共查询到20条相似文献,搜索用时 62 毫秒
1.
给出X接口安全管理的基本模型,分析X接口的安全威胁。安全目标和安全业务,探讨了不同安全业务的实现优先级和各种安全管理实现方案,提出一种结合安全前端设备与端系统安全集成的安全管理实现方案。 相似文献
2.
陈启辉 《信息安全与通信保密》2002,(10):60-61
政府网络安全体系分析 政府对网络的安全需求是全方位的、整体的,相应的网络安全体系也是分层次的,在不同层次反映了不同的安全问题。根据网络应用现状情况和网络结构,我们将安全体系的层次划分为五层:物理层安全、网络层安全、系统层安全、应用层安全和安全管理。然后我们再基于物理安全,链路安全、网络安全、系统安全、应用安全及管理安全几个 相似文献
3.
4.
5.
6.
7.
8.
9.
10.
4月15日,国家安全委员会第一次会议召开,习近平主席首次提出要坚持"总体国家安全观"并具体指出,要构建集政治安全、国土安全、军事安全、经济安全、文化安全、社会安全、科技安全、信息安全、生态安全、资源安全、核安全等于一体的国家安全体系。这一表述也被舆论称为"11种安全"。国家安全委员会的成立,彰显了我国保障国家安全,维护国家利益,实现强国梦的坚定决心。成立国家安全委员会提高了国家安全协调层级,可以更好地协调现有的各职能部门,防止资源浪费。 相似文献
11.
Beverley Christian Alexandre Romanov Irina Romanova Laura J. Turbini 《Journal of Electronic Materials》2014,43(11):4199-4213
Over the last few years, 85 cell phones have been disassembled, ground up, dissolved, and analyzed for elemental content, mainly for information about the metals present in the phones, but also for some metalloids and nonmetals. The following list of 38 elements were detected in some or all of the phones: Be, B, Mg, Al, Ti, V, Mn, Fe, Co, Ni, Cu, Zn, As, Se, Y, Nb, Pd, Ag, In, Sn, Sb, Te, Ba, Ta, W, Pt, Au, Tl, Pb, Bi, Pr, Nd, Sm, Eu, Gd, Tb, Dy, and Er. Cadmium was never detected. This paper discusses the methods used for carrying out the analysis, proposes possible sources in the telephones for the elements of interest, the reasons for the interest in most of the elements, and method repeatability. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(9):3186-3199
A binary sequence satisfies a one-dimensional$(d_1, k_1, d_2, k_2)$ runlength constraint if every run of zeros has length at least$d_1$ and at most$k_1$ and every run of ones has length at least$d_2$ and at most$k_2$ . A two-dimensional binary array is$(d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4)$ -constrained if it satisfies the one-dimensional$(d_1, k_1, d_2, k_2)$ runlength constraint horizontally and the one-dimensional$(d_3, k_3, d_4, k_4)$ runlength constraint vertically. For given$d_1, k_1, d_2, k_2, d_3, k_3, d_4, k_4$ , the two-dimensional capacity is defined as $$displaylines C(d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4) hfillcr hfill=, lim_m,n rightarrow infty log_2 N(m, n ,vert, d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4)over mn $$ where $$N(m, n ,vert, d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4)$$ denotes the number of$m times n$ binary arrays that are$(d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4)$ -constrained. Such constrained systems may have applications in digital storage applications. We consider the question for which values of$d_i$ and$k_i$ is the capacity$C(d_1, k_1, d_2, k_2; d_3, k_3, d_4, k_4)$ positive and for which values is the capacity zero. The question is answered for many choices of the$d_i$ and the$k_i$ . 相似文献
13.
单片机体积小、重量轻、抗干扰能力强、环境要求不高、价格低廉、可靠性高、灵活性好、深受初学者喜欢。以STC90C58为核心控制芯片,DS1302为时钟芯片,DS18B20采集温度,完成多功能电子时钟的设计。该设计能够准确显示年、月、日、星期、时、分、秒及温度,通过按键可以调整年、月、日、星期、时、分、秒、12/24小时转换、整点提示以及闹钟,还可显示阴阳历。 相似文献
14.
Continuing efforts under the auspices of the National Earthquake Hazards Reduction Program are under way to improve earthquake risk assessment and risk management in earthquake-prone regions of Alaska, California, Nevada, Washington, Oregon, Arizona, Utah, Wyoming, and Idaho, the New Madrid and Wabash Valley seismic zones in the central United States, the southeastern and northeastern United States, Puerto Rico, Virgin Islands, Guam, and Hawaii. Geologists, geophysicists, seismologists, architects, engineers, urban planners, emergency managers, health care specialists, and policymakers are having to work at the margins of their disciplines to bridge the gap between research and practice and to provide a social, technical, administrative, political, legal, and economic basis for changing public policies and professional practices in communities where the earthquake risk is unacceptable 相似文献
15.
Better breast cancer detection 总被引:2,自引:0,他引:2
《Spectrum, IEEE》2001,38(5):50-54
X-rays go digital, computers read film, and chemicals mark tumors, but will these new technologies make it in the clinic? The imaging technologies considered for breast cancer include film-screen mammography, full field digital mammography, ultrasound, magnetic resonance imaging, scintimammography, thermography, electrical impedance imaging, optical imaging, electric potential measurement, positron emission tomography, novel ultrasound techniques, elastography, magnetic resonance spectroscopy, thermoacoustic computed tomography, microwave imaging, Hall-effect imaging and magneto-mammography 相似文献
16.
17.
提出一种矿井智能化监管系统设计方案,该系统包括无线传感器网络(WSN)、工业以太网络、人员定位卡、井下视频手机、监管服务器、监控计算机、数据库、中心交换机、智能化监管信息平台。系统将工业以太网络和无线传感器网络结合,构建井下有线/无线的混合通信系统进行数据传输,井上利用智能化信息监管平台实现与井下作业人员、井上管理人员、井上其他人员的数据通信和资源共享;该系统具有井下人员实时定位、井下与井上实时视频通信、矿井环境监测、智能化信息处理、矿井信息分发、资源调度、异常情况报警等功能,矿井环境监测包括对瓦斯、CO、电化学氧气、硫化氢、风速、矿压、温湿度、矿尘、噪音等环境参数的监测。 相似文献
18.
19.