期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Driven by standard-technology-industry synergy:reshaping a new paradigm for sustainable global development
1
作者 Alec Saltikoff 《China Standardization》 2025年第5期48-48,共1页
The World Sustainability Standards Organization(WSSO)was established in October 2023.This organization aims to unify various standards in the fields of sustainable development such as energy,carbon sinks,green finance... The World Sustainability Standards Organization(WSSO)was established in October 2023.This organization aims to unify various standards in the fields of sustainable development such as energy,carbon sinks,green finance,ecological environment industries,energy conservation and environmental protection,carbon neutrality-related technologies,and ESG.WSSO supports the implementation of projects stipulated in the Paris Agreement such as the carbon market,and enhance the global coordination efforts in areas such as the digital currency of central banks and the carbon payment settlement system by connecting the digital currencies of various countries. 展开更多
关键词 carbon marketand world sustainability standards organization standard technology industry synergy paris agreement unify various standards implementation projects sustainable development enhance global coordination efforts
原文传递
National Conference on Technological Innovation of Standardization Held in Beijing
2
《China Standardization》 2007年第3期5-7,共3页
Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chua... Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards. 展开更多
关键词 Innovation work De National Conference on technological Innovation of standardization Held in Beijing
原文传递
Review of Techniques for Integrating Security in Software Development Lifecycle
3
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
2025 International Workshop on Bionic Engineering(IWBE 2025)will be held on September 23-27 in Vienna,Austria
4
《Advanced Bionics》 2025年第2期156-156,共1页
2025 International Workshop on Bionic Engineering(IWBE 2025)will be jointly held with the 15th Plenary Meeting of ISO/TC 266 Biomimetics on September 23-27 in Vienna,Austria.The workshop is hosted by ISBE together wit... 2025 International Workshop on Bionic Engineering(IWBE 2025)will be jointly held with the 15th Plenary Meeting of ISO/TC 266 Biomimetics on September 23-27 in Vienna,Austria.The workshop is hosted by ISBE together with ISO/TC 266 Biomimetics and organized by Vienna University of Technology(TU Wien),Jilin University and Beijing Research Institute of Automation for Machinery Industry Co.,Ltd.This joint event will focuses on bionic technology innovation and standardization. 展开更多
关键词 innovation joint event standardIZATION bionic technology innovation standardization bionic engineering
在线阅读 下载PDF
Battery Swapping Emerges as Major Alternative to Charging Electric Vehicles
5
作者 Chris Palmer 《Engineering》 2025年第9期6-9,共4页
In March 2025,prominent Chinese automaker NIO(Shanghai,China),the global leader in electric vehicle(EV)battery swapping,and Contemporary Amperex Technology Co.,Ltd.(CATL)(Nindge,China),the world’s biggest manufacture... In March 2025,prominent Chinese automaker NIO(Shanghai,China),the global leader in electric vehicle(EV)battery swapping,and Contemporary Amperex Technology Co.,Ltd.(CATL)(Nindge,China),the world’s biggest manufacturer of EV batteries,announced a strategic partnership to build the world’s largest battery swapping network,while also promoting unified standards and technologies[1].Just weeks later,CATL announced another partnership,this one with Chinese state-owned oil giant Sinopec(Beijing,China)to build 10000 new battery swapping stations in China,at least 500 in 2025[2]. 展开更多
关键词 electric vehicles TECHNOLOGIES standards battery swapping CATL promoting unified standards technologies just NIO SINOPEC
在线阅读 下载PDF
IECC-SAIN:Innovative ECC-Based Approach for Secure Authentication in IoT Networks
6
作者 Younes Lahraoui Jihane Jebrane +2 位作者 Youssef Amal Saiida Lazaar Cheng-Chi Lee 《Computer Modeling in Engineering & Sciences》 2025年第7期615-641,共27页
Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with... Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with shorter key lengths,which significantly reduces the computational overhead required for authentication algorithms.This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields.By reducing reliance on costly point multiplication,the proposed algorithm significantly improves execution time,storage requirements,and communication cost across varying security levels.The proposed authentication protocol demonstrates superior performance when benchmarked against relevant ECC-based schemes,achieving reductions of up to 35.83%in communication overhead,62.51%in device-side storage consumption,and 71.96%in computational cost.The security robustness of the scheme is substantiated through formal analysis using the Automated Validation of Internet Security Protocols and Applications(AVISPA)tool and Burrows-Abadir-Needham(BAN)logic,complemented by a comprehensive informal analysis that confirms its resilience against various attack models,including impersonation,replay,and man-in-the-middle attacks.Empirical evaluation under simulated conditions demonstrates notable gains in efficiency and security.While these results indicate the protocol’s strong potential for scalable IoT deployments,further validation on real-world embedded platforms is required to confirm its applicability and robustness at scale. 展开更多
关键词 Industrial IoT Elliptic Curve Cryptography(ECC) National Institute of standards and Technology(NIST)curves mapping AVISPA BAN logic computational efficiency security scalable IoT deployments
在线阅读 下载PDF
Research on Decision Model of Control over Technology Standard Alliance
7
作者 MA Dong HE Mingsheng 《Journal of Northeast Agricultural University(English Edition)》 CAS 2010年第4期97-102,共6页
Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countrie... Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance. 展开更多
关键词 technology standard ALLIANCE CONTROL joint control
在线阅读 下载PDF
Progress of 3G Evolution Technology Standardization
8
作者 Wang Zhiqin Lin Hui Du Ying (Research Institute of Telecommunications Transmission of MII, Beijing 100045, China) 《ZTE Communications》 2006年第2期39-42,共4页
The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both t... The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer. 展开更多
