Resource Type

Journal Article 53

Year

2023 3

2022 3

2021 4

2020 1

2019 5

2018 4

2017 2

2016 8

2015 4

2013 1

2012 3

2011 3

2010 1

2009 1

2008 3

2007 3

2006 1

2005 1

2003 2

open ︾

Keywords

cybersecurity 3

evolution law 3

active defense 2

industrial Internet security 2

numerical manifold method 2

3-D cracks 1

Adaptive control law 1

Archimedes’ principle 1

BeiDou navigation satellite system 1

Beyond-CMOS devices 1

Brazilian legislation 1

CTNBio 1

China / law / early warning system and national crop pest monitoring / pest management / regulation and sustainable agricultural development 1

Chunguang Oilfield 1

Cybersecurity 1

Dalton’s partial pressure law 1

Energy-efficient computing 1

Eureka 1

Event-based feedback controller 1

open ︾

Search scope:

排序: Display mode:

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006

Abstract: Communist Party of China, there is still a large gap between the law and development of cybersecurityBased on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecuritylegislation and improve the legal system, particularly in order to enact cybersecurity law, e-commerciallaw, administrative law for cyber information service, personal information protection law, e-governmentlaw, information and telecommunication network law, and administrative law for cyber society, supported

Keywords: networks     Internet     cybersecurity     cybersecurity law     legal system    

Deriving Improved Newton's Second Law and the Law of Gravity at One Time with Form of Fractal Formula

Fu Yuhua

Strategic Study of CAE 2003, Volume 5, Issue 6,   Pages 55-58

Abstract:

Newton's second law and the law of gravity are summarized with experimental results.For discussing the possibility of deriving the two laws theoretically, according to the law of conservationof energy, the method of deriving improved Newton's second law and the law of gravity at one timeresults suitable for this example with the constant dimension fractal form are as follows: improved lawof gravity F = - GMm/r1.99989 , and improved Newton's second law F = ma1.01458

Keywords: Newton & acute     s second law     the law of gravity     theoretical derivation    

Improving existing “reaching law” for better discrete control of seismically-excited building structures

Zhijun LI, Zichen DENG

Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2,   Pages 111-116 doi: 10.1007/s11709-009-0022-5

Abstract: In this paper, a novel “composite reaching law” was explained in details: 1) the equation of discreteThe results of numerical example analysis of the model show that the control law can effectively reduce

Keywords: discrete-time variable structure control     composite reaching law     chattering effect     saturated control law    

How did Archimedes discover the law of buoyancy by experiment?

Hidetaka KUROKI

Frontiers of Mechanical Engineering 2016, Volume 11, Issue 1,   Pages 26-32 doi: 10.1007/s11465-016-0368-z

Abstract: water measurement of golden crown is impossible, and at his Eureka moment, Archimedes discovered the lawHe did not find the law of buoyancy but rather specific gravity of things at the moment.Through these measurements, he reached the discovery of the law of buoyancy directly by experiment.

Keywords: Archimedes’ principle     buoyancy     specific gravity     Eureka     Vitruvius     displaced water     balance     floating body    

China’s Ministry of Environmental Protection Adopted Draft Amendment to the Law on Prevention and Control

Fu Sun,Yi Liu

Frontiers of Environmental Science & Engineering 2016, Volume 10, Issue 6, doi: 10.1007/s11783-016-0890-6

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Engineering 2018, Volume 4, Issue 1,   Pages 53-60 doi: 10.1016/j.eng.2018.01.004

Abstract: it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurityin order to construct a cybersecurity knowledge base.This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model.Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge baseStanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity

Keywords: Cybersecurity     Knowledge graph     Knowledge deduction    

Why does environmental compliance cost more than penalty? —A legal analysis on environmental acts of enterprises in China

DONG Hongwei

Frontiers of Environmental Science & Engineering 2007, Volume 1, Issue 4,   Pages 434-442 doi: 10.1007/s11783-007-0069-2

Abstract: In the environmental protection field of China, due to lower law-breaking cost but higher law-abidingcost , it is a common case that the enterprise chooses to break through the law on purpose.

