首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
DAI Wei 《保鲜与加工》2006,(5):120-123
With the rapid development of wireless network and mobile computing,the security of network becomes more important.As one of wireless mobile network,mobile Ad hoc network has new vulnerabilities that do not exist in a fixed wired network,and is susceptible to attacks.This paper introduces some methods which used in intrusion detection system and provides a new model of system based on multi-layer integrated distributed technology,especially recommend the protocol analyzing method in this system.  相似文献   

2.
小麦种质资源抗旱性鉴定评价   总被引:9,自引:0,他引:9  
培育抗旱节水小麦品种是保障我国粮食安全的重要途径之一, 优异抗旱种质资源筛选及抗旱性评价方法的研究对于提高抗旱育种效率具有关键作用。本研究采用反复干旱法和田间直接鉴定法分别鉴定323份小麦种质苗期和成株期的抗旱性。结果表明, 随着干旱次数的增加幼苗存活率逐渐下降, 而其变异系数和广义遗传力增加。成株期单株产量抗旱系数与综合抗旱性度量值D显著正相关(R 2 = 0.609), 采用综合抗旱性度量值D有利于区分干旱对不同种质产量的影响力。苗期反复干旱存活率(DS)与单株产量的抗旱系数及综合抗旱性度量值D均无显著相关。基于反复干旱存活率筛选得到28份苗期强抗旱种质, 基于单株产量抗旱系数和综合抗旱性度量值D分别得到25和30份成株期强抗旱种质, 其中, 9份种质用2种评价方法均表现强抗旱; 21份种质在苗期和成株期均表现抗旱或强抗旱。本研究为小麦抗旱性评价方法及抗旱亲本的合理选择提供理论指导和信息支撑。  相似文献   

3.
As the important method and instrument of agile manufacture,the technology of distributed collaborative design and manufacturing has become the hotspot of manufacturing. The basic concept and key technologies of IP_VPN are introduced in this paper,and a collaborative design network model based on IP_VPN is presented. Distributed collaborative design is a multi_user,multitask involved system, which is consisted of lots of collaborative processs,so the network security is the key of distributed collaborative design. We research on the security of collaborative design network based on IP_VPN, hence get a conclusion:we can construct an economical?practical and secure collaborative design network system by the application of data encryption,user authentication and access control based on the role,etc.  相似文献   

4.
With the development of network technology distributed computing has become more and more prevalent. Only that kind of distributed platforms which have the attributes of platform independence, dynamic, robustness, security and convenience are what users need. This article mainly discusses a distributed computing platform based on Java Technology--Jini, introduces its advantages compared to traditional distributed systems.Its basic principles and key concepts, system structures, programming patterns and protocols, the services it provides and service procedures are also proposed. In the end a introduction of its application on digital home net is given.  相似文献   

5.
The security issues in mobile Ad hoc network, especially caused by inner malicious nodes are analyzed. By tracking the behavior of nodes, trust level of each node can be evaluated and managed; then actions of malicious nodes will be constrained and the security and reliability of entire network are enhanced. According to the features of Ad hoc. The scheme proposed in not only extends the conception of trust but also include the trust computation model and trust management mechanism. Simulation experiments show the novel scheme is more efficient than other trust schemes in traditional protocols.  相似文献   

6.
Software encryption cannot satisfy real time requirements for multimedia applications which usually involve large volumes of data. To address this problem, an field programmable gate array(FPGA) implementation of the Cyclone EP1C6 for a Kolmogorov chaotic map based image encryption algorithm MASK was proposed. The algorithm was composed of four basic parts: Mixture, key Add, S box and Kolmogorov chaotic map transforms. These parts specifically act on the image as follows: diffusion, applying secret keys, nonlinearity, and permutation. The correlation of adjacent pixels, UACI and the key space of the system subsequently were studied. The source occupation proportion of the hardware was calculated statistically and showed low occupation. Among the advantages of the proposed system are high security, fast encryption speed, and low hardware resources consumption. The proposed system is suitable for implementation in inexpensive FPGA.  相似文献   

7.
This paper provides a synthesis of the 1983–98 published literature on the empirical evidence regarding the interaction between government policies and growth. Five policy areas are considered: general government consumption, tax rates, education expenditures, defense and public infrastructure. The most conclusive results in the literature relate to the positive impact of education expenditures on growth. Public infrastructure also appears important. Regression analysis remains the most commonly adopted research methodology. A better link with current theories will be obtained when parameter calibration methods formicro‐foundations based models replace parameter estimation of regression models with ad hoc specifications. Nonetheless, there remain severe limitations on what can be learned for policy from highly aggregative models of endogenous growth. Better data are needed at the regional macro and meso levels to complement thecurrently available pooled cross‐section time‐series country data. The potential endogeneity of government fiscal variables can be resolved through the selection of appropriate instrumental variables, such as those that arise in cases of “natural experiments”.  相似文献   

