期刊文献+
共找到3,248篇文章
< 1 2 163 >
每页显示 20 50 100
Countermeasures for Establishing a Long-term Security Mechanism for Landless Farmers
1
作者 Jiefang ZHU 《Asian Agricultural Research》 2020年第1期25-27,31,共4页
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ... In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development. 展开更多
关键词 Landless FARMERS long-term security mechanism COUNTERMEASURES
下载PDF
Exploring the Long-Term Mechanism of the Construction of College Teachers’Ethics in the New Era Under the Concept of“Sanquan Education”
2
作者 Jing Zuo Xiaoyue Liu 《Journal of Contemporary Educational Research》 2024年第1期140-146,共7页
This paper takes the long-term mechanism exploration of the construction of teachers’ethics in the new era under the concept of“Sanquan education,”aiming to explore how to establish a long-term mechanism of the con... This paper takes the long-term mechanism exploration of the construction of teachers’ethics in the new era under the concept of“Sanquan education,”aiming to explore how to establish a long-term mechanism of the construction to meet the needs of college education development under the background of the new era.A series of targeted measures and suggestions are put forward,including improving the system and mechanism,strengthening the education and training of teachers’ethics,and establishing the evaluation and assessment mechanism.The implementation of these measures can promote the formation of the long-term mechanism of the construction of teachers’ethics in colleges and universities,improve teachers’ethics and behavior quality,and provide strong support for the development of education in colleges and universities. 展开更多
关键词 Sanquan education ETHICS College education long-term mechanism Teacher quality
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
3
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
4
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
5
作者 Jian Shang Runmin Guan Wei Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2609-2626,共18页
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ... The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks. 展开更多
关键词 MICROGRID data security storage node trust degree directed acyclic graph data structure consensus mechanism secure multi-party computing blockchain
下载PDF
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing 被引量:5
6
作者 ZHOU Zheng ZHANG Jun +1 位作者 LI Jian LIU Yi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1437-1440,共4页
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att... Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed. 展开更多
关键词 trusted computing security domain mechanism attack immunity venture limitation
下载PDF
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 被引量:3
7
作者 Ming Wan Jiawei Li +2 位作者 Ying Liu Jianming Zhao Jiushuang Wang 《China Communications》 SCIE CSCD 2021年第1期130-150,共21页
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ... Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a significant topic because current networked control systems are supporting various critical infrastructures to offer vital utility services.By comparing with traditional IT systems,this paper first analyzes the uncontrollable cyber threats and classified attack characteristics,and elaborates the intrinsic vulnerabilities in current networked control systems and novel security challenges in future Industrial Internet.After that,in order to overcome partial vulnerabilities,this paper presents a few representative security mechanisms which have been successfully applied in today’s industrial control systems,and these mechanisms originally improve traditional IT defense technologies from the perspective of industrial availability.Finally,several popular security viewpoints,adequately covering the needs of industrial network structures and service characteristics,are proposed to combine with burgeoning industrial information technologies.We target to provide some helpful security guidelines for both academia and industry,and hope that our insights can further promote in-depth development of industrial cyber security. 展开更多
关键词 industrial cyber threats industrial characteristics VULNERABILITIES security mechanisms and viewpoints
下载PDF
Foreign Grain Security Mechanisms and Implications for China 被引量:1
8
作者 Shuhua CAO Lei NIE Weipeng MA 《Asian Agricultural Research》 2014年第3期1-5,10,共6页
With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grai... With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security. 展开更多
关键词 GRAIN security FOREIGN COUNTRIES China mechanism F
下载PDF
Establish the Long-effective Mechanism of Food Security in China 被引量:1
9
作者 Wang Yapeng Fang Lingli 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第1期25-35,共11页
In despite of fluctuation in recent years, the grain yield in China has been increasing, which relieves the conflict between supply and demand and turns the situation of food security good. However, because of the rap... In despite of fluctuation in recent years, the grain yield in China has been increasing, which relieves the conflict between supply and demand and turns the situation of food security good. However, because of the rapid increase in food consumption, the conflicts of food quality and structure in the supply and demand equilibrium has become more and more obvious and the long-effective mechanism of food security has not been estab-lished yet. It is found that the factors affecting food security in China include the scarcity and dissipation of resources, farmers’ low enthusiasm in planting grain crops and the inappropriateness of the emphasis and measures of macro-economic regulation and control. Therefore, the authors advance to optimize resources allocation, strengthen macro-economic regulation and control and policy stimulation and establish the mechanism of allocating grain production cost, to set up the long-effective mechanism of China food security and keep it stable in the long term. 展开更多
关键词 中国 食品安全 长效机制 资源配置 政策
下载PDF
Coordination Mechanism of the Legal Protection of Resource Security with Its Relative Laws
10
作者 Chen Demin Wang Huabing 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第3期21-26,共6页
