10 April 2005, Volume 23 Issue 0504
    

  • Select all
    |
    网络安全技术研究专题
  • . 2005, 23(0504): 4-7.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    For the complexity of coordinated attacks, it is difficult to detect them efficiently by using the traditional methods such as misuse detection and anomaly detection. Based on the research work on the hiberarchy and reciprocity of attack behaviors, a solution for detecting coordinated attack with the conditional association and temporal method was suggested. A kind of attack representation that suitable to association analysis has been introduced.
  • . 2005, 23(0504): 7-9.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The Stochastic Point Process was used to simulate attack processes that network systems might suffer from, and the transition probabilities matrix was constructed to simulate the impact of attacks on a certain system. By varying the state of system in the simulation, an analysis method to quantitate survivability of network systems was developed.
  • . 2005, 23(0504): 10-12.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In view of the future information warfare which our militaries will be confronted with, the necessity of constructing the information security and antagonism network for national defence based on civil information systems was analyzed, in accordance with incorporation military into civilian and use for both military and civilian purpose. Some examples were given to illustrate the feasibility, and the content about network construction was also narrated.
  • . 2005, 23(0504): 13-15.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The survivability of the network system is increasingly drawn high attention, but a well-accepted construction or evaluation method is still lacking for it. Based on the similarity between survivable network system and natural beings (e.g. human self), a survivable network system based on biological immune system, SuNSIA was proposed, and its architecture, main module and work flow were described, Finally, the advantages and disadvantages of SuNSIA were analyzed.
  • . 2005, 23(0504): 16-19.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The targets of net attacks could be summed up to data resources, computational resources and connection resources. To resist net attack, which focuses on data resource, an intrusion-deception-based dynamic network defensive system was present in this paper. and redirection technology in the Intrusion Deception System were also discussed, The problems of redirection technology were analyzed and a seamless redirection solution was described, including the technology of redirection base on Socket and Environment States synchronization. The initiative and security of the Intrusion Deception System were assured
  • 交通
  • . 2005, 23(0504): 20-24.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Considering the unified, sustainable and coordinative development of the national future transportation system together with the energy, environment protection and urbanization requirement, it is important to develop vigorously the electric transportation systems. The successful construction and operation of the Shanghai Maglev Demonstration Line shows the birth of the maglev transportation as the sixth kind of the mankind transportation systems, the maglev will play important role in the future transportation systems. Some suggestions for active development of maglev transportation in China were put forward, including application, industrialization, research and development.
  • . 2005, 23(0504): 24-28.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The state of the art of battery electric vehicles, hybrid electric vehicles and fuel cell electric vehicles was reviewed. These three types of electric vehicles are presently at different stages of development, facing different challenges and require different strategies. However, they have common engineering philosophy and core technologies, such as advanced motor drive technology, energy resources, energy control and management, chassis and body, etc. The challenges of commercialization of three types of electric vehicles were summarized in the end of the paper.
  • . 2005, 23(0504): 29-31.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Permafrost has extensive temporal and spatial variability that is affected by many uncertain factors along Qinghai-Tibet Railroad, for example, uncertainty of climate change, engineering itself, change of permafrost engineering properties and permafrost change. The research was done through uncertain research methods. So the ideas of reliability evaluation must be introduced to analyze the change of roadbed stability. Spatial variability of permafrost and the variability of engineering properties of permafrost were analyzed, and the significance on the application of engineering reliability in the engineering stability of permafrost roadbed of Qinghai-Tibetan Railroad was discussed. According to engineering stability features of permafrost roadbed, possible disabled patterns of permafrost roadbed engineering were proposed. On the design principles of the roadbed in permafrost regions, variability design and evaluation of engineering stability for permafrost roadbed were developed.
  • 出版管理研究专题
  • . 2005, 23(0504): 32-33.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The property right situation and the existing problems in the publishing industry of China were analysed. The ideas of innovation in the publishing industry and measures to solve the problems were put forward, and the direction of establishing the excellent publishing industry property structure was pointed out.
