期刊文献+
共找到1,723篇文章
< 1 2 87 >
每页显示 20 50 100
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
1
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT) 被引量:1
2
作者 Hariharan Ramachandran Richard Smith +2 位作者 Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya 《Computers, Materials & Continua》 2025年第2期3619-3641,共23页
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f... This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals. 展开更多
关键词 ICS/OT cyber Programmable Logic Controllers(PLC)security detection safety reliability proof testing gas compressor station ICS resilience security architecture ICS
在线阅读 下载PDF
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
3
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes 被引量:1
4
作者 Qi-Qi Lai Bo Yang +3 位作者 Yong Yu Zhe Xia Yan-Wei Zhou Yuan Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第6期1243-1260,共18页
Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat... Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage. 展开更多
关键词 public-key ENCRYPTION IDENTITY-BASED HASH proof system lattice updatable leakage-resilience
原文传递
Privacy-preserving Distributed Location Proof Generating System 被引量:3
5
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
在线阅读 下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
6
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
A novel explosion-proof walking system: Twin dual-motor drive tracked units for coal mine rescue robots 被引量:2
7
作者 李雨潭 朱华 +1 位作者 李猛钢 李鹏 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第10期2570-2577,共8页
A new explosion-proof walking system was designed for the coal mine rescue robot(CMRR) by optimizing the mechanical structure and control algorithm. The mechanical structure innovation lies mainly in the dual-motor dr... A new explosion-proof walking system was designed for the coal mine rescue robot(CMRR) by optimizing the mechanical structure and control algorithm. The mechanical structure innovation lies mainly in the dual-motor drive tracked unit used, which showed high dynamic performance compared with the conventional tracked unit. The control algorithm, developed based on decision trees and neural networking, facilitates autonomous switching between "Velocity-driven Mode" and "Torquedriven Mode". To verify the feasibility and effectiveness of the control strategy, we built a self-designed test platform and used it to debug the control program; we then made a robot prototype and conducted further experiments on single-step, ramp, and rubble terrains. The results show that the proposed walking system has excellent dynamic performance and the control strategy is very efficient, suggesting that a robot with this type of explosion-proof walking system can be successfully applied in Chinese coal mines. 展开更多
关键词 coal mine rescue robot tracked walking system EXPLOSION-proof control strategy
在线阅读 下载PDF
Analysis of color difference in digital proofing based on color management system
8
作者 LIN Mao-hai ZHOU Shi-sheng 《通讯和计算机(中英文版)》 2009年第10期32-36,共5页
关键词 色彩管理系统 差异分析 数字打样 爱普生STYLUS 颜色再现 分光光度计 基础 彩色
在线阅读 下载PDF
Analyzing Effect of Demand Rate on Safety of Systems with Periodic Proof-tests 被引量:1
9
作者 Manoj Kumar A.K.Verma A.Srividya 《International Journal of Automation and computing》 EI 2007年第4期335-341,共7页
Quantitative safety assessment of safety systems plays an important role in decision making at all stages of system lifecycle, i.e., design, deployment and phase out. Most safety assessment methods consider only syste... Quantitative safety assessment of safety systems plays an important role in decision making at all stages of system lifecycle, i.e., design, deployment and phase out. Most safety assessment methods consider only system parameters, such as configuration, hazard rate, coverage, repair rate, etc. along with periodic proof-tests (or inspection). Not considering demand rate will give a pessimistic safety estimate for an application with low demand rate such as nuclear power plants, chemical plants, etc. In this paper, a basic model of IEC 61508 is used. The basic model is extended to incorporate process demand and behavior of electronic- and/or computer-based system following diagnosis or proof-test. A new safety index, probability of failure on actual demand (PFAD) based on extended model and demand rate is proposed. Periodic proof-test makes the model semi-Markovian, so a piece-wise continuous time Markov chain (CTMC) based method is used to derive mean state probabilities of elementary or aggregated state. Method to determine probability of failure on demand (PFD) (IEC 61508) and PFAD based on these state probabilities are described. In example, safety indices of PFD and PFAD are compared. 展开更多
关键词 Probability of failure on demand fail safe Markov model continuous time Markov chain IEC 61508 diagnosis REPAIR proof-test DEMAND safety system.
