期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Research on key control technologies of all-position automatic welding machine 被引量:1
1
作者 曾惠林 杜则裕 +1 位作者 马静 黄福祥 《China Welding》 EI CAS 2009年第3期69-73,共5页
The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline cons... The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects. 展开更多
关键词 key control technology ALL-POSITION automatic welding machine welding parameters
下载PDF
Strengthening Control of Key Pollution Sources
2
作者 He Furong(Shengli Petroleum Administration) 《China Oil & Gas》 CAS 1998年第3期192-193,共2页
关键词 Strengthening control of key Pollution Sources
下载PDF
Characteristics of mining gas channel expansion in the remote overlying strata and its control of gas flow 被引量:1
3
作者 Liu Hongyong Cheng Yuanping +2 位作者 Chen Haidong Mou Junhui Kong Shengli 《International Journal of Mining Science and Technology》 SCIE EI 2013年第4期480-486,共7页
The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in ... The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction. 展开更多
关键词 Remote mining overlying strata Gas channel expansion Gas flow control action key strata
下载PDF
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey 被引量:1
4
作者 Li Duan Yangyang Sun +3 位作者 Wei Ni Weiping Ding Jiqiang Liu Wei Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第8期1647-1667,共21页
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc... The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward. 展开更多
关键词 Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay
下载PDF
New controlled quantum key agreement protocols based on Bell states 被引量:1
5
作者 He Yefeng Yue Yuru +3 位作者 Li Guoqing Liu Jixiang Di Man Pang Yibo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第4期42-50,共9页
The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols a... The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit. 展开更多
关键词 quantum cryptography quantum key agreement controlled quantum key agreement Bell states controlLER
原文传递
Receptor-like protein kinases:Key regulators controlling root hair development in Arabidopsis thaliana 被引量:5
6
作者 Zhuoyun Wei Jia Li 《Journal of Integrative Plant Biology》 SCIE CAS CSCD 2018年第9期841-850,共10页
Root hairs are tubular outgrowths specifically differentiated from epidermal cells in a differentiation zone. The formation of root hairs greatly increases the surface area of a root and maximizes its ability to absor... Root hairs are tubular outgrowths specifically differentiated from epidermal cells in a differentiation zone. The formation of root hairs greatly increases the surface area of a root and maximizes its ability to absorb water and inorganic nutrients essential for plant growth and development. Root hair development is strictly regulated by intracellular and intercellular signal communications. Cell surface-localized receptor-like protein kinases (P, LKs) have been shown to be important components in these cellular processes, tn this review, the functions of a number of key P, LKs in regulating Arabidopsis root hair development are discussed, especially those involved in root epidermal cell fate determination and root hair tip growth. 展开更多
关键词 Receptor-like protein kinases:key regulators controlling root hair development in Arabidopsis thaliana
原文传递
RED-DTB: A Dual Token Bucket Based Queue Management Algorithm
7
作者 YinJian-hua CaoYang +1 位作者 LingJun HuangTian-xi 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期388-392,共5页
Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely R... Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows. 展开更多
关键词 key words congestion control active queue management Dual Token Bucket fair bandwidth allocation network simulation
下载PDF
Statistical key variable analysis and model-based control for improvement performance in a deep reactive ion etching process
8
作者 陈山 潘天红 +1 位作者 李正明 郑西显 《Journal of Semiconductors》 EI CAS CSCD 2012年第6期118-124,共7页
This paper proposes to develop a data-driven via's depth estimator of the deep reactive ion etching process based on statistical identification of key variables.Several feature extraction algorithms are presented to ... This paper proposes to develop a data-driven via's depth estimator of the deep reactive ion etching process based on statistical identification of key variables.Several feature extraction algorithms are presented to reduce the high-dimensional data and effectively undertake the subsequent virtual metrology(VM) model building process.With the available on-line VM model,the model-based controller is hence readily applicable to improve the quality of a via's depth.Real operational data taken from a industrial manufacturing process are used to verify the effectiveness of the proposed method.The results demonstrate that the proposed method can decrease the MSE from 2.2×10^(-2) to 9×10^(-4) and has great potential in improving the existing DRIE process. 展开更多
关键词 deep reactive-ion etching virtual metrology through silicon via key variable analysis model-based control
原文传递
Unconformity structures controlling stratigraphic reservoirs in the north-west margin of Junggar basin, North-west China 被引量:14
9
作者 Kongyou WU Douglas PATON Ming ZHA 《Frontiers of Earth Science》 SCIE CAS CSCD 2013年第1期55-64,共10页
Tectonic movements formed several unconfor- mities in the north-west margin of the Junggar basin. Based on data of outcrop, core, and samples, the unconformity is a structural body whose formation associates with weat... Tectonic movements formed several unconfor- mities in the north-west margin of the Junggar basin. Based on data of outcrop, core, and samples, the unconformity is a structural body whose formation associates with weath- ering, leaching, and onlap. At the same time, the structural body may be divided into three layers, including upper layer, mid layer, and lower layer. The upper layer with good primary porosity serves as the hydrocarbon migration system, and also accumulates the hydrocarbon. The mid layer with compactness and ductility can play a role as cap rock, the strength of which increases with depth. The lower layer with good secondary porosity due to weathering and leaching can form the stratigraphic truncation traps. A typical stratigraphie reservoir lying in the unconformity between the Jurassic and Triassic in the north-west margin of the Junggar basin was meticulously analyzed in order to reveal the key controlling factors. The results showed that the hydrocarbon distribution in the stratigraphic onlap reservoirs was controlled by the onlap line, the hydro- carbon distribution in the stratigraphic truncation reser- voirs was confined by the truncation line, and the mid layer acted as the key sealing rock. So a conclusion was drawn that "two lines (onlap line and truncation line) and a body (unconformity structural body)" control the formation and distribution of stratigraphic reservoirs. 展开更多
关键词 unconformity structural body stratigraphicreservoir key controlling factors Jurassic bottom north-west margin of the Junggar basin
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部