期刊文献+
共找到361,370篇文章
< 1 2 250 >
每页显示 20 50 100
The Eight Stages of Psychosocial Protective Development: Developmental Psychology 被引量:1
1
作者 Dingyu Chung 《Journal of Behavioral and Brain Science》 2018年第6期369-398,共30页
The proposed universal psychological mechanism for developmental psychology is the mental protective system whose different parts emerge and mature in the eight different stages of psychosocial protective development ... The proposed universal psychological mechanism for developmental psychology is the mental protective system whose different parts emerge and mature in the eight different stages of psychosocial protective development under different social interactions. The proposed eight stages of psychosocial protective development are childhood (infancy, toddlerhood, pre-juvenile age, and juvenile age), adolescence, early young adulthood, late young adulthood, early middle adulthood, late middle adulthood, early late adulthood, and late late adulthood. The mental protection system consists of four socialities (collectivistic, individualistic, interdependent, and generativity), three worldviews (territorial, competitive, and cooperative), and the mental immune system for four regulated and unregulated countermeasures (hyperactivity, phobia, comforter, and rationality) against adversities. During childhood, dependent children have collectivistic sociality under the protection of committed parents and territorial worldview with the boundary of family. Children start with the unregulated mental immune system without delayed gratification due to mental immaturity, and gradually acquire the regulated mental immune system with delayed gratification through mental maturity. Adolescents transit to adulthood. Independent adults have the regulated metal immune system, individualistic sociality with reciprocity, and competitive-cooperative worldviews without boundary. After the age of 50, older people as elder leaders-mentors develop generativity sociality to protect next generation. The paper shows that the mental protective system as the universal psychological mechanism for developmental psychology explains clearly psychosocial protective development, the human evolution, the Piaget’s cognitive development, the Erikson’s psychosocial (ego-social) development, the Confucius’ (educated person’s) six milestones of life, and parent-child relation in the Abrahamic religions (Judaism, Christianity, and Islam) and Confucianism. 展开更多
关键词 DEVELOPMENTAL Psychology Mental Protection System Universal Psychological Mechanism PSYCHOSOCIAL protective DEVELOPMENT DEVELOPMENTAL STAGES Brain Human Evolution Jean Piaget. Erik ERIKSON Confucius Abrahamic RELIGIONS Confucianism
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
RECIPROCALLY TOPOGRAPHIC PROJECTIONS BETWEEN THE OPTIC TECTUM AND NUCLEUS ISTHMI IN THE TOAD 被引量:1
3
作者 王荫亭 颜坤 王书荣 《Chinese Science Bulletin》 SCIE EI CAS 1983年第1期139-140,共2页