在线阅读 下载PDF
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
10
作者 Muhammad Muntasir Yakubu Mohd Fadzil B Hassan +5 位作者 Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam 《Computer Systems Science & Engineering》 2024年第6期1437-1481,共45页
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t... This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications. 展开更多
关键词 Blockchain consensus mechanisms supply chain management proof of work(PoW) proof of stake(PoS) practical byzantine fault tolerance(PBFT)
在线阅读 下载PDF
程序性事实观下刑事证据制度改革路径探究 被引量:1
11
作者 杨波 《法学论坛》 北大核心 2025年第1期27-38,共12页
程序性事实观是证据法与程序法关系的高度凝结,是一种理性的事实观,其能够打破结果性事实观的局限与束缚,为刑事证据制度的构建提供直接、有效的理论支撑。程序性事实观下,刑事证据制度的体系化重塑应首先明确“准确认定案件事实”的立... 程序性事实观是证据法与程序法关系的高度凝结,是一种理性的事实观,其能够打破结果性事实观的局限与束缚,为刑事证据制度的构建提供直接、有效的理论支撑。程序性事实观下,刑事证据制度的体系化重塑应首先明确“准确认定案件事实”的立法目的,进而以事实认定的准确性为核心,全面构建逻辑严谨、层次分明的证据规则体系以及理性科学的刑事诉讼证明制度。程序性事实观要求完善刑事诉讼程序,为事实证明活动的充分展开提供理想的程序空间。 展开更多
关键词 程序性事实观 事实 证据规则 证明制度
原文传递
Time Dilation Cosmology 3: Mathematical Proof of the 3 Temporal and 2 Spatial Acceleration Factors
12
作者 Joseph H. (Cass) Forrington 《Journal of Modern Physics》 2024年第12期2228-2237,共10页
This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums... This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums in astrophysics and serves as a model for the unified field. In the author’s previous four TDC papers, it was demonstrated that all gravitationally induced velocities are compensation for the apparent difference in the rates of time, “dRt”, due to mass/energy densities, and, vice-versa, in all force-induced velocities the dRt is compensation for the velocity, so the uniform evolution of the continuum at c is maintained at the invariant 1 s/s rate of time of the universe as a whole. These compensations make it impossible for an event to lag behind or get ahead of the evolving continuum. When the author did the first velocity formula derivations in “General Relativity: Effects