Keywords: law-abiding     punishment     environmental protection     law-breaking     enterprise    

Enforcing the revised law on energy conservation and promoting the work of energy conservation

Fu Zhihuan

Strategic Study of CAE 2008, Volume 10, Issue 12,   Pages 13-16

Abstract: fast and its utilizing efficiency is low, which is an issue standing out relatively, thus the prior lawwhole society, the Standing Committee of National People's Congress enacted the amendment of the lawThis article introduces the fundamental conceptions and main contents of the revised law, together with

Keywords: law     energy     conservation    

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract:

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.This paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fieldsof law and regulation, organization framework, operation mode, review approach, and supporting technology

Keywords: cybersecurity review     information technology product and service     critical information infrastructure    

First law-based thermodynamic analysis on Kalina cycle

ZHANG Ying, HE Maogang, JIA Zhen, LIU Xun

Frontiers in Energy 2008, Volume 2, Issue 2,   Pages 145-151 doi: 10.1007/s11708-008-0021-6

Abstract: Based on the first law of thermodynamics, and adopting the Peng-Robinson equation (P-R equation) as the

Keywords: ammonia-water     P-R     single-stage distillation     Peng-Robinson     pressure    

Erratum to: Industrial water treatment and industrial marine outfalls: Achieving the right balance

Law, Chunyan Tang

Frontiers of Chemical Science and Engineering 2017, Volume 11, Issue 2,   Pages 290-290 doi: 10.1007/s11705-017-1639-x

Performance analysis of combined cycle power plant

Nikhil DEV,Rajesh ATTRI

Frontiers in Energy 2015, Volume 9, Issue 4,   Pages 371-386 doi: 10.1007/s11708-015-0371-9

Abstract: of pressure ratio, turbine inlet temperature and ambient relative humidity on the first and second law

Keywords: first-law     second-law     exergy destruction     components    

Thoughts on the Law of Automobile Industry Development

Fu Yuwu, Chen Xiumin

Strategic Study of CAE 2019, Volume 21, Issue 3,   Pages 98-102 doi: 10.15302/J-SSCAE-2019.03.019

Abstract:

Automobile industry has accumulated numerous worldwide-accepted laws since its emergence over 130 years ago.China's automobile industry is currently facing a strategic opportunity for industrial transformation and upgrading, so it is necessary to strengthen the research on the laws of development for the automobile industry, thus to avoid any impulsive actions. In this paper, nine laws of development are summarized from the aspects of technology, market, and talent, including the complementary relationship between transformation and upgrading, the characteristics of the capital-, technology-, and labor-intensive industry, the inevitable requirements of innovation and collaboration, etc., thus to guide and promote the healthy and sustainable development of the automobile industry in China.

Keywords: automobile industry     law of development     sustainable development    

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Engineering 2018, Volume 4, Issue 1,   Pages 1-2 doi: 10.1016/j.eng.2018.02.007

Title Author Date Type Operation

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Journal Article

Deriving Improved Newton's Second Law and the Law of Gravity at One Time with Form of Fractal Formula

Fu Yuhua

Journal Article

Improving existing “reaching law” for better discrete control of seismically-excited building structures

Zhijun LI, Zichen DENG

Journal Article

How did Archimedes discover the law of buoyancy by experiment?

Hidetaka KUROKI

Journal Article

China’s Ministry of Environmental Protection Adopted Draft Amendment to the Law on Prevention and Control

Fu Sun,Yi Liu

Journal Article

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Journal Article

Why does environmental compliance cost more than penalty? —A legal analysis on environmental acts of enterprises in China

DONG Hongwei

Journal Article

Enforcing the revised law on energy conservation and promoting the work of energy conservation

Fu Zhihuan

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

First law-based thermodynamic analysis on Kalina cycle

ZHANG Ying, HE Maogang, JIA Zhen, LIU Xun

Journal Article

Erratum to: Industrial water treatment and industrial marine outfalls: Achieving the right balance

Law, Chunyan Tang

Journal Article

Performance analysis of combined cycle power plant

Nikhil DEV,Rajesh ATTRI

Journal Article

Thoughts on the Law of Automobile Industry Development

Fu Yuwu, Chen Xiumin

Journal Article

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Journal Article