期刊文献+
共找到43篇文章
< 1 2 3 >
每页显示 20 50 100
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
1
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
An autobias control system for the electro optic modulator used in a quantum key distribution system 被引量:1
2
作者 陈文芬 魏正军 +6 位作者 郭莉 侯丽燕 王赓 王金东 张智明 郭建平 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期261-268,共8页
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ... In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM. 展开更多
关键词 quantum key distribution electro-optic modulator autobias control lock-in-amplifier
下载PDF
Research on key control technologies of all-position automatic welding machine 被引量:1
3
作者 曾惠林 杜则裕 +1 位作者 马静 黄福祥 《China Welding》 EI CAS 2009年第3期69-73,共5页
The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline cons... The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects. 展开更多
关键词 key control technology ALL-POSITION automatic welding machine welding parameters
下载PDF
The Research on the Methods to Confirm the Key Control Points of the Internal Accounting Control
4
作者 Liuping Chen Sundi Zhao +1 位作者 Wenchen Zhao Jingjing Cao 《Journal of Modern Accounting and Auditing》 2005年第7期50-57,共8页
The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well co... The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well controlled, the process of the operation disposal will be mistaken and cannot reach the goal. However, for the confirmation of the control points, many studies only do qualitative research from the important aspect instead of quantificational research. They are devoid of a series of scientific methods. This paper advances quantificational methods to confirm the key control points from two aspects of job evaluation and mathematics model. 展开更多
关键词 accounting control key control points quantificational methods
下载PDF
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
5
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 Oblivious Transfer(OT) Access control(AC) Identity-Based Encryption(IBE) Anonymous key Issuing(AKI)
下载PDF
Key technologies and applications of intelligent dispatching command for high-speed railway in China 被引量:1
6
作者 Shuxin Ding Tao Zhang +2 位作者 Kai Sheng Yuanyuan Chen Zhiming Yuan 《Railway Sciences》 2023年第3期336-346,共11页
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new... Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods. 展开更多
关键词 High-speed railway Intelligent dispatching command Intelligent centralized traffic control key technologies and application
下载PDF
Strengthening Control of Key Pollution Sources
7
作者 He Furong(Shengli Petroleum Administration) 《China Oil & Gas》 CAS 1998年第3期192-193,共2页
关键词 Strengthening control of key Pollution Sources
下载PDF
Mechanism of rock burst caused by fracture of key strata during irregular working face mining and its prevention methods 被引量:14
8
作者 Zengqiang Yang Chang Liu +3 位作者 Hengzhong Zhu Fuxing Xie Linming Dou Jianhang Chen 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2019年第6期889-897,共9页
To study the occurrence mechanism of rock burst during mining the irregular working face,the study took irregular panel 7447 near fault tectonic as an engineering background.The spatial fracture characteristic of over... To study the occurrence mechanism of rock burst during mining the irregular working face,the study took irregular panel 7447 near fault tectonic as an engineering background.The spatial fracture characteristic of overlying strata was analyzed by Winkler elastic foundation beam theory.Furthermore,the influence law of panel width to suspended width and limit breaking span of key strata were also analyzed by thin plate theory.Through micro-seismic monitoring,theoretical analysis,numerical simulation and working resistance of support of field measurement,this study investigated the fracture characteristic of overlying strata and mechanism of rock burst in irregular working face.The results show that the fracture characteristic of overlying strata shows a spatial trapezoid structure,with the main roof being as an undersurface.The fracture form changes from vertical‘‘O-X"type to transverse‘‘O-X"type with the increase of trapezoidal height.From the narrow mining face to the wide mining face,the suspended width of key strata is greater than its limit breaking width,and a strong dynamic load is produced by the fracture of key strata.The numerical simulation and micro-seismic monitoring results show that the initial fracture position of key strata is close to tailgate 7447.Also there is a high static load caused by fault tectonic.The dynamic and static combined load induce rock burst.Accordingly,a cooperative control technology was proposed,which can weaken dynamic load by hard roof directional hydraulic fracture and enhance surrounding rock by supporting system. 展开更多
关键词 ROCK BURST IRREGULAR working FACE key STRATA Dynamic and static combined load Cooperative control
下载PDF