in Time as Causation” [1], the author felt the explanations for the appearance of the 2spatial and the 3temporal acceleration factors in the formulas were correct, but poorly explained and incomplete. This paper is a proof of the temporal and spatial acceleration factors used in the time dilation-based velocity formula derivations in the Time Dilation Cosmology model. 展开更多
关键词 Mathematical proof Time Dilation Cosmology Acceleration Factors
在线阅读 下载PDF
论信息网络犯罪数额证明困境与制度破解
13
作者 李建东 陈昂 《河南司法警官职业学院学报》 2025年第2期59-64,共6页
随着信息网络技术的飞速发展,信息网络犯罪日益猖獗,而犯罪数额的证明在这类犯罪的司法认定中起着关键作用。网络犯罪数额证明易陷入海量信息或信息短缺两极悖反的困境。实务部门颁行的规范性文件,在证明规则与标准适用层面存在“拓展... 随着信息网络技术的飞速发展,信息网络犯罪日益猖獗,而犯罪数额的证明在这类犯罪的司法认定中起着关键作用。网络犯罪数额证明易陷入海量信息或信息短缺两极悖反的困境。实务部门颁行的规范性文件,在证明规则与标准适用层面存在“拓展定罪量刑要素”“数额推定”以及“抽样检验”规则或方法的问题与争议。犯罪数额证明机制有转移证明责任以及降低证明标准的趋势,在便利司法实务的同时亦存在正当性不足的风险。鉴于此,亟须从优化证明机制、完善证明规则、调整定罪量刑要素等角度破解信息网络犯罪数额证明的难题。 展开更多
关键词 信息网络犯罪 犯罪数额 证明困境 证明标准 制度破解
原文传递
基于CFD取料机液压防爆阀组优化设计与应用 被引量:2
14
作者 张春辉 郭锐 赵静一 《机床与液压》 北大核心 2025年第2期140-144,共5页
针对取料机俯仰液压系统防爆阀频繁失效损坏带来的重大安全风险,对原系统防爆阀组的结构原理及存在的问题进行分析。通过分析防爆阀流量和阀芯开度变化对其性能的影响,得到合理的防爆阀阀口开度,在此基础上对原防爆阀组结构进行改进;采... 针对取料机俯仰液压系统防爆阀频繁失效损坏带来的重大安全风险,对原系统防爆阀组的结构原理及存在的问题进行分析。通过分析防爆阀流量和阀芯开度变化对其性能的影响,得到合理的防爆阀阀口开度,在此基础上对原防爆阀组结构进行改进;采用CFD仿真软件对防爆阀进口并联单向阀以及各种流道参数下的防爆阀组进行仿真,得到最优的结构参数,从而使油液流动状态更加平稳。对比优化前后防爆阀组的现场应用,可知:优化后的防爆阀组在作业过程中可以有效降低防爆阀的压差,从而减少误动作,提高防爆阀的使用寿命,为同类产品的设计应用提供参考。 展开更多
关键词 取料机液压系统 防爆阀组 CFD仿真 结构优化
在线阅读 下载PDF
一种基于互联网技术的防潮晾衣机器人的设计
15
作者 李银 梁嘉乐 周子懿 《韶关学院学报》 2025年第2期18-24,共7页
针对当下晾衣架智能化较差,在潮湿环境下无法对衣服进行保护与应对天气变化时无法提前采取相应措施,设计了一款基于互联网技术的防潮晾衣机器人,首先利用SOLIDWORKS对模型进行三维设计,其次介绍了机器的硬件与软件的情况,并且对机器面... 针对当下晾衣架智能化较差,在潮湿环境下无法对衣服进行保护与应对天气变化时无法提前采取相应措施,设计了一款基于互联网技术的防潮晾衣机器人,首先利用SOLIDWORKS对模型进行三维设计,其次介绍了机器的硬件与软件的情况,并且对机器面对不同天气的控制方法进行了简介.特别的,在针对防潮防雨与自然晾晒,着重对其具体方法进行详细描述,随后通过ANSYS对模型的危险截面进行有限元分析,验证了关键零部件是否符合强度设计要求,最后通过与查阅相似的文献进行方法比较与总结,为研究智能家居及其控制系统对教育教学和人才培养提供重要意义. 展开更多
关键词 防潮晾衣机器人 结构设计 系统控制 有限元分析
在线阅读 下载PDF
Glia-to-neuron reprogramming to the rescue?
