首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   0篇
  国内免费   1篇
机械仪表   3篇
建筑科学   1篇
无线电   1篇
一般工业技术   5篇
冶金工业   2篇
自动化技术   11篇
  2021年   1篇
  2013年   1篇
  2012年   2篇
  2011年   1篇
  2008年   2篇
  2006年   2篇
  2005年   1篇
  2003年   1篇
  2001年   3篇
  1999年   1篇
  1994年   4篇
  1992年   2篇
  1989年   1篇
  1986年   1篇
排序方式: 共有23条查询结果,搜索用时 375 毫秒
11.
A Management Perspective on Risk of Security Threats to Information Systems   总被引:1,自引:0,他引:1  
Electronic commerce and the Internet have enabled businesses to reduce costs, attain greater market reach, and develop closer partner and customer relationships. However, using the Internet has led to new risks and concerns. This paper provides a management perspective on the issues confronting CIOs and IT managers: it outlines the current state of the art for security in e-commerce, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a scheme for probabilistic evaluation of the impact of security threats with some illustrative examples. This methodology may be used to assess the probability of success of attacks on information assets in organizations, and to evaluate the expected damages of these attacks. The paper also outlines some possible remedies, suggested controls and countermeasures. Finally, it proposes the development of cost models which quantify damages of these attacks and the effort of confronting these attacks. The construction of one such cost model for security risk assessment is also outlined. It helps decision makers to select the appropriate choice of countermeasure(s) to minimize damages/losses due to security incidents. Finally, some recommendations for future work are provided to improve the management of security in organizations on the whole.  相似文献   
12.
A single-frame X-ray framing camera has been set up for fast imaging of X-ray emissions from pulsed plasma sources. It consists of two parts, viz. an X-ray pin-hole camera using an open-ended microchannel plate (MCP) detector coupled to a CCD camera, and a high voltage short duration gate pulse for the MCP. The camera uses a 10-Μm pin-hole aperture for imaging on the MCP detector with a magnification of 6 X. The high voltage pulser circuit generates a pulse of variable duration from 5 to 30 ns (at 70% of peak amplitude) with variable amplitude from 800 V to 1.25 kV, and is triggered through a laser pulse synchronized with the event to be recorded. The performance of the system has been checked by recording X-ray emission from a laser-produced copper plasma. A reduction factor of ∼ 6.5 is seen in the dark current contribution as the MCP gate pulse is decreased from 250Μs to 5 ns duration.  相似文献   
13.
With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multistep process, which is often time-consuming. For mobile users accessing the Web over digital cellular networks, the failure of the wireless link, a frequent occurrence, can result in the loss of work accomplished prior to the disruption. This work must then be repeated upon subsequent reconnection - often at significant cost in time and computation. This "disconnection-reconnection-repeat work" cycle may cause mobile clients to incur substantial monetary as well as resource (such as battery power) costs. In this paper, we propose a protocol for "recovering" a user to an appropriate recent interaction state after such a failure. The objective is to minimize the amount of work that needs to be redone upon restart after failure. Whereas classical database recovery focuses on recovering the system, i.e., all transactions, our work considers the problem of recovering a particular user interaction with the system. This recovery problem encompasses several interesting subproblems: (1) modeling user interaction in a way that is useful for recovery, (2) characterizing a user's "recovery state", (3) determining the state to which a user should be recovered, and (4) defining a recovery mechanism. We describe the user interaction with one or more Web sites using intuitive and familiar concepts from database transactions. We call this interaction an Internet transaction (iTX), distinguish this notion from extant transaction models, and develop a model for it, as well as for a user's state on a Web site. Based on the twin foundations of our iTX and state models, we finally describe an effective protocol for recovering users to valid states in Internet interactions.  相似文献   
14.
Generality and scale are important but difficult issues in knowledge engineering. At the root of the difficulty lie two challenging issues: how to accumulate huge volumes of knowledge and how to support heterogeneous knowledge and processing. One approach to the first issue is to reuse legacy knowledge systems, integrate knowledge systems with legacy databases, and enable sharing of the databases by multiple knowledge systems. We present an architecture called HIPED for realizing this approach. HIPED converts the second issue above into a new form: how to convert data accessed from a legacy database into a form appropriate to the processing method used in a legacy knowledge system. One approach to this reformed issue is to use method-specific compilation of data into knowledge. We describe an experiment in which a legacy knowledge system called INTERACTIVE KRITIK is integrated with an ORACLE database. The experiment indicates the computational feasibility of method-specific data-to-knowledge compilation.  相似文献   
15.
