排序方式: 共有95条查询结果,搜索用时 31 毫秒
51.
本文以定理的形式提出一个新的组合恒等式。它是在恒虚警算法研究和性能分析中经常遇到的恒等式。对此,文中给出详细的证明。在证明过程中,我们还提出了有关该定理在实际中可以直接应用的3个引理和2个推论。 相似文献
52.
53.
为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理)上构建了一种新的数据结构;通过在NFA和OFA之间建立一个新的双向隧道,将VMN中的数据报文进行快速转移,在没有数据报文丢失的情况下,实现了快速低时延的切换;通过分发新的临时安全关联以及认证票据,有效地提高了移动IP在注册和切换过程中的安全,同时有效地降低了AAAH和AAAF之间的网络负载;通过对该方法进行安全性分析和仿真试验表明,我们提交的方法是安全有效的。 相似文献
54.
基于三维集成电路技术实现的三维静态随机存储器,其电路中使用了大量的过硅通孔。目前过硅通孔制造工艺尚未成熟,使得过硅通孔容易出现开路或短路故障,从而给三维静态随机存储器的测试带来新的挑战。现有的过硅通孔专用测试方式虽然能够探测出过硅通孔的故障,但需要特定的测试电路来实现,这就增加了额外的面积开销,同时加大了电路设计的复杂度。因此,提出一种使用测试算法来探测过硅通孔开路故障的方法。在不增加额外面积开销的情况下,通过内建自测试电路解决三维静态随机存储器中过硅通孔的开路故障检测问题。结果显示,该过硅通孔测试算法功能正确,能够准确探测到过硅通孔的开路故障,并快速定位过硅通孔的开路位置。 相似文献
55.
基于CA的雷达情报传输安全认证系统的设计与实现* 总被引:1,自引:0,他引:1
介绍了基于CA的雷达情报传输安全认证系统的整体结构及工作流程,设计了CA中心各个模块的组成和功能;使用VisualC 6.0开发工具与OpenSSL-0.9.8e开源包,实现了一个原型系统,研究了生成根钥证书,用户证书、证书吊销列表的方法和流程,为所有通信实体提供了密钥长度2048bit并遵从X.509v3标准的RSA数字证书;利用AES算法加密用户证书,结合SQLServer数据库,保证了证书的安全存储;最后探讨了USBKey智能钥匙在证书分发中的应用思路。 相似文献
56.
王斌 《中国人民武装警察部队学院学报》2008,24(1):49-51
实验室开放是实验教学改革的重要课题,各高校都在进行实验室开放的探索和实践。针对传统实验教学模式存在的弊端,认真探讨实验室开放的内涵、必备条件和开放模式,并对其效果进行了阐述。 相似文献
57.
Barbara Gruber 《Small Wars & Insurgencies》2013,24(2):226-247
In conflict studies, identity has been posited as an explanatory factor of the resilience of insurgencies. This article focuses on the identity formation of the National Liberation Army (ELN), a leftist insurgency group in Colombia. As a Marxist–Leninist organisation, the ELN aims to overcome capitalism. In their perception, this is possible via the transformation of the individual into a ‘collective personality’. Along the dimensions of ‘content’ and ‘contestation’, we will demonstrate the mechanisms they impose for such identity formation. Identity, as we will argue, is a main factor in explaining why people participate in this insurgency and thereby enhance its resilience. 相似文献
58.
Paul Rich 《Small Wars & Insurgencies》2013,24(1):39-56
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses. 相似文献
59.
60.
This paper explores the impact of moving to accrual budgeting on resources allocation in defence. Standard defence budgeting and investment models are used to assess the theoretical implications of accrual budgeting. In addition, a number of simulations are conducted to assess the long-term implications of moving to accrual accounting and budgeting. The result of the simulations shows that changes to deployed operations and other operational shocks will have manageable impacts on readiness but systematic shocks associated with defence unit prices, procurement policies and defence specific inflation will put considerable strain on the defence department's flexibility. 相似文献