16
作者 Jack W.Hickmott Cindi M.Morshead 《Neural Regeneration Research》 SCIE CAS 2025年第5期1395-1396,共2页
Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells c... Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells could be generated from adult mouse fibroblasts is powerful proof that cell fate can be changed.An exciting extension of the discovery of cell fate impermanence is the direct cellular reprogram ming hypothesis-that terminally differentiated cells can be reprogrammed into other adult cell fates without first passing through a stem cell state. 展开更多
关键词 programming PASSING proof
暂未订购
Corrigendum: MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons
17
《Neural Regeneration Research》 SCIE CAS 2025年第4期945-945,共1页
There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Ne... There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Neural Regeneration Research(Sharma et al.,2024),because of oversight during final proof checking.The correct description should be“human-GABA receptor A-α1/β2/γ2L human embryonic kidney(HEK)recombinant cell line.”The authors apologize for any inconvenience this correction may cause for readers and editors of Neural Regeneration Research. 展开更多
关键词 FUNCTION proof correction
在线阅读 下载PDF
关于冰雹猜想(Ⅲ)
18
作者 孙桂秋 《长春师范大学学报》 2025年第8期27-32,共6页
本文是《关于冰雹猜想(Ⅰ)》和《关于冰雹猜想(Ⅱ)》的继续.运用反证法的思想证明冰雹猜想的迭代过程除了一个平凡循环之外,没有其他的循环.首先构造出具有“循环结构”的二元、三元直至r元的方程组.通过解这些方程组,最终得出结论:除... 本文是《关于冰雹猜想(Ⅰ)》和《关于冰雹猜想(Ⅱ)》的继续.运用反证法的思想证明冰雹猜想的迭代过程除了一个平凡循环之外,没有其他的循环.首先构造出具有“循环结构”的二元、三元直至r元的方程组.通过解这些方程组,最终得出结论:除了平凡解之外,这些方程组没有其他的正整数解. 展开更多
关键词 反证法 迭代过程 平凡循环 循环结构 方程组 正整数解
在线阅读 下载PDF
《刑事诉讼法》再修改背景下刑事证据制度之完善
19
作者 肖沛权 周家驹 《东北师大学报(哲学社会科学版)》 北大核心 2025年第4期167-175,共9页
随着刑事证据制度改革的深入推进,《刑事诉讼法》证据制度规范呈现明显的缺位和滞后,亟待在《刑事诉讼法》再修改中加以完善。当前刑事错案的接连曝光、犯罪形态的转变、数字技术的发展为刑事证据制度的完善带来了新的契机,也对之提出... 随着刑事证据制度改革的深入推进,《刑事诉讼法》证据制度规范呈现明显的缺位和滞后,亟待在《刑事诉讼法》再修改中加以完善。当前刑事错案的接连曝光、犯罪形态的转变、数字技术的发展为刑事证据制度的完善带来了新的契机,也对之提出了时代要求。刑事证据制度的完善应当遵循无罪推定原则、证据裁判原则以及不得强迫自证其罪原则,并聚焦于证据种类、证据规则和证明标准三个面向。具体而言,封闭的法定证据种类不能涵盖全部的证据形式,其划分标准的科学性仍存争议。对此,应明确证据法定形式体系的开放性,以分析证据的证明机理为核心实现划分标准的回归;对于证据规则应在进一步完善非法证据排除规则的基础上,借鉴、吸收国外较为成熟的传闻证据规则;同时,针对证明标准中存在的理论争议,应当明确“排除合理怀疑”的定位与适用标准、坚守认罪认罚案件的法定证明标准予以应对。 展开更多
关键词 《刑事诉讼法》再修改 刑事证据制度 证据种类 证据规则 证明标准
在线阅读 下载PDF
Mathematical Analysis and Simulation of Secure Information Transmission and Processing Model
20
作者 Ren Quan Wu Jiangxing He Lei 《China Communications》 2025年第3期181-201,共21页
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem... The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically demonstrate the security of information transmission and processing under nonrandom noise(or vulnerability backdoor attack)conditions in cyberspace.This paper first proposes a security model for cyberspace information transmission and processing channels based on error correction coding theory.First,we analyze the fault tolerance and non-randomness problem of Dynamic Heterogeneous Redundancy(DHR)structured information transmission and processing channel under the condition of non-random noise or attacks.Secondly,we use a mathematical statistical method to demonstrate that for non-random noise(or attacks)on discrete memory channels,there exists a DHR-structured channel and coding scheme that enables the average system error probability to be arbitrarily small.Finally,to construct suitable coding and heterogeneous channels,we take Turbo code as an example and simulate the effects of different heterogeneity,redundancy,output vector length,verdict algorithm and dynamism on the system,which is an important guidance for theory and engineering practice. 展开更多
关键词 coding theory information systems mod-eling non-random noise security proof
在线阅读 下载PDF
上一页 1 2 87 下一页 到第
使用帮助 返回顶部