Online personalization is of great interest to e-companies. Virtually all personalization technologies are based on the idea of storing as much historical customer session data as possible, and then querying the data store as customers navigate through a web site. The holy grail of online personalization is an environment where fine-grained, detailed historical session data can be queried based on current online navigation patterns for use in formulating real-time responses. Unfortunately, as more consumers become e-shoppers, the user load and the amount of historical data continue to increase, causing scalability-related problems for almost all current personalization technologies. This paper chronicles the development of a real-time interaction management system through the integration of historical data and online visitation patterns of e-commerce site visitors. It describes the scientific underpinnings of the system as well as its architecture. Experimental evaluation of the system shows that the caching and storage techniques built into the system deliver performance that is orders of magnitude better than those derived from off-the-shelf database components. Received: 30 October 2000 / Accepted: 19 December 2000 Published online: 27 April 2001  相似文献   
16.
Partitioning and allocation of relations is an important component of the distributed database design. Several approaches (and algorithms) have been proposed for clustering data for pattern classification and for partitioning relations in distributed databases. Most of the approaches used for classification use square-error criterion. In contrast, most of the approaches proposed for partitioning of relations are eitherad hoc solutions or solutions for special cases (e.g., binary vertical partitioning).In this paper, we first highlight the differences between the approaches taken for pattern classification and for distributed databases. Then an objective function for vertical partitioning of relations is derived using the square-error criterion commonly used in data clustering. The objective function derived generalizes and subsumes earlier work on vertical partitioning. Furthermore, the approach proposed in this paper is shown to be useful for comparing previously developed algorithms for vertical partitioning. The objective function has also been extended to include additional information, such as transaction types, different local and remote accessing costs and replication. Finally, we discuss the implementation of a distributed database design testbed. Recommended by: A. Sheth  相似文献   
17.
18.
A diagnostic system to detect electrical faults inside a coaxial high current discharge device is presented here. This technique utilizes two biconical antennas picking up electromagnetic radiation from the discharge device, a voltage divider sensing input voltage, and a Rogowski coil measuring the main discharge current. A computer program then analyses frequency components in these signals and provides information as to whether the discharge event was normal or any breakdown fault occurred inside the coaxial device. The diagnostic system is developed for a 450 kV and 50 kA capillary discharge plasma setup. For the setup various possible faults are analyzed by electrical simulation, followed by experimental results. In the case of normal discharge through the capillary load the dominant frequency is ~4 MHz. Under faulty conditions, the peak in magnitude versus frequency plot of the antenna signal changes according to the fault position which involves different paths causing variation in the equivalent circuit elements.  相似文献   
19.
A high-voltage pulse-slicer unit with variable pulse duration has been developed and integrated with a 7 MeV linear electron accelerator (LINAC) for pulse radiolysis investigation. The pulse-slicer unit provides switching voltage from 1 kV to 10 kV with rise time better than 5 ns. Two MOSFET based 10 kV switches were configured in differential mode to get variable duration pulses. The high-voltage pulse has been applied to the deflecting plates of the LINAC for slicing of electron beam of 2 μs duration. The duration of the electron beam has been varied from 30 ns to 2 μs with the optimized pulse amplitude of 7 kV to get corresponding radiation doses from 6 Gy to 167 Gy.  相似文献   
20.
The study on artificial intelligence(AI) methods for tuning of particle accelerators has been reported in many literatures.This paper presents tuning method for agent-based control systems of transport lines in the case of sensor/actuator failures.The method uses model-based tracking concept to relax the demand on sensor data.The condition for successful operation of the stated scheme is derived,and the concept is demonstrated through simulation by applying it to the model of microtron,transport line-1 and booster of indus accelerator.The results show that this approach is very effective in transport line control during sensor/actuator failures.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号