8.
IEEE802.11b LAN use wireless media to transmit information. Since the wireless media is more complex than wired media, the MAC layer access controling mechanism of IEEE802.11b is more complex. The thesis describes the MAC layer access controling mechanism of IEEE802.11b--CSMA/CA(carrier sense multiple access/collision avoid) and two implementation modes,which are DCF(distributed coordination function) controling mode and PCF(point coordination function) controling mode. At the same time, the thesis simply introduces the error controling problem.  相似文献   

9.
大数据与安全可视化   总被引:1,自引:0,他引:1  
IT技术的飞速发展开启了大数据时代。海量的数据信息带来更多的数据价值的同时,各类安全问题也随之而来。通过数据可视化技术能够帮助充分全面并且及时地找出系统中可能存在的安全威胁,评估系统安全,保证基础设施的安全。研究从数据角度出发,结合大数据的特征对安全数据进行分类,并对当前已存在的针对不同安全数据进行可视化的工具及技术进行总结,使得能够将已成熟的数据安全可视化技术用于大数据安全的研究,最后对未来的发展趋势进行了展望。  相似文献   

10.
以渤海大学食品科学与工程学院科研实验室管理经验为依据,分别从实验室安全管理制度、安全教育及基础设施保障等方面进行详细阐述,并重点突出研究生在科研实验室管理中的作用,旨在为建设一个安全、和谐、绿色的实验环境提供安全保障,从而更好地为地方高校科研和学科建设服务。  相似文献   

11.
Encryption is an important method which is used to protect the information of an individual and enterprises and the secret of nations. Rijndael algorithm is the new advanced encryption standard, and has extensive application foreground because of its much merit. Modem encryption algorithms are based on keys. However, so far few of people research into the key schedule of rijndael algorithm and especially do research on the generation of its initial keys. This paper researches into the mapping of Logistic, makes use of a chaos algorithm to produce initial encryption keys because it can create chaos sequences of high randomicity. Further more, corresponding CPLD implementation is given.  相似文献   

12.
四川省粮食安全状况研究   总被引:1,自引:0,他引:1  
为了掌握四川省粮食数量安全状况,为政府决策粮食数量安全提供科学依据。利用1978—2012年的统计数据,结合最小人均耕地面积(Smin)和耕地压力指数(K),分析了四川省和21个市(州)耕地面积和粮食数量安全变化态势。结果表明:1978—2012年,四川省Smin呈下降趋势,但依赖于粮食单产增加,复种指数提高,以及耕地供给小幅增加,使得K并未呈现出明显上升趋势,粮食数量处于可控的安全态势,实现了“总量平衡,基本自给”的政策要求。在21个市(州)中,成都市、攀枝花、乐山市、雅安市、阿坝州、甘孜州的粮食数量安全存在较大压力,需通过动用库存或外调粮食以平衡市场供需。随着时间的推移,在城镇化深入发展和工业化转型升级的压力下,成都市、攀枝花市的粮食数量安全将越加突出。在严格保护耕地数量的基础上,提高资源的利用率;加大基础设施建设;加快突破性新品种、新技术推广应用;科学防灾减灾;针对市域差异,实施有差异化政策。  相似文献   

13.
This paper presents an approach to studing the economic dispatch of real power with N-1 security with the network flow programming (NFP), the N-1 line - security constraints are first introduced into the network f olw model and the problem of N-1 security economic dispatch becomes an incremental metwork flow model. Therefore, the shortage of NFP is mitigated to some extent, The solution adopted is the "out-of-kilter"algorithm(OKA), which is characterized by fast calculation and reliable convergency. The model and solution are tested on IEEE 30-bus system, and the results show that the proposed approach is feasible.  相似文献   

14.
1988年、199O年我们在内蒙古自治区的四个旗县进行了油菜籽上菜蛾Plutellaxylostella(Linne)分布型调查.后采用Iσ、m/m、C、C_A、Taylor方法、Iwao方法进行分析,并对不同取样方法的精确度进行了比较.其结果是:菜蛾的卵、幼虫、蛹在油菜上均为聚集分布,其基本成份为个体群,基本成份的分布是聚集的,且有密度依赖性.不同取样方法中应采用单对角线20点取样,每点0.1111m~2(1尺~2),经正态独立性检验,其资料代换公式为log(x+k/2).  相似文献   

15.
A Prüfer-coded genetic algorithm based on the decimal number of nodes is proposed and it is used to solve collaborative optimization planning of access solution of distributed generation(DG)and structure of distribution network.Using graph theory to generate theoretically feasible topology structureand the access nodes and the installed capacity of distributed generation are coded by the Prüfer number.The coding method makes the distribution network operation structure and the access solution of DG combine into the evolution problem of the same chromosomal gene.The length of the chromosome coding of this method is shorter than binary encoding.This solution takes full advantage of the Prüfer-coded to improve computational efficiency and convergence rateand makes some restrictions and improvements in some key parts of the algorithm to solve the problem illegal solution.Finallyfeasibility and superiority of the algorithm is validated by a case study.  相似文献   

