Zobrazeno 1 - 10
of 2 482
pro vyhledávání: '"Yan Guang"'
Publikováno v:
Kongzhi Yu Xinxi Jishu, Iss 4, Pp 85-89 (2023)
In the traditional rail transit signal system, the key subsystems are realized by the vital computer platform based on bus communication. On this platform, all devices share the same bus, so usually a variety of measures and a complex communication m
Externí odkaz:
https://doaj.org/article/98fbf3501322497b91773f3d6d58f221
Publikováno v:
Cailiao gongcheng, Vol 48, Iss 10, Pp 39-47 (2020)
Ion-imprinting technology endows with the selective separation for target ions, which has the advantages of high predeterminability, recognition, stability and practicality. The ion-imprinted materials obtained by the ion imprinting technology have t
Externí odkaz:
https://doaj.org/article/e9b92ff71baf460fb0785e897b3c23fa
Publikováno v:
网络与信息安全学报, Vol 6, Pp 94-108 (2020)
During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was pro
Externí odkaz:
https://doaj.org/article/2757fd0825274acb982defa980dd0a6b
Autor:
Yan Guang and Tian Hongyu
Publikováno v:
Contemporary Social Sciences (2021)
The European Union (EU) seeks to build a Europe fit for the digital age. For this purpose, the EU has accelerated the process of catching up with digital technology and issued a number of legal and regulatory documents to establish a digital gover
Externí odkaz:
https://doaj.org/article/245748bace924878ae05cf3d9adf93d1
Publikováno v:
网络与信息安全学报, Vol 3, Pp 50-58 (2017)
For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security v
Externí odkaz:
https://doaj.org/article/85c43cd10a0840cebd0768bacf03f71a
Publikováno v:
Gong-kuang zidonghua, Vol 41, Iss 4, Pp 5-8 (2015)
For problems of high labor intensity and low data collection efficiency existed in integrated water inrush monitoring system of coal mine, distributed sensor node, routing node and sink node of hydrological parameters and rock stress are developed on
Externí odkaz:
https://doaj.org/article/319c6d2ccb464fe9a86492fa4ed7576d
Autor:
Yan-Chao, Hu, Wen-Feng, Zhou, Ming-Zhi, Tang, Gang, Wang, Ming, Fang, Yan-Guang, Yang, Zhi-Gong, Tang
This paper investigates the bistability of curved compression ramp (CCR) flows. It reports that both separated and attached states can be stably established even for the same boundary conditions, revealing that the ultimate stable states of CCR flows
Externí odkaz:
http://arxiv.org/abs/2304.03429
Publikováno v:
Tongxin xuebao, Vol 35, Pp 111-117 (2014)
The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of
Externí odkaz:
https://doaj.org/article/b3e1f6a5ae8340d3ae353f41411f21b8
Since it is difficult to apply the existing method of friction and heat flux decomposition on the complex surface, a combined decomposition method of friction and heat flux with clear physical interpretation is proposed, which is based on FIK and RD
Externí odkaz:
http://arxiv.org/abs/2205.11741
This paper reports the bistability of curved compression ramp (CCR) flows. It reveals that both separation and attachment states can be stably established even for the same boundary conditions. Firstly, to investigate the effects of initial condition
Externí odkaz:
http://arxiv.org/abs/2110.02033