期刊文献+
共找到11,087篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 personal information protection Law Privacy security Privacy protection will
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
2
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights personal information protection Law dependency protection
原文传递
Developing a Comprehensive Regime for Personal Information Protection in Networked Chinese Public Sectors
3
作者 Xiaomi An Shuyang Sun Wenlin Bai Bin Zhang Xiaoyu Huang Hepu Deng 《Management Studies》 2015年第1期13-20,共8页
关键词 管理学 管理学理论 管理技术 管理方法
下载PDF
Privacy,National Security,and Internet Economy:An Explanation of China's Personal Information Protection Legislation
4
作者 曲博 霍昶旭 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期339-366,共28页
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc... With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation. 展开更多
关键词 LEGISLATION personal information protection national security internet industry PRIVACY cybersecurity law
原文传递
FedNRM:A Federal Personalized News Recommendation Model Achieving User Privacy Protection
5
作者 Shoujian Yu Zhenchi Jie +2 位作者 Guowen Wu Hong Zhang Shigen Shen 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1729-1751,共23页
In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the ... In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users. 展开更多
关键词 News recommendation federal learning privacy protection personalized attention
下载PDF
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
6
作者 Sami Saad Alsemairi 《Intelligent Information Management》 2023年第4期259-283,共25页
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ... In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors. 展开更多
关键词 Cybersecurity Policies COMPLIANCE protection information and Technology Assets
下载PDF
A Method to Improve the Accuracy of Personal Information Detection
7
作者 Chih-Chieh Chiu Chu-Sing Yang Ce-Kuen Shieh 《Journal of Computer and Communications》 2023年第6期131-141,共11页
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat... It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. . 展开更多
关键词 Data Leakage PRIVACY personal information Factors
下载PDF
On the Expansion and Realization of the Right to Environmental Information in Environmental Protection Supervision
8
作者 吴昂 HU Liang 《The Journal of Human Rights》 2023年第2期307-327,共21页
As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environment... As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information. 展开更多
关键词 right to environmental information environmental protection supervision public participation information disclosure
原文传递
Why The Constitution Should Protect Personal Credit Information?——An Approach of Right Argumentation
9
作者 李艺 SU Yilon 《The Journal of Human Rights》 2023年第2期328-346,共19页
Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in t... Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests. 展开更多
关键词 right to personal credit information constitutional rights social and economic rights property rights
原文传递
On the “Reasonable” Handling of Personal Information Disclosed According to the Law
10
作者 赵艺 杨洁 SU Yilong 《The Journal of Human Rights》 2023年第1期182-211,共30页
The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy r... The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases. 展开更多
关键词 personal information that has been disclosed legal disclosure of personal information reasonable scope holism theory dynamic system
原文传递
Experimentation with Personal Identifiable Information 被引量:3
11
作者 Sabah Al-Fedaghi Abdul Aziz Rashid Al-Azmi 《Intelligent Information Management》 2012年第4期123-133,共11页
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua... In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others. 展开更多
关键词 personal Identifiable information PUBLIC Policy ISSUES PRIVACY Sensitivity
下载PDF
The Information Protection in Automatic Reconstruction of Not Continuous Geophysical Data Series 被引量:1
12
作者 Osvaldo Faggioni 《Journal of Data Analysis and Information Processing》 2019年第4期208-227,共20页
We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the infor... We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling &#8711Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories). 展开更多
关键词 Geomatic GEOMAGNETISM Not Continuous DATA SERIES Synthetic RECONSTRUCTION protection of the PHYSIC informations DATA Manipulation
下载PDF
Decentralized Mobile SNS Architecture and Its Personal Information Management Mechanism 被引量:2
13
作者 LIU Zhihan YUAN Quan LIU Lu 《China Communications》 SCIE CSCD 2016年第2期189-199,共11页
Mobile SNS is one of the most popular topics of mobile Internet.In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources,the... Mobile SNS is one of the most popular topics of mobile Internet.In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources,the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios,the system makes use of the existent specification of FOAF(Friendof-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites.Ticket-based Access Authorization System(TAAS) is provided to grant permission to acquire resources on personal portal.Meanwhile,the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios. 展开更多
关键词 SNS系统 个人信息 管理机制 移动 架构 分布式 用户需求 用户配置文件
下载PDF
