Key Technology Development Priorities for the Oil Refinery Sector in Russia

2020 ◽  
Vol 93 (9) ◽  
pp. 1314-1325
Author(s):  
O. V. Zhdaneev ◽  
V. V. Korenev ◽  
A. S. Rubtsov
2012 ◽  
Vol 433-440 ◽  
pp. 2498-2503
Author(s):  
Quan Bo Yuan ◽  
Feng Juan Qu ◽  
Hui Zhao ◽  
Li Yuan Liu

At present,Chinese third-generation communications technology (3G) has been applied, and global internet of things technology development has been put on the agenda. The fourth-generation communication technology will be discussed based on the wireless communication field, mainly introducing the development situation of fourth-generation communication system. In the paper, the key technology will be discussed in detail, and is involved in domestic network development. Finally, the fourth-generation communication technology in the network is prospected.


2014 ◽  
Vol 697 ◽  
pp. 280-284 ◽  
Author(s):  
Qi Chen ◽  
Yu Cai Zhao ◽  
Jian Bo Yin ◽  
Yun Bo Ma

Automated Mechanical Transmission achieves automatic shifting by applying electronic control technology in traditional dry clutch and Manual Transmission,not only having the advantages of automatic transmission, but also keeping the performance of the original manual transmission. This paper generally introduces the function and performance characteristics of Automated Mechanical Transmission, and elaborates its system structure, working principle and key technology. The key technology is divided into 4 parts, including Electronic Control System, Clutch Control, Shift Strategy and Design and Optimization of the Actuator. Combining with the related companies' research and development products, the performance of the Automated Mechanical Transmission is further analyzed. At the same time, according to the current research status in the world, putting forward the following research focus and development trend of Automated Mechanical Transmission.Keywords: Automated Mechanical Transmission; Key Technology; Development Trend


Heliyon ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. e03300 ◽  
Author(s):  
Jean De Dieu Niyonteze ◽  
Fumin Zou ◽  
Godwin Norense Osarumwense Asemota ◽  
Samuel Bimenyimana ◽  
Gilbert Shyirambere

2015 ◽  
Vol 727-728 ◽  
pp. 911-914
Author(s):  
Wei Zhao ◽  
Fang Yun Li

electronic communicationtechnology today belong to a sophisticatedand highly applied technology, thekey technology development level and theprogress of a country's level ofelectronic communication technology.Electronic communication industry is a partof information industryindispensable, progress and the development ofelectronic communication technology to directly drive the advanced productiveforces and the strength of science and technology. The field and scope ofelectronic communication technology widely, especially prominent in two aspectsof mobile phone and satellite communications, this article will also throughthese two aspects to analyze the key technology of electronic communicationsystem problem.


Author(s):  
Pothumani.Parvathi Et. al.

: Honey pot technology is a trap technology in network defence. It studies and learns the adversary’s attacks by attracting and deceiving attackers and recording their attack behaviours. Target and attack methods to protect real service resources. However, traditional honey pot technology has inherent shortcomings such as static configuration and fixed deployment, and it is very easy to be attacked. Attacker identification bypasses and loses decoy value. Therefore, how to improve the dynamic and deceptive nature of honey pots has become a key issue in the field of honey pots. This paper is the research results in the field of honey pots at home and abroad are sorted out. First, the development history of honey pots is summarized. Then, the key technology of honey pots is the core, and the implementation process, department. It analyzes the method of signature, anti-identification thinking, and the theoretical basis of game; finally, it classifies and narrates the defence results of different honey pots in recent years, and develops the honey pot technology. Development trends are analyzed and stated, aiming at potential security threats, and looking forward to defence applications in emerging areas. In this paper, novel AES algorithm has been developed. In addition key management feature is added which provides more secure for registered users.


2013 ◽  
Vol 756-759 ◽  
pp. 1930-1932
Author(s):  
Ying Chun Liu

With the increase in the number of online payment, online payment system, the problems exposed, and with the use of the promotion and hacking technology development, the key technology of the online payment system proposed higherrequirements. One of the most important core key technical issues is the security issue.


2016 ◽  
Vol 13 (11) ◽  
pp. 70-90 ◽  
Author(s):  
Juan Wang ◽  
Yuan Shi ◽  
Guojun Peng ◽  
Huanguo Zhang ◽  
Bo Zhao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document