16.
A mixture of two yeast antagonists, Metschnikowia pulcherrima and Cryptococcus laurentii, originally isolated from apples and exhibiting greater biocontrol activity against blue mold of apple than either yeast applied alone, were used in combination with sodium bicarbonate (SBC) in a pilot test in which treated fruit were stored under commercial controlled atmosphere (CA) storage conditions. Conidia of Penicillium expansum, antagonists cells and SBC were added to the drench solution. The treatments were applied to apples by drenching entire bins filled with apples containing 100 wounded fruit evenly distributed among five positions in each bin. The treated fruit were stored in commercial CA storages for approximately six months in the 2005–2006 and 2006–2007 storage seasons and then evaluated for incidence of decay. In both years, the treatments with the antagonist alone or in combination with SBC were equally effective and reduced blue mold incidence by 84–97% in 2005–2006 and 73–82% in 2006–2007. SBC alone significantly reduced blue mold incidence compared to the non-treated control but was less effective than the antagonist alone or in combination with SBC. This pilot test showed that the combination of these two antagonists and SBC can be an effective decay control method under commercial CA conditions, confirming results from our earlier laboratory studies using similarly treated fruit stored under CA conditions.  相似文献   

17.
Microsatellite or simple sequence repeat (SSR) markers are important tools for genetic analyses, especially those targeting diversity. The primary objective of this study was to develop robust oat‐based microsatellite markers from newly enriched genomic libraries to expand on a relatively small existing oat SSR toolbox. Microsatellite motifs characterized by (CA/GT), (AAT/TTA), (ATG/TAC) and (CATC/GTAG) repeats were targeted for enrichment. Preliminary screening showed that 90% of clones from the (CA/GT) and 79% of the clones from the (ATG/TAC) libraries contained repeats, while < 11% of the clones from (AAT/TTA) and (CATC/GTAG) libraries contained repeats. Subsequent sequencing of 1536 clones from the (CA/GT) and (ATG/TAC) libraries resulted in 539 and 578 SSRs for which primers were designed, respectively. A total of 246 SSRs were polymorphic across 11 oat lines. One hundred and twenty‐five of the markers produced highly reproducible assays that interrogated 369 alleles at 193 loci. Of these, 79 robust assays interrogated 146 codominant alleles. These markers will be useful for a wide range of genetic analyses in oat including assessment of diversity and marker‐assisted breeding.  相似文献   

18.
区块链技术及其在农产品质量安全追溯应用的研究进展   总被引:1,自引:1,他引:0  
农产品质量安全是一个备受关注的公共卫生问题,追溯应用已成为保障农产品质量安全的有效手段。确保溯源数据的真实性和安全性,成为追溯应用研究的重点和亟需解决的问题。区块链是一个综合多种技术并确保完全去中心化点对点系统完备性的完整技术方案,具有去中心化、透明化、去信任和数据不可篡改等优点,不受传统中心式技术的制约,在农产品质量安全追溯应用上有很大的发展空间。文章概述了区块链技术的基础架构、关键技术及其在追溯应用上的特点,以及区块链技术和农产品质量追溯的内在关系;通过分析基于公有链、联盟链和改良模式的农产品质量安全追溯研究进展和技术特点,总结了区块链技术在农产品质量安全追溯研究中存在的问题,结合区块链发展趋势,提出了注重横向技术融合、加强监测数据信息上链、建立农产品追溯激励惩罚机制等研究展望。  相似文献   

19.
The general framework and security demands of digital enterprises are analyzed. The information security system is constructed, which includes physical security, network security, support layer system security, application layer system security, data and documents security. Aiming at the security of internal information security such as data and documents, a comprehensive solution including identity authentication, centralized equipments control, document security management, document encryption, and security audit are put forward. Based on the above information security system, an implementation scheme for typical digital enterprise is proposed.  相似文献   

20.
State security is a key concern for countries when dealing with transboundary river governance issues. While there is a considerable amount of literature on transboundary river cooperation in general, there has been little on transboundary cooperation and the damming of shared rivers in terms of their impacts on state security. As a result, this article seeks to answer the following questions in relation to the lower Mekong basin: (i) How is the damming process embedded in transboundary cooperation? (ii) How does this type of cooperation contribute to peace and security in the study area – the 3S river basin? And, (iii) how can transboundary cooperation be improved so as to address state security issues? To answer these questions, this study reviews the relevant literature and uses two case studies, one of the Yali Dam in Vietnam and the second of the Lower Sesan 2 Dam in Cambodia. In doing so, the article examines dam developments in the lower Mekong basin, their environmental and human security impacts, and how they contribute to or threaten state security in Cambodia. It concludes that dams on international rivers induce insecurity among states downstream and that cooperation between riparian states is key to addressing this insecurity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号