Resource Type

Journal Article 619

Conference Videos 31

Year

2023 59

2022 68

2021 68

2020 51

2019 41

2018 37

2017 45

2016 61

2015 36

2014 14

2013 10

2012 10

2011 11

2010 14

2009 7

2008 11

2007 15

2006 5

2005 10

2004 11

open ︾

Keywords

food security 39

sustainable development 20

energy security 19

development strategy 15

China 14

Industry 4.0 11

high-quality development 9

petrochemical industry 9

industry 8

construction industry 7

intelligent manufacturing 7

manufacturing industry 7

automobile industry 6

coal industry 6

cyberspace security 5

security 5

strategy 5

water resource 5

Physical layer security 4

open ︾

Search scope:

排序: Display mode:

Assessment Method of Industrial System Maturity Levels

Wang Liheng, Zhou Zhicheng, Wang Kunsheng, Lu Chunhua, Wang Hainan, Cui Jian, Ma Xuemei

Strategic Study of CAE 2020, Volume 22, Issue 2,   Pages 91-97 doi: 10.15302/J-SSCAE-2020.02.013

Abstract: paper proposes the concept of industrial system maturity level, and introduces a new factor, namely, industrysecurity and controllability level (ISCL), which further comprises the autonomous and controllable abilityand the industry leading ability.emerging industries, this study assessed and analyzed the industrial system maturity levels of 25 emerging industrySpecifically, only the industrial system of the battery electric vehicle industry is in the mature stage

Keywords: industrial system maturity level     strategic emerging industries     assessment method     industry security andcontrollability level (ISCL)    

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Strategic Study of CAE 2016, Volume 18, Issue 4,   Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006

Abstract:

The paper summarizes the development situation and experiences of the Chinese cyberspace securityindustry during the 12th Five-Year Plan, analyzes its new development trends, and proposes policy suggestionsfor the industry development to provide a reference for cyberspace security industry during the 13th

Keywords: cyberspace security     cyberspace security industry     independent and controllable     standards    

Developing coal chemical industry and ensuring national energy security

Xu Yaowu,Xu Liwei,Lu Yongjun

Strategic Study of CAE 2011, Volume 13, Issue 11,   Pages 20-25

Abstract: and practice, expounding the necessity and significance of implementing the strategy of coal chemical industryreplacing oil chemical industry from several respects, summarizes the technical process and market situationof several main coal chemical industry products, and makes comparison and analysis on their competitivenesswater resource and carbon emission that attract much attention during the development of coal chemical industry

Keywords: coal chemical industry     replacement     oil chemical industry     strategy     energy security     advice    

Promoting the Competitiveness of China’s Agricultural Industry in the New Development Stage: From anIndustry Security Perspective

Wu Kongming, Mao Shiping, Xie Linghong, Zhang Lin, Sun Weilin, Zhang Junbiao, Wang Guogang, Chen Yangfen, Wang Xiaojun

Strategic Study of CAE 2022, Volume 24, Issue 1,   Pages 83-92 doi: 10.15302/J-SSCAE-2022.01.025

Abstract:

Promoting the competitiveness of China’s agricultural industryIt becomes urgent to redefine the competitiveness of agricultural industry and propose a correspondingIn this study, we propose a new concept of agricultural industry competitiveness labeled as safe andthree core components: security assurance, industrial control, and market competitiveness; we evaluateof the industry.

Keywords: competitiveness of the agricultural industry     security assurance     industrial control     market competitiveness     industry security    

Analysis and experiment of controllability of magnetorheological fluids based on micro-pipeline

Yongqing SU, Yikuan SONG, Jiguang YUE

Frontiers of Mechanical Engineering 2009, Volume 4, Issue 3,   Pages 339-344 doi: 10.1007/s11465-009-0048-3

Abstract: The controllability of the magneto-rheological fluid (MRF) flowing through a micro-pipeline is analyzedThis paper provides a theoretical proof of the controllability of MRF flowing through the micro-pipeline

Keywords: Magneto-rheological fluids (MRF)     micro-pipeline     coupled model     multi-physics simulation    

Layout of Foreign Industrial Internet Security Industry and Its Enlightenment to China

Li Yangchun, Wang Hailong, Li Yuxiao, Chen Lei, Li Youping

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 112-121 doi: 10.15302/J-SSCAE-2021.02.015

Abstract:

The industrial Internet security industry is crucial for the healthyThe layout of this industry in developed countries and regions is relatively perfect.This study investigates the development demands for the industrial Internet security industry using literatureSubsequently, the current status of industrial Internet security industry layout in the United StatesThe study points out that the optimization of China’s industrial Internet security industry layout

Keywords: industrial Internet security     industrial Internet security industry     industrial layout     balanced development    

Controllability analysis of second-ordermulti-agent systemswith directed andweighted interconnection

Di GUO,Rong-hao ZHENG,Zhi-yun LIN,Gang-feng YAN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 10,   Pages 838-847 doi: 10.1631/FITEE.1500069

Abstract: This article investigates the controllability problem of multi-agent systems.A very simple necessary and sufficient condition regarding the weighting scheme is obtained for the controllability

Keywords: Multi-agent systems     Controllability     Directed tree    

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 46-55 doi: 10.15302/J-SSCAE-2021.02.007

Abstract:

Industrial Internet security is a prerequisite and guarantee for theThis study aims at the future development of the industrial Internet security industry in China.path for the next-generation industrial Internet security industry in China.To explore a sustainable development path suitable for China’s industrial Internet security industryenterprises and organizations should be complemented to construct a healthy development ecosystem; the security