关键词 GPP HARQ Progress of 3G Evolution Technology standardization LTE CDMA MBMS Access OFDMA AIE
在线阅读 下载PDF
Research on Electric Field Confinement Effect in Silicon LED Fabricated by Standard CMOS Technology
9
作者 YANG Guanghua WANG Wei 《Semiconductor Photonics and Technology》 CAS 2010年第2期84-87,92,共5页
The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices... The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied. 展开更多
关键词 silicon LED standard CMOS technology electric field confinement effect
在线阅读 下载PDF
Strengthening Protection Of Proprietary Intellectual Property Rights and Implementation of Technology Standard Strategies
10
作者 Hu Qingping 《China Standardization》 2010年第6期41-49,共9页
This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyze... This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyzes the significance of strengthening the protection of proprietary IPRs and implementing a strategy for technology standards and then discusses the actual work and future arrangement of proprietary IPRs and technology standard strategies. It points out that the enhancement of proprietary IPRs protection and implementation of technology standard strategies is the only way for enterprises to remain competitive. 展开更多
关键词 proprietary intellectual property rights technology standard STRATEGY
原文传递
Standards for Mobile Internet Technologies
11
作者 Wu Wei, Wang Zhiqin (China Academy of Telecommunication Research of MIIT, Beijing 100045 , P . R . China ) 《ZTE Communications》 2009年第4期27-30,共4页
In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technolog... In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering. 展开更多
关键词 standards for Mobile Internet Technologies 王志勤
在线阅读 下载PDF
Latest Developments and Problems in Standardization of Resource Control Technologies for NGN
12
作者 Li Haihua (Institute of Communication Standards Research, China Academy of Telecommunications Research, MIIT, Beijing 100045, P. R. China) 《ZTE Communications》 2008年第4期11-15,共5页
As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends ... As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article. 展开更多
关键词 RACF Latest Developments and Problems in standardization of Resource Control Technologies for NGN GPP
在线阅读 下载PDF
China will speed up the establishment of the standard system on information industry technology
13
《China Standardization》 2006年第3期47-,共1页
关键词 WILL China will speed up the establishment of the standard system on information industry technology
原文传递
Discussion about the standard system on urban domestic water saving technology in China
14
作者 YANG Shujun, REN Xiaoli ,GAO Benhu 《China Standardization》 2007年第2期2-5,共4页
Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water sa... Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water saving technology is to offer important science basis for revising standard plan and standardize research plan. This paper introduces the present situation of our urban domestic water saving technical standard system, problem and the development direction in the future, as well as project planning of constructing urban domestic water saving technical standard system. 展开更多
关键词 standard system urban domestic water saving technology water shortage Project plan
原文传递
Research on Application of UAV for Maritime Supervision 被引量:5
15
作者 Gui-Jun Duan Peng-Fei Zhang 《Journal of Shipping and Ocean Engineering》 2014年第11期322-326,共5页
Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime sea... Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime search and rescue, navigation channel measurement, monitoring and inspection of the oil and sewage spills from ships at sea, it can effectively expand the uses of monitoring sea areas, reduce the phenomenon of illegal use of sea, which can improve modernization construction in maritime supervision. According to the UAV (unmanned aerial vehicle) development and application, this paper explores the advantages of the UAV application in maritime adminstration, as well as the characteristics of maritime adminstration, put forward some countermeasures and suggestions of UAV applied in maritime adminstration. 展开更多
关键词 UAV maritime supervision duty load technology standard.
在线阅读 下载PDF
A Fast Pseudorandom Number Generator with BLAKE Hash Function
16
作者 WANG Houzhen ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期393-397,共5页
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Thr... This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program. 展开更多
关键词 CRYPTOGRAPHY pseudorandom number generator hash function National Institute of standards and Technology Statistical Test Suite
原文传递
Forensics: Collection of Sound Digital Evidence
17
作者 Richard Kabanda Harihar Thapa Luis Rivera 《Journal of Information Security》 2023年第4期454-463,共10页
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court. 展开更多
关键词 Electronic Discovery Reference Model National Institute of standards and Technology (NIST) Message-Digest Algorithm Secure Hash Algorithm Forensically Sound Digital Evidence
在线阅读 下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
18
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
在线阅读 下载PDF
Which Plays a Decisive Role in Technology Licensing Involved in Technology Standards, Patented Technology or Know-how?
19
作者 Ma Zhong-fa 《Fudan Journal of the Humanities and Social Sciences》 2010年第3期127-144,共18页
It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented tech... It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented technology hcensing imphed, for patented technology hcensing is a prerequisite for the existence and development of technology standards. Therefore, technology standards create a good many potential chances for hcensing patented technologies concerning them. Superficially speaking, patent holders achieve huge profits mainly by means of hcensing patented technologies through a standard mainly in the form of a patent pool; however, in fact, it is know-how licensing behind the patented technology involved in the standard that really helps patent holders make huge profits. 展开更多
关键词 technology standard patented technology hcensing patent pool know-how licensing
原文传递
Trade Spat on Technology Standards Heating up in First Half 2010
20
作者 Yao Lan Guoyun 《纺织服装周刊》 2010年第28期9-9,共1页
A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
关键词 Trade Spat on Technology standards Heating up in First Half 2010 RAPEX
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部