关键词 In this letter neuronal projections BETWEEN the TOAD (Bufo BUFO gargarizans) optic toctum and nucleus isthmi (NI) are studied by means of horseradish peroxidase (HRP) method and HRP-labeled tectal and isthmic cells are classified.After surgical operation the animal was fixed in a stereotaxic apparatus. HRP (Sigma VI) was iontophorezed into different sites over superficial layers of the tectum in 53 TOADS and throughout NI in 13 TOADS one injection each animal. After their survival of 28 days at 1620 using HRP histochemical method the injected and labeled sites as well as the morphology of the labeled cells were shown.The results indicate that reciprocally topographic projections exist BETWEEN the TOAD optictectum and its ipsilateral NI i. e. an isthmic
原文传递
Origin of Magnetic Fields of Stellar Objects in the Universe Based on the 5D Projection Theory
4
作者 Peter C. W. Fung K. W. Wong 《Journal of Modern Physics》 2017年第4期668-746,共79页
Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D p... Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D &otimes;1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?&minus;?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6). 展开更多
关键词 5D Projection Theory Fermats Last Theorem Perelmans Mappings Self-Rotation Dipolar MAGNETIC FIELD of Stars LAWS of STELLAR Magnetism LAWS of STELLAR Angular Momentum MAGNETIC Bodes Law NON-EXISTENCE of Gravitational Singularity Semion State of Atoms in STELLAR Surface MAGNETIC Storm Planetary MAGNETIC FIELD Maxwell Equations at 4D-5D Boundary MAGNETIC Fields of the Trappist-1 System
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
5
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Protective effects of panax notoginseng saponin on dextran sulfate sodium-induced colitis in rats through phosphoinositide-3-kinase protein kinase B signaling pathway inhibition 被引量:5
6
作者 Qing-Ge Lu Li Zeng +4 位作者 Xiao-Hai Li Yu Liu Xue-Feng Du Guo-Min Bai Xin Yan 《World Journal of Gastroenterology》 SCIE CAS 2020年第11期1156-1171,共16页
BACKGROUND Intestinal inflammation is a common digestive tract disease, which is usually treated with hormone medicines. Hormone medicines are effective to some extent, but long-term use of them may bring about many c... BACKGROUND Intestinal inflammation is a common digestive tract disease, which is usually treated with hormone medicines. Hormone medicines are effective to some extent, but long-term use of them may bring about many complications.AIM To explore the protective effects of panax notoginseng saponin(PNS) against dextran sulfate sodium(DSS)-induced intestinal inflammatory injury through phosphoinositide-3-kinase protein kinase B(PI3K/AKT) signaling pathway inhibition in rats.METHODS Colitis rat models were generated via DSS induction, and rats were divided into control(no modeling), DSS, DSS + PNS 50 mg/k, and DSS + PNS 100 mg/kg groups. Then, the intestinal injury, oxidative stress parameters, inflammatory indices, tight junction proteins, apoptosis, macrophage polarization, and