首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
0 IntroductionWireless sensor networks consist of manynodes , each containing application-specificsensors ,a wirelesstransceiver ,anda si mple proces-sor[1-4]. Sensor networks have extensive applica-tions . A large number of research results can beseenin Refs .[5-7] .This paper mainly concerns with sensor net-works that are inherently unreliable. We consider anetwork with mn nodes ,arranged in a grid over asquare region of areaA. This model was presentedin[8 ,9].Each nodeis a sensor ,and can…  相似文献   

2.
The direct photolysis of N-nitrosodiethylamine (NDEA) in water with ultraviolet (UV) irradiation was investigated. Results showed that NDEA could be completely degraded under the direct UV irradiation. The effects of the experimental conditions, including the initial concentration of NDEA, humic acid and solution pH, were studied. The degradation products of NDEA were identified and quantified with gas chromatography-mass spectrometry (GC-MS) and high performance liquid chromatography (HPLC). It was confirmed that methylamine (MA), dimethylamine (DMA), ethylamine (EA), diethylamine (DEA), NO2^- and NO3^- were the main degradation products. The photolysis degradation mechanism of NDEA was also discussed. As a result of N-N bond fission, NDEA was degraded by direct UV irradiation.  相似文献   

3.
To improve trustworthiness in grid authentication, a novel trust enhanced grid authentication mechanism (TEGAM) is proposed in this paper where trust is divided into trust on grid entity (GE) and trust on third party (TP). In order to obtain precise trust evaluation on GE's behaviors, trust on GE is further subdi- vided into trust as service consumer and trust as service provider. Details for the structure of TEGAM and related TEGAM-based authentication process are also given. Simulation results and prop- erty analysis show that, compared with current trust-based grid authentication techniques, TEGAM can not only help establish explicit and dynamic trust relationships among grid entities but also will significantly increase the efficacy of grid authentication.  相似文献   

4.
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.  相似文献   

5.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

6.
Inclusion complex of Orange II with β-Cyclodextrin (β-CD) and the anti-photolysis effect under UV-light were investigated. The molar ratio of inclusion complex of β-Cyclodextrin and Orange II is 1∶1. The formation constantK = 1.236×103 L/mol was determined by the UV and Fluorescence spectra respectively, which was quite in accordance with the calculation with a modified Benesi-Hildbrand equation. The inclusion complex was characterized by the IR spectra and the molar ratio of inclusion complex is 1∶1 too. The formation constantK = 1.266×103 L/mol was determined by1H NMR analysis and was nearly the same by UV and fluorescence spectra. The photocatalytic decolorization rate of Orange II solutions containing β-CD and TiO2 was smaller by 51.9% than that of the Orange II solutions only containing TiO2, while in the case of direct photolysis of Orange II solutions, β-CD can lower the photolysis rate by 48.1% under UV-light. This result indicates β-CD can inhibit the photolysis and photocatalytic decolorization of Orange II under UV-light. The β-CD inclusion complex was found to be persistent to UV-light photolysis. Foundation item: Supported by the National Natural Science Foundation of China (20177017) Biography: Lu Ping (1958), male. Associate professor, research direction: environmental photochemistry.  相似文献   

7.
In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid; then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.  相似文献   

8.
0 IntroductionThemetalionsinmetallamacrocylesformedbysupramolecularself assemblycantaketrigonal,square planar,andtetrahe dralconfiguration[1 ,2 ] .Metallacrownisaspecialclassofmetalla macrocyle,theyareanalogoustocrownethersinbothstructureandfunctionexceptthatthemetalionsarenowtakingthepositionsofcoordinationatomsincrownether[3,4] .Themetallacrownswithdifferentnumberof [M—N—O]repeatunithavedifferentcavitysizes,suchas 9 MC 3[5 7] ,12 MC 4 [4,8 1 4 ] and 15 MC 5 [1 5] .Thereportedazameta…  相似文献   

9.
Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture, grid usage control (GUCON), for grid computing. It's based on the next generation access control mechanism usage control (UCON) model. The GUCON Framework dynamic grants and adapts permission to the subject based on a set of contextual information collected from the system environments; while retaining the authorization by evaluating access requests based on subject attributes, object attributes and requests. In general, GUCON model provides very flexible approaches to adapt the dynamically security request. GUCON model is being implemented in our experiment prototype.  相似文献   

10.
With the explosion of services in grid environment, it's necessary to develop a mechanism which has the ability of discovering suitable grid services efficiently. This paper attempts to establish a layered resource management model based on the locality principle which classifies services into different domains and virtual organizations (VOs) according to their shared purposes. We propose an ontologybased search method applying the ontology theory for characterizing semantic information. In addition, we extend the UD- D1 in querying, storing, and so on. Simulation experiments have shown that our mechanism achieves higher performance in precision, recall and query response time.  相似文献   