Protection Performance Evaluationof the Respirators and PersonalExposure Measurement in aBelgian Viscose Rayon Factory
14
作者 Tan Xiaodong Michel Vanhoorne Marleen VanRisseghem(Dept. of Public Health Hubei Medical University. Wuhan 430071, China)(Dept. of Public Health University of Gent. Bent. B-9000. Belgium) 《Wuhan University Journal of Natural Sciences》 CAS 1998年第4期491-494,共4页
This paper presents the evaluation results of protective performance of the respirators(full face supplied-fresh air respirators and half-mask active charcoal filter) and personal exposure measurement (Infacepiece sam... This paper presents the evaluation results of protective performance of the respirators(full face supplied-fresh air respirators and half-mask active charcoal filter) and personal exposure measurement (Infacepiece sampling) in a Belgian viscose rayon factory. With in-facepiece sampling technique and personal sampling method, we measured the CS2 concentrations inside and outside of the dirferent respirators. We found two kinds of the respirators have significant effect on decreasing the CS2, exposure level for the subject,especially for the spinners. Full face supplied-fresh air respirator have good protective effect for the spinners and have limit protection for the high exposure Job although the PF value is more than 10. It still need to improve more. In-facepiece sampling for all the subjects exposed to CS2, in the factory found most subjects have exposed to low CS2, concentration, most exposure levels were under the control range, but sulfuror are high exposure, the exposure level is higher than ACGIH TLV value. 展开更多
关键词 carbon DISULFIDE personal exposure protection factor RESPIRATOR industrial hygiene
下载PDF
Ideas of establishing the information system for emergence decisions on the protection against earthquakes and disaster reduction in cities (application of GIS)
15
作者 宋俊高 朱元清 +1 位作者 严大华 夏从俊 《Acta Seismologica Sinica(English Edition)》 CSCD 1998年第2期112-121,共10页
Ideasofestablishingtheinformationsystemforemergencedecisionsontheprotectionagainstearthquakesanddisasterredu... Ideasofestablishingtheinformationsystemforemergencedecisionsontheprotectionagainstearthquakesanddisasterreductionincities(... 展开更多
关键词 Geographical information System\ protection AGAINST EARTHQUAKE and DISASTER REDUCTION evaluation of EARTHQUAKE DISASTER loss\ emergency decision
下载PDF
Information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City──Application of GIS
16
作者 宋俊高 朱元清 +2 位作者 火恩杰 严大华 杨挺 《Acta Seismologica Sinica(English Edition)》 CSCD 2000年第4期454-465,共12页
For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on t... For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to "the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)". We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system. 展开更多
关键词 Geographical information System (GIS) protection AGAINST EARTHQUAKE and disaster reduction evaluation of EARTHQUAKE damage loss EMERGENCE DECISION
下载PDF
The personal protective equipment(PPE)based on individual combat:A systematic review and trend analysis 被引量:1
17
作者 Qian-ran Hu Xing-yu Shen +2 位作者 Xin-ming Qian Guang-yan Huang Meng-qi Yuan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期195-221,共27页
With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce ... With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce casualties and maintain military combat effectiveness,is widely developed.This paper systematically reviewed various PPE based on individual combat through literature research and comprehensive discussion,and introduced in detail the latest application progress of PPE in terms of material and technology from three aspects:individual integrated protection system,traditional protection equipment,and intelligent protection equipment,respectively,and discussed in depth the functional improvement and optimization status brought by advanced technology for PPE,focusing on the achievements of individual equipment technology application.Finally,the problems and technical bottlenecks in the development of PPE were analyzed and summarized,and the development trend of PPE were pointed out.The results of the review will provide a forward-looking reference for the current development of individual PPE,and are important guidance for the design and technological innovation of advanced equipment based on the future technological battlefield. 展开更多
关键词 personal protective equipment(PPE) Individual combat Material and structure Equipment application Intelligent devices Wearable technology
下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
18
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 PSEUDORANDOM SEQUENCES NON-LINEAR FEEDBACK FUNCTION information protection
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
19
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
Lightning Protection for the Computer Room of Electronic Information Systems
20
作者 Xuanying XIE Yiping LIN +1 位作者 Liqing ZHOU Liwen YE 《Meteorological and Environmental Research》 CAS 2022年第3期71-73,共3页
An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, an... An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed. 展开更多
关键词 Electronic information system Lightning protection grounding Grounding design
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部