TLR4/AKT signaling pathway in colon tissues from rats in each of the groups were detected. The PI3 K/AKT signaling pathway in the colon tissue of rats was blocked using the PI3K/AKT signaling pathway inhibitor, LY294002.RESULTS Compared with rats in the control group, rats in the DSS group showed significantly shortened colon lengths, and significantly increased disease activity indices, oxidative stress reactions and inflammatory indices, as well as significantly decreased expression of tight junction-associated proteins. In addition, the DSS group showed significantly increased apoptotic cell numbers,and showed significantly increased M1 macrophages in spleen and colon tissues.They also showed significantly decreased M2 macrophages in colon tissues, as well as activation of the PI3K/AKT signaling pathway(all P < 0.05). Compared with rats in the DSS group, rats in the DSS + PNS group showed significantly lengthened colon lengths, decreased disease activity indices, and significantly alleviated oxidative stress reactions and inflammatory responses. In addition, this group showed significantly increased expression of tight junction-associated proteins, significantly decreased apoptotic cell numbers, and significantly decreased M1 macrophages in spleen and colon tissues. This group further showed significantly increased M2 macrophages in colon tissues, and significantly suppressed activation of the PI3K/AKT signaling pathway, as well as a dose dependency(all P < 0.05). When the PI3K/AKT signaling pathway was inhibited, the apoptosis rate of colon tissue cells in the DSS + LY294002 group was significantly lower than that of the DSS group(P < 0.05).CONCLUSION PNS can protect rats against DSS-induced intestinal inflammatory injury by inhibiting the PI3K/AKT signaling pathway, and therefore may be potentially used in the future as a drug for colitis. 展开更多
关键词 Panax notoginseng SAPONIN Phosphoinositide-3-kinase protein KINASE B signaling pathway Dextran sulfate sodium COLITIS Rat intestine protective effect
下载PDF
The Mental Protection System for Protective Behaviors: The Social Brain and the Mental Immune System
7
作者 Dingyu Chung 《Journal of Behavioral and Brain Science》 2018年第1期31-55,共25页
The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires ... The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires the protective social groups for vulnerable social members-functions and the protective instinctive mental countermeasures against adversities such as hardship, danger, and unfamiliarity-uncertainty. As a result, this paper proposes that the mental protection system of the body consists of the social brain to set up the protective social groups for vulnerable social members-functions and the mental immune system to produce the protective mental countermeasures against adversities. This paper proposes that from the social brain, the protective social groups include alliance group for vulnerable individuals, kinship-friendship group for