11.
12.
A novel anion receptor 2 bearing anthracene flurophore and thiourea was synthesized and identified by ^1H NMR,MS,IR and elemental analysis. The interaction between receptor 2 and various α,ω-dicarboxylate anions was studied by fluorescence spectrum. The obtained fluorescence data indicate that 1:1 stoichiometry complex is formed between receptor 2 with diferent dicarboxylate anions through a hydrogen-bonging interaction. The selectivity of 2 for recognition of different dicarboxylates deponds on chain length of the anionic species.  相似文献   

13.
Based on the Naviev-Stokes equations and the standard κ-ε turbulence model, this paper presents the derivation of the governing equations for the turbulent flow field in a draft tube. The mathematical model for the turbulent flow through a draft tube is set up when the boundary conditions, including the inlet boundary conditions, the outlet boundary conditions and the wall boundary conditions, have been implemented. The governing equations are formulated in a discrete form on a staggered grid system by the finite volume method. The second-order central difference approximation and hybrid scheme are used for discretization. The computation and analysis on internal flow through a draft tube have been carried out by using the simplee algorithm and cfx-tasc flow software so as to obtain the simulated flow fields. The calculation results at the design operating condition for the draft tube are presented in this paper. Thereby, an effective method for simulating the internal flow field in a draft tube has been explored.  相似文献   

14.
Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only some operations such as "and", "or" and "xor". Applying this idea in the existed distributed association rule mining al gorithm FDM, the improved algorithm BFDM is proposed. The theoretical analysis and experiment testify that BFDM is effective and efficient.  相似文献   

15.
Hausdorff Measure of Linear Cantor Set   总被引:2,自引:0,他引:2  
We study the Hausdorff measure of linear Cantor set E,on the unit interval,under the strong seperated condition.We give a necessary and sufficient condition for (E) =|E|^α by using the contracting ratio and the first gap.This condition is easy to use.  相似文献   

16.
The reaction of 5-(4-hydroxyphenyl)-10,15,20-triphenyl porphyrin with 2,6-dibromomethylpyridine and 4,4‘-dicarboxyl-2,2‘-bipyridine respectively gave 2,6-bis-[5,10,15-triphenyl-20-( 4-phenoxymethyl )-porphyrin-yl]-pyridine(3) and 4, 4‘-di-[5,10,15-triphenyl-20-( p-phenoxycarbonyl)-porphyrin-yl]-2,2‘-bipyridine (4). 5-[4-(4‘- Bromobutoxy) phenyl]-10, 15, 20-triphenyl porphyrin reacted with 2,6-dihydroxymethyl pyridine to give 2,6-bis-[5,10,15-triphenyl- 20-(4-(p-phenoxy)-butoxymethyl)-porphyrin-yl]-pyridine(5). Those new compounds have been identified by ^1H NMR, IR, MS and UV-visible spectra, and elemental analysis.  相似文献   

17.
One-dimensional carbon nano-materials (ODCNMs) synthesized from ethanol flames exhibit various agglomerated morphologies, such as "chrysanthemum-like", "hairball-like" or "orange-peel-like", "vertically aligned" and "wrinkling-pileup". The present work studied the agglomerating process and the growth mechanism by using scanning electron microscopy (SEM) and transmission electron microscopy (TEM). It is thought that the size and distribution of the catalyst particles produced from pretreatment of the substrates play a key role during the formation of agglomerations. It is expected that the steady growth of ODCNMs in flames will be improved through the preparation of the catalysts.  相似文献   

18.
Synthesis of Novel Covalent-linked Linear Porphyrin-Thiophene Copolymers   总被引:1,自引:0,他引:1  
0 IntroductionTheconstructionofmacro molecularsystemcontainingmul tipleredoxcentersorphotosensitizersisanimportantsub jectinthedesignofmolecularelectronicdevices[1 ,2 ] .Forsuchobjectives,systematizationofdonor (redoxcenter) acceptortriadmoleculesintolargemolecularsystemsisoneofthemostfeasibleapproaches,becausetheexquisiteincorporationofthephotosensi tizersandsuitableelectrondonorsand /oracceptorsintoapoly mericchainisusefulforvariousmolecularsystembasedonphoto inducedelectrontransfer[3 ,4] …  相似文献   

19.
Building Intrusion Tolerant Software System   总被引:1,自引:0,他引:1  
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.  相似文献   

20.
The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号