Search scope:
排序: Display mode:
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006
Keywords: networks Internet cybersecurity cybersecurity law legal system
Fu Yuhua
Strategic Study of CAE 2003, Volume 5, Issue 6, Pages 55-58
Newton's second law and the law of gravity are summarized with experimental results.For discussing the possibility of deriving the two laws theoretically, according to the law of conservationof energy, the method of deriving improved Newton's second law and the law of gravity at one timeresults suitable for this example with the constant dimension fractal form are as follows: improved lawof gravity F = - GMm/r1.99989 , and improved Newton's second law F = ma1.01458
Keywords: Newton & acute s second law the law of gravity theoretical derivation
Zhijun LI, Zichen DENG
Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2, Pages 111-116 doi: 10.1007/s11709-009-0022-5
Keywords: discrete-time variable structure control composite reaching law chattering effect saturated control law
How did Archimedes discover the law of buoyancy by experiment?
Hidetaka KUROKI
Frontiers of Mechanical Engineering 2016, Volume 11, Issue 1, Pages 26-32 doi: 10.1007/s11465-016-0368-z
Keywords: Archimedes’ principle buoyancy specific gravity Eureka Vitruvius displaced water balance floating body
Fu Sun,Yi Liu
Frontiers of Environmental Science & Engineering 2016, Volume 10, Issue 6, doi: 10.1007/s11783-016-0890-6
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Engineering 2018, Volume 4, Issue 1, Pages 53-60 doi: 10.1016/j.eng.2018.01.004
Keywords: Cybersecurity Knowledge graph Knowledge deduction
DONG Hongwei
Frontiers of Environmental Science & Engineering 2007, Volume 1, Issue 4, Pages 434-442 doi: 10.1007/s11783-007-0069-2
Keywords: law-abiding punishment environmental protection law-breaking enterprise
Enforcing the revised law on energy conservation and promoting the work of energy conservation
Fu Zhihuan
Strategic Study of CAE 2008, Volume 10, Issue 12, Pages 13-16
Keywords: law energy conservation
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords: active defense active immunity trusted computing trusted technology insurance system cybersecurity
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.This paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fieldsof law and regulation, organization framework, operation mode, review approach, and supporting technology
Keywords: cybersecurity review information technology product and service critical information infrastructure
First law-based thermodynamic analysis on Kalina cycle
ZHANG Ying, HE Maogang, JIA Zhen, LIU Xun
Frontiers in Energy 2008, Volume 2, Issue 2, Pages 145-151 doi: 10.1007/s11708-008-0021-6
Keywords: ammonia-water P-R single-stage distillation Peng-Robinson pressure
Erratum to: Industrial water treatment and industrial marine outfalls: Achieving the right balance
Law, Chunyan Tang
Frontiers of Chemical Science and Engineering 2017, Volume 11, Issue 2, Pages 290-290 doi: 10.1007/s11705-017-1639-x
Performance analysis of combined cycle power plant
Nikhil DEV,Rajesh ATTRI
Frontiers in Energy 2015, Volume 9, Issue 4, Pages 371-386 doi: 10.1007/s11708-015-0371-9
Keywords: first-law second-law exergy destruction components
Thoughts on the Law of Automobile Industry Development
Fu Yuwu, Chen Xiumin
Strategic Study of CAE 2019, Volume 21, Issue 3, Pages 98-102 doi: 10.15302/J-SSCAE-2019.03.019
Automobile industry has accumulated numerous worldwide-accepted laws since its emergence over 130 years ago.China's automobile industry is currently facing a strategic opportunity for industrial transformation and upgrading, so it is necessary to strengthen the research on the laws of development for the automobile industry, thus to avoid any impulsive actions. In this paper, nine laws of development are summarized from the aspects of technology, market, and talent, including the complementary relationship between transformation and upgrading, the characteristics of the capital-, technology-, and labor-intensive industry, the inevitable requirements of innovation and collaboration, etc., thus to guide and promote the healthy and sustainable development of the automobile industry in China.
Keywords: automobile industry law of development sustainable development
The New Frontiers of Cybersecurity
Binxing Fang, Kui Ren, Yan Jia
Engineering 2018, Volume 4, Issue 1, Pages 1-2 doi: 10.1016/j.eng.2018.02.007
Title Author Date Type Operation
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Journal Article
Deriving Improved Newton's Second Law and the Law of Gravity at One Time with Form of Fractal Formula
Fu Yuhua
Journal Article
Improving existing “reaching law” for better discrete control of seismically-excited building structures
Zhijun LI, Zichen DENG
Journal Article
China’s Ministry of Environmental Protection Adopted Draft Amendment to the Law on Prevention and Control
Fu Sun,Yi Liu
Journal Article
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Journal Article
Why does environmental compliance cost more than penalty? —A legal analysis on environmental acts of enterprises in China
DONG Hongwei
Journal Article
Enforcing the revised law on energy conservation and promoting the work of energy conservation
Fu Zhihuan
Journal Article
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
First law-based thermodynamic analysis on Kalina cycle
ZHANG Ying, HE Maogang, JIA Zhen, LIU Xun
Journal Article
Erratum to: Industrial water treatment and industrial marine outfalls: Achieving the right balance
Law, Chunyan Tang
Journal Article