vulnerable children, interdependent specialists group for vulnerable pregnant females, territorial group for social boundary, connective group for social connection, and competitive group for social competition. From the mental immune system, the mental protective countermeasures include comforter against hardship, hyperactivity against danger, phobia against unfamiliarity-uncertainty, and rationality against unfamiliarity-uncertainty. The overactive mental immune system causes mental allergies and auto immune diseases as personality-mental disorders against ubiquitous harmful and harmless perceived adversities, correlating to physical allergies and auto immune diseases against ubiquitous harmful and harmless detected invaders. The mental protection system also produces personality traits, social moralities, social organizations, social systems, religions, and cultures as described in this paper. The mental protective system is the source of protective behaviors. 展开更多
关键词 MENTAL Protection SYSTEM SOCIAL Brain MENTAL Immune SYSTEM Big Five PERSONALITY TRAITS SOCIAL SYSTEM TRAITS PERSONALITY Disorders Psychotherapy Religions Western Culture Eastern Culture protective BEHAVIORS
下载PDF
Advancement in Wide Area Monitoring Protection and Control Using PMU’s Model in MATLAB/SIMULINK
8
作者 Waheed Ur Rahman Muhammad Ali +7 位作者 Amjad Ullah Hafeez Ur Rahman Majid Iqbal Haseeb Ahmad Adnan Zeb Zeeshan Ali M. Ahsan Shahzad Beenish Taj 《Smart Grid and Renewable Energy》 2012年第4期294-307,共14页
A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power system... A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station. 展开更多
关键词 WIDE Area MONITORING Protection and CONTROL (WAMPAC) Phasor Measurement uNit (PMU) WIDE Area MONITORING (WAM) Global Positioning System (GPS) WIDE Area CONTROLLER (WAC) Local Area CONTROLLER (LAC) Phase Angle MONITORING (PAM) Automatic Generation CONTROL (AGC) Circuit Breaker (CB) Current TRANSFORMERS (CTs) Potential TRANSFORMERS (PTs)
下载PDF
中日共犯问题比较研究概说 被引量:17
9
作者 李洁 《现代法学》 CSSCI 北大核心 2005年第3期108-114,共7页
共同犯罪作为一种对社会危害显著的社会法律现象,历来都是各国立法、司法和理论界关注的重心之一。对于如何界定共同犯罪的成立条件,如何处罚共同犯罪中的参与者,各国立法和理论各不相同。基于社会危害性这一犯罪观,我国共犯制度的设定... 共同犯罪作为一种对社会危害显著的社会法律现象,历来都是各国立法、司法和理论界关注的重心之一。对于如何界定共同犯罪的成立条件,如何处罚共同犯罪中的参与者,各国立法和理论各不相同。基于社会危害性这一犯罪观,我国共犯制度的设定目的是要解决多人共同实行某种刑法所规定的犯罪行为时,将哪些参与者作为犯罪人,在犯罪中所起作用不同的行为人,如何使其承担与其地位与作用相当的刑事责任问题;日本共犯制度设定则以“构成要件”为中心,重视共犯与正犯的区别,如何解决共犯者的犯罪成立条件是其核心课题。这种不同取决于两国刑法所选择的价值取向上的不同,我国的共犯制度倾向于保护价值,而日本倾向于保障人权。 展开更多
关键词
下载PDF
介入放射学中工作人员的辐射防护与安全 被引量:9
10
作者 郁鹏 尉可道 +3 位作者 燕树林 程玉玺 刘澜涛 李田昌 《中国医学装备》 2005年第4期13-16,共4页
目的对介入诊疗中工作人员辐射防护与安全的主要影响因素进行测定与研究,对相关影像因素的特点加以探讨。方法分别测定影像增强器照射野的大小、管球角度改变、冠脉造影中不同手术体位对受检者和第一术者体表入射剂量的影响,对介入诊疗... 目的对介入诊疗中工作人员辐射防护与安全的主要影响因素进行测定与研究,对相关影像因素的特点加以探讨。方法分别测定影像增强器照射野的大小、管球角度改变、冠脉造影中不同手术体位对受检者和第一术者体表入射剂量的影响,对介入诊疗中重要站立区域的辐射剂量进行测定与评价,测定和研究介入诊疗区域内辐射场的分布情况。结果成功测量各主要影响因素的相关数值。结论影像增强器照射野越大,受检者所受剂量越小,影像增强器照射野的改变对第一术者所受剂量的影响无明显规律。对第一术者而言足位辐射剂量最大,头位次之,其他体位辐射剂量相对较小。冠脉造影中正足位的面积剂量乘积值最大,其次为右足位。对第一术者的剂量贡献绝大部分是距地面高60-80cm处剂量高区散射束所致。一般的,被检者左上辐射场的强度最高。被检者右侧一般为手术人员站立处,必须加以防护。在介入手术过程中一定不要忽视防护装置的作用。 展开更多