Superposed disturbance mechanism of sequential overlying strata collapse for gob-side entry retaining and corresponding control strategies 被引量:13
9
作者 HAN Chang-liang ZHANG Nong +2 位作者 RAN Zhi GAO Rui YANG Hou-qiang 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第9期2258-2271,共14页
Gob-area roof rupture movement is a key disturbance factor for gob-side entry retaining.The characteristics of gob-area sequential roof collapse of overlying strata and superposed disturbance mechanism for gob-side en... Gob-area roof rupture movement is a key disturbance factor for gob-side entry retaining.The characteristics of gob-area sequential roof collapse of overlying strata and superposed disturbance mechanism for gob-side entry retaining are obtained via physical simulation and theoretical analysis,in which the scope of disturbed strata is enlarged from main roof to fracture zone.The experiment reveals that as a working face advances,roof strata sequentially collapse from bottom to top and produce multiple disturbances to gob-side entry retaining.Key strata among the overlying strata control each collapse.Main roof subsidence is divided into three stages:flexure subsidence prior to rupture,rotational subsidence during rupture and compressive subsidence after rupture.The amounts of deformation evident in each of the three stages are 15%,55%and 30%,respectively.After the master stratum collapses,main roof subsidence approaches its maximum value.The final span of the key stratum determines the moment and cycling of gob-side entry retaining disturbances.Main roof subsidence influences the load on the filling wall.The sequential roof collapse of overlying strata results in fluctuations in the gob-side entry retaining deformation.Calculation formulae for the final span of the key stratum and the filling wall load are obtained via theoretical analysis.A control method for the stability of the gob-side entry retaining’s surrounding rock is proposed,which includes 3 measures:a“dual-layer”proactive anchorage support,roadside filling with dynamic strength matching and auxiliary support during disturbance.Finally,the gob-side entry retaining of the Xiaoqing mine E1403 working face is presented as an engineering case capable of verifying the validity of the research conclusions. 展开更多
关键词 sequential roof collapse gob-side entry retaining superposed disturbance key stratum stability control
下载PDF
Early filiform needle acupuncture for poststroke depression: a meta-analysis of 17 randomized controlled clinical trials 被引量:12
10
作者 Jiping Zhang Jing Chen +4 位作者 Junqi Chen Xiaohui Li Xueyan Lai Shaoqun Zhang Shengxu Wang 《Neural Regeneration Research》 SCIE CAS CSCD 2014年第7期773-784,共12页
OBJECTIVE: To evaluate the effectiveness and safety of filiform needle acupuncture for poststroke depression, and to compare acupuncture with the therapeutic efficacy of antidepressant drugs. DATA RETRIEVAL: We retr... OBJECTIVE: To evaluate the effectiveness and safety of filiform needle acupuncture for poststroke depression, and to compare acupuncture with the therapeutic efficacy of antidepressant drugs. DATA RETRIEVAL: We retrieved data from the Chinese National Knowledge Infrastructure (1979-2012), Wanfang (1980-2012), VIP (1989-2012), Chinese Biomedical Literature (1975- 2012), PubMed (1966-2012), Ovid Lww (-2012), and Cochrane Library (-2012) Database using the internet. SELECTION CRITERIA: Randomized controlled trials on filiform needle acupuncture versus antidepressant drugs for treatment of poststroke depression were included. Moreover, the in- cluded articles scored at least 4 points on the Jadad scale. Exclusion criteria: other acupuncture therapies as treatment group, not stroke-induced depression patients, score 〈 4 points, non-ran- domized controlled trials, or animal trials. MAIN OUTCOME MEASURES: These were the Hamilton Depression Scale scores, clinical ef- fective rate, Self-Rating Depression Scale scores, Side Effect Rating Scale scores, and incidence of adverse reaction and events. RESULTS: A total of 17 randomized controlled clinical trials were included. Meta-analysis results displayed that after 4 weeks of treatment, clinical effective rate was better in patients treated with fill- form needle acupuncture than those treated with simple antidepressant drugs [relative risk = 1.11, 95% confidence interval (C/): 1.03-1.21, P = 0.01]. At 6 weeks, clinical effective rate was similar between filiform needle acupuncture and antidepressant drug groups. At 2 weeks after filiform needle acupuncture, Hamilton Depression Scale (17 items) scores were lower than in the antide- pressant drug group (mean difference = -2.34, 95%CI: -3.46 to -1.22, P 〈 0.000,1). At 4 weeks, Hamilton Depression Scale (24 items) scores were similar between filiform needle acupuncture and antidepressant drug groups. Self-Rating Depression Scale scores were lower in filiform needle acupuncture group than in the antidepressant drug group. Side Effect Rating Scale was used in only two articles, and no meta-analysis was conducted. Safety evaluation of the 17 arti- cles showed that gastrointestinal tract reactions such as nausea and vomiting were very common in the antidepressant drug group. Incidence of adverse reaction and events was very low in the filiform needle acupuncture group. CONCLUSION: Early filiform needle acupuncture for poststroke depression can perfectly con- trol depression. Filiform needle acupuncture is safe and reliable. Therapeutic effects of filiform needle acupuncture were better than those of antidepressant drugs. 展开更多
