[PDF][PDF] Architecture of power internet of things
H Wang, L Zeng, X Chen, Y Zhen, X Li - 12th China Association for …, 2010 - file.scirp.org
… power grid monitoring, security, information exchange… requirements and development of
massive information transmission, storage, security issues introduced by Power Internet of things…
massive information transmission, storage, security issues introduced by Power Internet of things…
[PDF][PDF] Recent advances and prospects of graphene-based fibers for application in energy storage devices
… graphene fibers, from preparation methods to fundamental properties. In this review, a
systematic summary of the recent advances in the preparation methods of graphene-based fibers …
systematic summary of the recent advances in the preparation methods of graphene-based fibers …
[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …
EB Kania - … ” Warfare,” US-China Economic and Security Review …, 2017 - uscc.gov
… the acquisition of unmanned systems remain relatively opaque. The JSD, EDD, and each
service’s equipment departments appear to establish requirements for systems based on their …
service’s equipment departments appear to establish requirements for systems based on their …
[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge
YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
… is dynamically adjusted to gradually approach the real stress state of the bridge, so as to
identify the risk conditions in advance and take active and efficient safety control measures to …
identify the risk conditions in advance and take active and efficient safety control measures to …
[PDF][PDF] Editable blockchain: models, techniques and methods
Y Yong, W Fei-Yue - Acta Automatica Sinica, 2020 - aas.net.cn
… as security and trustability. In this paper, we systematically analyze and address the
requirements for editable blockchains in information security and regulation, and present a working …
requirements for editable blockchains in information security and regulation, and present a working …
[PDF][PDF] Building a Safe and Robust Industrial System with Agilent's Optocouplers
SE Lee, AJ Jeremy, P Sullivan, CT Bee - White Paper. Agilent Technologies …, 2005 - rfoe.net
… Though many safety standard regulations have been established to provide guidelines to
the industry on the application of high voltages, the problem of this insulator is the uncertainty …
the industry on the application of high voltages, the problem of this insulator is the uncertainty …
[PDF][PDF] Downrange: A Survey of China's Cyber Ranges
D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… ranges with industrial control systems discussed in this report, as the offensive techniques
and tools used on those networks could be deployed against US systems in any future conflict…
and tools used on those networks could be deployed against US systems in any future conflict…
[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies
… to adopt effective approaches to security across all digital channels. The cybercriminals
becomes increasingly accustomed and has adapted to different internet platforms, extending …
becomes increasingly accustomed and has adapted to different internet platforms, extending …
[引用][C] Integrating co-occurrence reasoning for Faster R-CNN transmission line fitting detection [J]
Z Yongjie, Y Xu, Z Zhenbing, W Qianming, Z Wenqing - … on intelligent systems, 2021