关键词
下载PDF
柴芪颗粒抗菌及保肝作用研究 被引量:4
11
作者 时维静 李立顺 +1 位作者 俞浩 刘娟 《畜牧兽医学报》 CAS CSCD 北大核心 2005年第5期502-505,共4页
为探讨柴芪颗粒的保肝、体外抗菌作用和对小鼠免疫功能的影响,分别采用四氯化碳(CCl4)和D 氨基半乳糖(D GalN)诱导的小鼠肝损伤模型,给予不同剂量的柴芪颗粒(15、10、5 g/kg体重),测定血清中谷丙转氨酶(ALT)、谷草转氨酶(AST)的活性和... 为探讨柴芪颗粒的保肝、体外抗菌作用和对小鼠免疫功能的影响,分别采用四氯化碳(CCl4)和D 氨基半乳糖(D GalN)诱导的小鼠肝损伤模型,给予不同剂量的柴芪颗粒(15、10、5 g/kg体重),测定血清中谷丙转氨酶(ALT)、谷草转氨酶(AST)的活性和肝组织谷胱甘肽(GSH)的含量。研究表明柴芪颗粒对四氯化碳(CCl4 )及D 氨基半乳糖(D GalN)所引起的小鼠肝损害有明显的保护作用,对血清ALT、AST活性升高有明显的降低作用(P<0.01),减少了CCl4 肝损伤小鼠戊巴比妥钠的睡眠时间;并能明显提高小鼠网状内皮系统的吞噬功能,体外试验有一定抑菌作用。可见柴芪颗粒具有抗菌、保肝和提高免疫功能的作用。 展开更多
关键词 CCL4 ALT AST
下载PDF
改性天然高分子水基钻井液的研究与应用 被引量:8
12
作者 郑力会 张金波 鄢捷年 《油田化学》 CAS CSCD 北大核心 2004年第4期297-300,共4页
简介了4种对环境无害的固态的水基钻井液处理剂的合成及性能:改性天然高分子类包被剂IND30和降滤失剂NAT20,无萤光白沥青NFA25(部分溶于水、部分溶于油的改性油类物质)及粉状聚合醇PGCS1(EO/PO共聚物)。报道了用膨润土和这4种处理剂配... 简介了4种对环境无害的固态的水基钻井液处理剂的合成及性能:改性天然高分子类包被剂IND30和降滤失剂NAT20,无萤光白沥青NFA25(部分溶于水、部分溶于油的改性油类物质)及粉状聚合醇PGCS1(EO/PO共聚物)。报道了用膨润土和这4种处理剂配制的各种实验钻井液的组成和性能:基本配方钻井液(钻井液1)、强抑制性钻井液(钻井液2,另加入一种小阳离子页岩抑制剂)、抗盐钙污染钻井液(加入35%NaCl和1%CaSO4),抗膨润土污染钻井液(加入4%钙膨润土)。这4种钻井液在原配制状态和在120℃、140℃滚动16小时后,各流变参数均在合理范围,API滤失量≤5 2mL,HTHP滤失量≤20mL。某油藏储层钻屑在钻井液1、2中于140℃滚动16小时后,回收率分别为91 2%和96 7%;该储层岩心被原配制和在140℃滚动16小时后的钻井液1、2污染后,渗透率恢复率为88 2%~91 6%。4种处理剂溶液,钻井液1、2及两口井使用的钻井液均无毒,EC50>3×104mg/L。该体系多功能水基钻井液已在塔里木、克拉玛依等油田10余口井钻井中获得成功应用,最长裸眼长度达5324 45m,井眼扩大率仅5%~10%。详细介绍了在LG区块使用的钻井液分井段组成、维护及性能。表4参3。 展开更多
关键词 NaCl 20
下载PDF
三峡工程二期围堰防渗墙材料快速检测及其力学指标早期预报
13
作者 孙开畅 田斌 孙志禹 《水力发电》 北大核心 2010年第12期42-44,47,共4页
鉴于三峡二期围堰的重要性,对现场快速判断防渗墙墙体材料施工质量的试验方法提出了新的要求。根据拌和样,测定出柔性材料的原材料的实际下料数量。根据防渗墙墙体材料成型样的早期强度,提出了其力学指标的早期预报方法。该方法应用于... 鉴于三峡二期围堰的重要性,对现场快速判断防渗墙墙体材料施工质量的试验方法提出了新的要求。根据拌和样,测定出柔性材料的原材料的实际下料数量。根据防渗墙墙体材料成型样的早期强度,提出了其力学指标的早期预报方法。该方法应用于三峡二期围堰实际施工中,取得了良好的效果。 展开更多
关键词 Three Gorges Project CUTOFF WALL Materials for Property Prediction
下载PDF
防卡润滑剂OCL-RQ的室内性能评价 被引量:3
14
作者 周文欣 张建伟 +2 位作者 张佩 张克勤 赵俊峰 《钻井液与完井液》 CAS 北大核心 2005年第B05期32-33,120,共3页
为满足润滑剂的无荧光、无污染、抗温性好、易生物降解等要求,开展了防卡润滑剂OCL-RQ的研制。OCL-RQ润滑剂选用高效无毒(或低毒)、无荧光(或低荧光)的表面活性剂、矿物油等在一定温度下反应而成。在研制过程中重点从表面活性剂的HLB值... 为满足润滑剂的无荧光、无污染、抗温性好、易生物降解等要求,开展了防卡润滑剂OCL-RQ的研制。OCL-RQ润滑剂选用高效无毒(或低毒)、无荧光(或低荧光)的表面活性剂、矿物油等在一定温度下反应而成。在研制过程中重点从表面活性剂的HLB值、亲油基和亲水基的分布以及与油类的配伍性等方面进行了深入的研究,在此基础上又对其复配物的抗温性能和膜的强度进行了评价,并采用正交试验法对配方进行了优选。研制出的OCL-RQ润滑剂是一种淡黄色液体,加量为0.5%-2.0%时润滑系数降低率大于80%,能在钻头、钻具和其它工具的表面形成一层牢固的吸附膜,大幅度降低它们在钻进中的磨损,同时能够尽可能避免粘附卡钻事故;而且该剂具有一定的抗盐和降滤失作用,对钻井液性能基本无影响;原材料来源广,最终产品的价格合理,生产工艺简单。 展开更多
关键词 HLB
下载PDF
Analysis of Software Development and Enhancement Projects Work Effort per Unit Based on the COSMIC Method with Regard to Technological Factors—Case Study
15
作者 Beata Czarnacka-Chrobot 《Journal of Software Engineering and Applications》 2013年第11期597-609,共13页