关键词 nerve regeneration poststroke depression filiform needle acupuncture antidepressantdrugs randomized controlled trials clinical effective rate SAFETY META-ANALYSIS the GuangdongProvincial "211 Engineering" Stage-III key Disciplines Construction Project neural regeneration
下载PDF
Key technologies for medium and low voltage DC distribution system 被引量:6
11
作者 Yiwen Fan Yongning Chi +4 位作者 Yan Li Zhibing Wang Hongzhi Liu Wei Liu Xiangyu Li 《Global Energy Interconnection》 CAS CSCD 2021年第1期91-103,共13页
Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operati... Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system. 展开更多
关键词 Medium and low voltage DC distribution system System topology key equipment DC fault protection Operation control technology
下载PDF
A Model of Hierarchical Key Assignment Scheme 被引量:1
12
作者 ZHANG Zhigang ZHAO Jing XU Maozhi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1597-1600,共4页
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme w... A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property. 展开更多
关键词 user hierarchy access control key assignment CRYPTOGRAPHY multilevel data security
下载PDF
Controlled Remote State Preparation 被引量:1
13
作者 WANG Zhang-Yin LIU Yi-Min +1 位作者 ZUO Xue-Qin ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第8期235-240,共6页
We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can... We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can berestored by the receiver with probability 1/2 if all the agents collaborate.However,for certain type of original states therestoration probability is unit. 展开更多
关键词 controlled remote state preparation quantum key distribution single-qubit von Neumann orthogonal measurement controlled-NOT gate
下载PDF
A NEW ANONYMITY CONTROLLED E-CASH SCHEME 被引量:1
14
作者 Zhang Fangguo Wang Changjie Wang Yumin (Key Lab. on ISN, Xidian Univ., Xi’an, 710071) 《Journal of Electronics(China)》 2002年第4期369-374,共6页
E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ... E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented. 展开更多
关键词 E-CASH Anonymity control One-time key pairs digital signature ECC
下载PDF
Key technologies and practice for gas field storage facility construction of complex geological conditions in China 被引量:5
15
作者 MA Xinhua ZHENG Dewen +3 位作者 SHEN Ruichen WANG Chunyan LUO Jinheng SUN Junchang 《Petroleum Exploration and Development》 2018年第3期507-520,共14页
In view of complex geological characteristics and alternating loading conditions associated with cyclic large amount of gas injection and withdrawal in underground gas storage(UGS) of China, a series of key gas storag... In view of complex geological characteristics and alternating loading conditions associated with cyclic large amount of gas injection and withdrawal in underground gas storage(UGS) of China, a series of key gas storage construction technologies were established, mainly including UGS site selection and evaluation, key index design, well drilling and completion, surface engineering and operational risk warning and assessment, etc. The effect of field application was discussed and summarized. Firstly, trap dynamic sealing capacity evaluation technology for conversion of UGS from the fault depleted or partially depleted gas reservoirs. A key index design method mainly based on the effective gas storage capacity design for water flooded heterogeneous gas reservoirs was proposed. To effectively guide the engineering construction of UGS, the safe well drilling, high quality cementing and high pressure and large flow surface injection and production engineering optimization suitable for long-term alternate loading condition and ultra-deep and ultra-low temperature formation were developed. The core surface equipment like high pressure gas injection compressor can be manufactured by our own. Last, the full-system operational risk warning and assessment technology for UGS was set up. The above 5 key technologies have been utilized in site selection, development scheme design, engineering construction and annual operations of 6 UGS groups, e.g. the Hutubi UGS in Xinjiang. To date, designed main indexes are highly consistent with actural performance, the 6 UGS groups have the load capacity of over 7.5 billion cubic meters of working gas volume and all the storage facilities have been running efficiently and safely. 展开更多
