3 位作者 刘轶平 金琳 李敏 姜风华 《山东医药》 CAS 北大核心 2004年第20期46-46,共1页
关键词 经皮冠状动脉介入术 焦虑情绪 心理应对 国际认证焦虑 冠心病
下载PDF
Revised quantum direct communication scheme with mutual authentication 被引量:2
8
作者 刘文杰 陈汉武 +1 位作者 许娟 刘志昊 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期532-536,共5页
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati... Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states. 展开更多
关键词 quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent's attack
下载PDF
PKI及其在电子政务邮件系统中的应用 被引量:1
9
作者 曲朝阳 温婉如 王富森 《东北电力学院学报》 2005年第6期1-4,13,共5页
在分析公钥基础设施的基础上,将基于公钥基础设施的安全策略和技术引入到电子政务的应用中。指出目前广泛应用的几种安全电子邮件协议在实际应用中存在的不足,特别是在安全机制方面的不足,提出了一种基于PKI的安全电子邮件系统实现方案... 在分析公钥基础设施的基础上,将基于公钥基础设施的安全策略和技术引入到电子政务的应用中。指出目前广泛应用的几种安全电子邮件协议在实际应用中存在的不足,特别是在安全机制方面的不足,提出了一种基于PKI的安全电子邮件系统实现方案,解决了目前邮件传输和接受过程中的身份认证、发送者和接受者的不可否认性、数据的完整性和保密性等问题。 展开更多
关键词 公开密钥基础设施 电子政务 认证中心轻目录访问协议
下载PDF
浅谈实现管理体系有效持续改进
10
作者 许华晨 《经济研究导刊》 2011年第35期199-200,共2页
定期开展质量体系的审核、评审,开展有效的质量监督,积极参加各级能力验证活动,做好标准装置的重复性试验和稳定性考核,做好人员培训、考核工作,做好抱怨的处理工作,是实现管理体系有效性持续改进的重要环节。
关键词 管理体系 有效运行 量认证
下载PDF
One-Way Quantum Authenticated Secure Communication Using Rotation Operation 被引量:1
11
作者 Chia-Wei Tsai Toung-Shang Wei Tzonelih Hwang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1023-1026,共4页
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to... This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. 展开更多
关键词 quantum authentication quantum direct communication
下载PDF
Quantum Secure Direct Communication with Authentication Expansion Using Single Photons 被引量:2
12
作者 杨静 王川 张茹 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第11期829-834,共6页
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc... In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed. 展开更多
关键词 quantum secure direct communication quantum authentication authentication key expansion
下载PDF
HONG KONG HOUSING AUTHORITY ——THE EVOLUTION OF QUALITY
13
作者 贝德思 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1998年第1期141-147,共7页
The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction proj... The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service. 展开更多
关键词 quality management housing authority quality improvement
下载PDF
Intra-Palm Propagation Signals as Suitable Biometrics for Successive Authentication
14
作者 Takashi Inada Yuuta Sodani Isao Nakanishi 《Computer Technology and Application》 2016年第2期65-72,共8页
We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measu... We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm propagation signals from twenty-one experimental subjects. We also evaluate the verification performance based on Euclidian distance or SVM (support vector machine). The equal error rate in the case of SVM is aovroximatelv 24%. 展开更多
关键词 BIOMETRICS successive authentication intra-palm propagation signal support vector machine.
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
15
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Food Physics and Food Safety- Some Aspects in Food Processing and Food Quality Control 被引量:1
16
作者 Andras S. Szabo Peter Laszlo 《Journal of Life Sciences》 2010年第7期58-60,共3页
The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has... The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products. 展开更多
关键词 Food physics food processing food quality quality assurance radiation methods safety.
下载PDF
Improved Keystroke Authentication Accuracy Based on Statistics and Weight 被引量:2
17
作者 Li Jian Guo Xiaojing +1 位作者 Li Meiyun Li Ruifan 《China Communications》 SCIE CSCD 2012年第7期36-41,共6页
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr... Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, 展开更多
关键词 AUTHENTICATION BIOMETRICS keystroke dynamics
下载PDF
A New Multi-platform Data Acquisition System for Power Quality Metrological Certification
18
作者 Maurizio Caciotta Stefano Di Pasquale Sabino Giametti Fabio Leccese Daniele Trinca 《Journal of Energy and Power Engineering》 2014年第7期1279-1285,共7页
In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plu... In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied. 展开更多
关键词 Power quality acquisition card multi-platform system.
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
19
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 information hiding digital watermarking vector map FINGERPRINT AUTHENTICATION
下载PDF
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA 被引量:13
20
作者 Chengsheng Yuan Xingming Sun Rui Lv 《China Communications》 SCIE CSCD 2016年第7期60-65,共6页
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artifici... Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection. 展开更多
关键词 fingerprint liveness detection wavelet transform local phase quantity principal component analysis support vector machine
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部