Keywords: industrial Internet security     industry ecosystem     classified protection of cybersecurity     independent    

Strategy for Ensuring China’s Food Security through Planting Industry in the New Era

Han Xinru, Wang Xiudong , Wang Jimin , Yuan Longjiang, Mei Xurong , Wu Kongming

Strategic Study of CAE doi: 10.15302/J-SSCAE-2023.07.034

Abstract:

The planting industry is crucial in ensuring food security in China.The development of the planting industry has underpinned the country’s historic transitionregarding food security and proposes strategic ideas and policy recommendations for ensuring foodsecurity in the new era.crises, thereby enhancing the level of agricultural development and effectively ensuring food security

Keywords: planting industry     food security strategy     supply and demand forecast     ensuring grain supply    

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Strategic Study of CAE 2019, Volume 21, Issue 3,   Pages 108-113 doi: 10.15302/J-SSCAE-2019.03.006

Abstract: Meanwhile, multiple risks are also brought to information security by intelligentization and networkingIn recent years, hacker attacks frequently occur, and information security not only affects driving safetyand user data safety, but also threatens national security when being damaged.So, information security issues have attracted great attention from governments all over the world.In this context, China should promote the development and management of the information security of the

Keywords: intelligent connected vehicles     information security     automotive industry     management    

Suggestions on the upgrading of Chinese coal industry and the exploration of energy resources

Wang An

Strategic Study of CAE 2009, Volume 11, Issue 10,   Pages 143-147

Abstract:

To improve technological level of coal industry and transform means ofcoal production growth, is not only a necessity for the healthy development of coal industry, but alsoa key to improve China's energy supply and ensure energy security.The future direction for coal industry upgrading mainly lies in structural optimization and technologicalIt is suggested that Chinese government should expedite the promulgation of industry policies as well

Keywords: coal industry upgrading     energy security     Shendong pattern     industry policies     recovery rate of resources    

Assistance by Internet Service Providers: Suggestions on the Amendment of Article 27 of the Network Security

Cui Congcong,Li Yuxiao and Han Song

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 34-38 doi: 10.15302/J-SSCAE-2016.06.007

Abstract: Internet service providers should gather data under encryption by users on the basis of the principles of controllability

Keywords: obligation of decryption assistance     principle of necessity     principle of proportionality     principle of controllability    

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015

Abstract: Traditional software security methods can only counter the threat temporarily, and cannot eliminate essentialThis paper proposes a scheme of combining software diversity with mimic defense in the software securityindustry.

Keywords: software diversity     mimic defense     software security product    

Controllability of Boolean control networks with multiple time delays in both states and controls Research Article

Yifeng LI, Lan WANG,liyifeng@cqnu.edu.cn,wanglan202212@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 906-915 doi: 10.1631/FITEE.2200618

Abstract: In this paper, the problem of of (BCNs) with multiple s in both states and controls is investigated. First, the problem of BCNs with multiple s in controls is considered. For this problem, a matrix is constructed by defining a new product of matrices, based on which a necessary and sufficient condition is obtained. Then, the of BCNs with multiple s in states is studied by giving a necessary and sufficient condition. Subsequently, based on these results, a matrix for BCNs with multiple s in both states and controls is proposed that provides a concise condition. Finally, two examples are given to illustrate the main results.

Keywords: Boolean control networks     Semi-tensor product of matrices     Controllability     Time delay    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract: Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasinglyabroad as well as security system and standards.It sorts out the development status of cyberspace security protection systems in the rail transit industryin the rail transit industry.for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Title Author Date Type Operation

Assessment Method of Industrial System Maturity Levels

Wang Liheng, Zhou Zhicheng, Wang Kunsheng, Lu Chunhua, Wang Hainan, Cui Jian, Ma Xuemei

Journal Article

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Journal Article

Developing coal chemical industry and ensuring national energy security

Xu Yaowu,Xu Liwei,Lu Yongjun

Journal Article

Promoting the Competitiveness of China’s Agricultural Industry in the New Development Stage: From anIndustry Security Perspective

Wu Kongming, Mao Shiping, Xie Linghong, Zhang Lin, Sun Weilin, Zhang Junbiao, Wang Guogang, Chen Yangfen, Wang Xiaojun

Journal Article

Analysis and experiment of controllability of magnetorheological fluids based on micro-pipeline

Yongqing SU, Yikuan SONG, Jiguang YUE

Journal Article

Layout of Foreign Industrial Internet Security Industry and Its Enlightenment to China

Li Yangchun, Wang Hailong, Li Yuxiao, Chen Lei, Li Youping

Journal Article

Controllability analysis of second-ordermulti-agent systemswith directed andweighted interconnection

Di GUO,Rong-hao ZHENG,Zhi-yun LIN,Gang-feng YAN

Journal Article

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Journal Article

Strategy for Ensuring China’s Food Security through Planting Industry in the New Era

Han Xinru, Wang Xiudong , Wang Jimin , Yuan Longjiang, Mei Xurong , Wu Kongming

Journal Article

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Journal Article

Suggestions on the upgrading of Chinese coal industry and the exploration of energy resources

Wang An

Journal Article

Assistance by Internet Service Providers: Suggestions on the Amendment of Article 27 of the Network Security

Cui Congcong,Li Yuxiao and Han Song

Journal Article

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Journal Article

Controllability of Boolean control networks with multiple time delays in both states and controls

Yifeng LI, Lan WANG,liyifeng@cqnu.edu.cn,wanglan202212@126.com

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article