关键词 gas field STORAGE trap dynamic SEALING capacity key index design effective STORAGE volume drilling and COMPLETION in ultra-deep and ultra-low pressure formation ALTERNATING load surface engineering core equipment risk assessment and control
下载PDF
Characteristics of mining gas channel expansion in the remote overlying strata and its control of gas flow 被引量:1
16
作者 Liu Hongyong Cheng Yuanping +2 位作者 Chen Haidong Mou Junhui Kong Shengli 《International Journal of Mining Science and Technology》 SCIE EI 2013年第4期480-486,共7页
The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in ... The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction. 展开更多
关键词 Remote mining overlying strata Gas channel expansion Gas flow control action key strata
下载PDF
Thoughts on Energy Solutions to Alleviation of Air Pollution during the Heating Period in Key Areas
17
作者 Zhao Wei Hu Zhengxin Wang Sheng 《Meteorological and Environmental Research》 CAS 2019年第4期7-10,共4页
Since the implementation of the Action Plan for Air Pollution Prevention and Control , all regions of China have steadily promoted the prevention and control of air pollution and achieved results continuously. However... Since the implementation of the Action Plan for Air Pollution Prevention and Control , all regions of China have steadily promoted the prevention and control of air pollution and achieved results continuously. However, the atmospheric environment in key areas such as Beijing-Tianjin-Hebei region, the Yangtze River Delta region, and Fenwei Plain is still severe, and especially during the heating period heavy pollution occurs frequently, which has become the focus and difficulty of improving the quality of the atmospheric environment and is also the weakest link of China s air pollution control at present. How to alleviate air pollution, how to win the battle of pollution prevention and control, how to hold the fruits of the blue sky defense war, energy consumption is key. 展开更多
关键词 Alleviation key areas key cities Heating period Prevention and control of air pollution Blue SKY DEFENSE ENERGY solution
下载PDF
A New Storage Strategy for Hypertext Based Version Control
18
作者 王岩 郭福顺 +1 位作者 李莲治 魏玲 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第3期14-19,共6页
Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strate... Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strategy to define some key nodes within the version derivation graph is presented and some implementation details are described. At last, the performance of different strategies are compared with each other. 展开更多
关键词 ss: HYPERTEXT VERSION control VERSION NODE key NODE VERSION DERIVATION GRAPH
下载PDF
Robust Dissipative Control for Nonlinear System with Sector Input
19
作者 LuoQi DengFei-qi BaoJun-dong 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期347-350,共4页
Based on the quadratic supply rate, the problem of robust dissipative control for a class of uncertain nonlinear system with sector nonlinear input is discussed. The uncertainty is described by bounded norm. It is sho... Based on the quadratic supply rate, the problem of robust dissipative control for a class of uncertain nonlinear system with sector nonlinear input is discussed. The uncertainty is described by bounded norm. It is shown that the robust dissipative control problem can be resolved for all admissible uncertainty, if there exists a storage function such that Hamilton Jacobi inequality holds. When the uncertainties of the system satisfy the matching condition, and input function within the boundedness of the sector, the closed loop system will be stronger dissipativeness, and the controller which we obtained in the paper is more flexible, because it contains an adjustable parameter for some certain range. 展开更多
关键词 key words nonlinear system sector nonlinear input robust dissipative control
下载PDF
The Study of Secure Congestion Control for TCP in Ad Hoc Networks
20
作者 Weinan Zhang Li Lin Li Du 《Journal of Information Security》 2018年第1期25-32,共8页
Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic cong... Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic congestion control method of the selection of a secure path. By estimating the average queue length at the nodes, the congestion level at present is detected. If the occurrence of the possible congestion is predicted, the network will select a new path where all nodes have been certified as trusted nodes, generating session keys in the TCP three-way handshake to prevent the denial of service attacks. Simulation results show that the new algorithm is superior to TCP Reno algorithm in terms of security, packets loss rate, throughput, and end-to-end delay. 展开更多
关键词 CONGESTION control AVERAGE QUEUE Length Security SESSION keyS
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部