The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordin... The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility. 展开更多
关键词 协调机制 法律解释 资源安全 环境管理
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
11
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
关键词 网络安全 安全问题 服务架构 接入机制 网络平台 计算环境 健康状况 突发事件
下载PDF
A Research on Improvement of Hadoop Security Mechanism
12
《International English Education Research》 2013年第12期90-92,共3页
关键词 英语教学 教学方法 阅读教学 课外阅读 英语语法
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
13
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 无线传感器网络 安全机制 计算模型 操作费用 预测 无线传感网络 加密算法 相对误差
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
14
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
关键词 管理机制 公安院校 教师 心理 人际关系 稳定性
下载PDF
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET
15
作者 S.Neelavathy Pari K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols 被引量:1
16
作者 Jianzhong Zhao 《Journal of Quantum Information Science》 CAS 2022年第3期53-63,共11页
Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol was followed by the QKD protocols publis... Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol was followed by the QKD protocols published by Ekert (1991) (E91) and Bennett (1992) (B92). Some authors proved security of the theoretical QKD protocols in different theoretical frameworks by defining security of QKD protocols differently. My argument is that the previous proofs of security are neither unique nor exhaustive for each theoretical QKD protocol, which means that proof of security of the theoretical QKD protocols has not been completed or achieved. The non-uniqueness and the non-exhaustiveness of the proofs will lead to more proofs. However, a coming “proof” of security of the theoretical QKD protocols is possible to be a disproof. The research by quantum mechanics in this paper disproves security of the theoretical QKD protocols, by establishing the theoretical framework of quantum mechanical proof, defining security of QKD protocols, establishing the quantum state of the final key of the theoretical protocols from their information leakages, and applying Grover’s fast quantum mechanical algorithm for database search to the quantum state of the final key to result in the Insecurity Theorem. This result is opposite to those of the previous proofs where the theoretical QKD protocols were secure. It is impossible for Alice and Bob to protect their communications from information leakage by stopping or canceling the protocols. The theoretical QKD keys are conventional and basically insecure. Disproof of security of the theoretical QKD protocols is logical. 展开更多
关键词 Quantum mechanics Quantum Cryptography Quantum Computation security PROOF
下载PDF
Code mechanical solidification and verification in MEMS security devices
17
作者 张卫平 陈文元 +2 位作者 赵小林 李胜勇 姜勇 《Journal of Shanghai University(English Edition)》 CAS 2006年第4期334-338,共5页
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c... The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective. 展开更多
关键词 MEMS (micro-electromechanical systems) security device code mechanical solidification and verification virtual machine of code mechanism (VMCM) ternary system.
下载PDF
Study on the Establishment of a Long-effect Mechanism for China's Securities Investor Education
18
作者 Yunlei HUO 《International English Education Research》 2014年第9期97-99,共3页
关键词 教育体系 证券市场 投资者 中国 机制 资本市场 制度建设 组成部分
下载PDF
A Security Kernel Architecture Based Trusted Computing Platform 被引量:2
19
作者 CHENYou-lei SHENChang-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期1-4,共4页
A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is adde... A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is added to the operation system kerneland twooperation interface modes are provided for the sake of self-protection. The security kernel isdivided into two parts and trusted mechanism Is separated from security functionality. Ihe TCBmodule implements the trusted mechanism such as measurement and attestation, while the othercomponents of security kernel provide security functionality based on these mechanisms. Thisarchitecture takes full advantage of functions provided by trusted platform and clearly defines thesecurity perimeter of TCB so as to assure stlf-securily from architcetmal vision. We also presentfunction description of TCB and discuss the strengths and limitations comparing with other relatedresearches. 展开更多
关键词 trusted computing TCB module security kernel trusted mechanism
下载PDF
Evolution of Microstructure and Mechanical Property during Long-Term Aging in Udimet 720Li 被引量:6
20
作者 Lanzhang ZHOU and Valentino LUPINC CNR-TeMPE, Via R. Cozzi 53, 20125 Milano, Italy Jianting GUO Institute of Metal Research, CAS, 72 Wenhua Road, Shenyang 110016, China 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2001年第6期633-637,共5页
Thermal stabilities of microstructure and mechanical property have been investigated on super- alloy U72OLi, which is of great interest of application for jet engine and land-based turbine disc. The results showed tha... Thermal stabilities of microstructure and mechanical property have been investigated on super- alloy U72OLi, which is of great interest of application for jet engine and land-based turbine disc. The results showed that, the primary and secondary γ’?particles maintain good thermal stability at 650 and 7000C with aging time up to 3000 h, while the tertiary γ’?is apparently dependent on aging temperature and time. The tertiary γ’?particles undergo a procedure of coarsening, dissolution and eventually complete disappearance with the increasing of aging time and temper- ature. They exhibit unusual high sensibility upon aging temperature, which is attributed to the lattice misfit between the γ’?precipitates and the matrix in the alloy. The grain boundary phase M23C6 remains stable without forming of sigma phase even with aging time up to 3000 h at 700℃. Microhardness decreases apparently with increasing aging time and aging temperature. Theoretical analysis based on dislocation mechanism indicates that the change of microhardness should be attributed to the evolution of the tertiary γ’?during aging. 展开更多
关键词 Evolution of Microstructure and mechanical Property during long-term Aging in Udimet 720Li LONG
下载PDF
上一页 1 2 163 下一页 到第
使用帮助 返回顶部