This paper aims to present a case study that consists in the analysis of work effort per unit of software systems Development and Enhancement Projects (D&EP) depending on technological factors. That analysis was c... This paper aims to present a case study that consists in the analysis of work effort per unit of software systems Development and Enhancement Projects (D&EP) depending on technological factors. That analysis was commissioned by one of the largest public institutions in Poland. This is the COSMIC (Common Software Measurement International Consortium) function points method that is chosen by this institution as a point of reference for size of software systems developed/enhanced for supporting its functions and therefore this method is the base for the analysis of D&EP work effort per unit with regard to technological factors. 展开更多
关键词 Software Systems Development and ENHANCEMENT projects Work Effort PER UNIT Functional Size Measurement COSMIC METHOD IFPUG METHOD
下载PDF
己酮可可碱对新生大鼠缺氧缺血性脑病的保护作用 被引量:3
16
作者 赵胜 沈道江 +2 位作者 冯国清 张贺鸣 翁士艾 《基础医学与临床》 CSCD 北大核心 2005年第5期465-467,共3页
目的探讨己酮可可碱(pentoxifylline,PTX)对新生大鼠缺氧缺血性脑病(hypoxic-ischemicencephalopathy,HIE)脑组织中ATP酶和炎性细胞因子的影响,揭示PTX对大鼠HIE的保护机制。方法7日龄Wistar大鼠80只随机分为假手术组、缺血组、低氧组、... 目的探讨己酮可可碱(pentoxifylline,PTX)对新生大鼠缺氧缺血性脑病(hypoxic-ischemicencephalopathy,HIE)脑组织中ATP酶和炎性细胞因子的影响,揭示PTX对大鼠HIE的保护机制。方法7日龄Wistar大鼠80只随机分为假手术组、缺血组、低氧组、HIE模型组和PTX组。缺血72h后测定脑组织中Na+、K+-ATP酶、Ca2+-ATP酶和Mg2+-ATP酶活性,以及TNF-αI、L-1和TXB2含量。结果缺血组、低氧组和HIE模型组Na+、K+-ATP酶、Ca2+-ATP酶和Mg2+-ATP酶活性降低(P<0.01),TNF-αI、L-1和TXB2含量升高(P<0.05,P<0.01)。PTX组可显著缓解上述变化(P<0.05,P<0.01)。结论PTX对新生大鼠HIE的保护作用可能与其保护脑组织中ATP酶和降低炎性细胞因子有关。 展开更多
关键词 CA^2%PLUS%-ATP Mg^2%PLUS%-ATP Wistar K^%PLUS%-ATP TNF-α ATP Na^%PLUS% TXB2 IL-1 0.05 HIE 72h FIX PTX
下载PDF
原油储罐的腐蚀机理研究及防护技术现状 被引量:60
17
作者 赵雪娥 蒋军成 《中国安全科学学报》 CAS CSCD 2005年第3期104-107,共4页
原油储罐在运行过程中,经常遭受内、外环境介质的腐蚀。内腐蚀主要为内部储存介质、罐底积水及罐内空间部分的凝结水汽的腐蚀作用,其中罐底的内腐蚀尤为严重,主要是由滞留在罐底的沉积水所引起;外部腐蚀主要是大气腐蚀、土壤腐蚀、杂散... 原油储罐在运行过程中,经常遭受内、外环境介质的腐蚀。内腐蚀主要为内部储存介质、罐底积水及罐内空间部分的凝结水汽的腐蚀作用,其中罐底的内腐蚀尤为严重,主要是由滞留在罐底的沉积水所引起;外部腐蚀主要是大气腐蚀、土壤腐蚀、杂散电流腐蚀等。笔者概要介绍了原油储罐的腐蚀状况,重点讨论了储罐不同部位的腐蚀机理。在此基础上,总结并提出了一些行之有效的防腐措施,如抗静电涂料防腐、涂料与阳极保护相结合的保护技术。 展开更多
关键词
下载PDF
基于聚类分析的工程移民收入水平恢复评价 被引量:3
18
作者 崔洪梅 姚凯文 《水力发电》 北大核心 2010年第12期1-3,共3页
移民的收入水平分析是移民监测与评估的重要内容。采用聚类分析来对移民的人均收入分布进行统计分析,考虑搬迁前后的时间历程,分析其变化趋势,利用马尔科夫模型进行人均纯收入的预测,并以湖南长江干堤加固工程作为实证分析。
关键词 Clustering Analysis Based HYDROPOWER Project Water Resources
下载PDF
热采井套管损坏机理及防治技术——以单家寺油田为例 被引量:14
19
作者 张万才 马振生 +3 位作者 郭立君 曲卫光 金鹏 刘振华 《油气地质与采收率》 CAS CSCD 北大核心 2005年第2期74-76,共3页
热采井经多轮次蒸汽吞吐后套管易疲劳损坏是稠油油藏开发过程中普遍存在的问题。通过对单家寺油田现 场调查分析,找出了热采井套管损坏的基本规律,重点对油层出砂及注汽时对套管的损害机理进行研究,并采用有 限元数值模拟方法分析了高... 热采井经多轮次蒸汽吞吐后套管易疲劳损坏是稠油油藏开发过程中普遍存在的问题。通过对单家寺油田现 场调查分析,找出了热采井套管损坏的基本规律,重点对油层出砂及注汽时对套管的损害机理进行研究,并采用有 限元数值模拟方法分析了高真空隔热管注汽时对井筒热应力场的影响规律。开发了热采井防砂、环空充氮、采用 新型热敏封隔器等防治技术,现场应用取得了较好的效果。通过综合防治,单家寺油田油井套损率已由2000年的 0.33%下降到2003年的0.16%。 展开更多
关键词 2003 2000
下载PDF
破解河北省重化工业发展中环保难题的几点建议 被引量:3
20
作者 关华 何军 李朋 《河北经贸大学学报(综合版)》 2010年第4期65-68,共4页
河北省重化工业在国民经济中所占比重不断上升的同时,给河北省的环境保护带来很大压力,解决重化工业发展中环保问题的治本之策是加快发展方式转变。应加快淘汰落后产能,推动产业优化升级,发挥大企业的环保规模效应,加快环保技术创新,形... 河北省重化工业在国民经济中所占比重不断上升的同时,给河北省的环境保护带来很大压力,解决重化工业发展中环保问题的治本之策是加快发展方式转变。应加快淘汰落后产能,推动产业优化升级,发挥大企业的环保规模效应,加快环保技术创新,形成环保长效机制。 展开更多
关键词 Hebei Province Chemical Industry Environmental Protection
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部