  • . 2005, 23(0504): 34-36.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    VIP Chinese journal database is one of the most largest databases of the Chinese science literature. EndNote is an reference manager software developed by Thomson ISI Researchsoft. Some plug-in was developed for the importation of the Chinese reference searched from the VIP database to the personal reference database created and managed by EndNote. Other output styles according with Chinese journal were developed for the theses processing by word software.
  • 科研管理
  • . 2005, 23(0504): 37-39.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Currently, in many countries, technology foresight has been playing an important role gradually in formulating their science & technology policies. It will become more and more important with the establishment of our mid- to long-term science & technology layout. As a classical proposition from the ancient Greece, Achilles Paradox has a long-term effect on the development of modern maths and physics. What relationship is between technology foresight and Achilles Paradox? Based on illustrating the essence of technology foresight strategy, the formation of technology menu and the game rule of Archilles Paradox, the possibility in producing Archilles Paradox from technology foresight , and the prevention as well were analyzed
  • . 2005, 23(0504): 40-43.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Constructive technology assessment has expanded the scope of new technology design, whose core idea is that the social problems brought by the technology could be solved through involving the stakeholders in the process of technology development. The paper analyzes the origin, intension, theory background and practice of this kind of technology assessment paradigm, and puts forward that the CTA is a new method of technology management
  • . 2005, 23(0504): 44-47.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    On the view that enterprises' cluster is a interactive, inter-influencing ecosystem, and based on summarizing and analyzing the common classifying of enterprises' cluster, enterprises' clusters were classified into satellitic structure, netlike structure and flatlike structure according to the structure standard. And then according to the Strategic Synergy theory, the causation of enterprises cluster existence was deeply analyzed. In the end, measures for achieving enterprises' cluster synergy domino effect were put forward.
  • 农业
  • . 2005, 23(0504): 47-51.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Non-point pollution is becoming one of the main causes of the degradation of rural environment in China. The status of non-point pollution was evaluated from chemical fertilizer and pesticide application, and the eutrophication of lakes. Excessive input of chemical fertilizer and pesticides, lower use efficiency of fertilizer and irrigation water, fewer treatment of organic manure from livestock husbandry, inadequate extension services and deficit environmental awareness are the reasons responsible for the non-point pollution. The countermeasures were suggested in respective to policy, legislation and technology.
  • . 2005, 23(0504): 52-55.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    According to the practice development of China rural labors moving, and through the game analysis on investigation datum, reasonable nation model and farmers income, the theoretic essence and motive of rural labor moving in China rural areas where informal economy are dominant, were discussed, and the concept of "moving of surplus rural labor" was suggested to replace that of "allocation of rural labor resources".
  • . 2005, 23(0504): 56-59.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    It is estimated that we will enter the bioeconomy era in 2020's. Life science and biotechnology will determine the global economy and society, and then affect the development and destiny of human. Agriculture will become the widest industry filled with biotechnology, and will spread into many areas seemingly unrelated to it. Based on the analyses to the features of the bioeconomy era and to the problems of agricultural development of China, a new agriculture system based on the bio-economy and its current countermeasures were put forward.
  • 工程技术
  • . 2005, 23(0504): 59-61.
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The three-element catalyst CuO- CeO2/γ-Al2O3 was prepared by layering and mixing impregnation method, in which CeO2 was chosen as the aids, γ-Al2O3 as the substrate, CuO as the active component. TD-DTA and XRD was carried out to investigate the effect of Ce on the stability of the substrate and the activated substance, CuO at high temperature. The results showed that the doping of Ce restrained effectively the phase change of substrate from γ-Al2O3 to α-Al2O3 and the formation of CuAl2O4 , which was produced by the reaction between CuO and Al2O3 during the process of wet air oxidation. The degradation experiment of phenol wastewater showed the doping of Ce can improve the activity of catalyst well. The catalyst with Cu∶Ce∶γ-Al2O3=6∶6∶100 (mass percentage) has the highest catalytic activity among them, the COD removal efficiency of which can reach 91.31% in 30 minutes.