期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
“三维安全”优化中国周边安全态势的路径分析 被引量:1
1
作者 赵汇 许晓丽 《太平洋学报》 CSSCI 2013年第10期80-86,共7页
符合马克思主义认识论的全面的安全界定应该包括客观性安全、主体性安全和话语性安全三个维度,即"三维安全"。从"三维安全"理论视阈评估国际金融危机背景下中国周边安全的新态势,同时相应提出从提升综合国力立足解... 符合马克思主义认识论的全面的安全界定应该包括客观性安全、主体性安全和话语性安全三个维度,即"三维安全"。从"三维安全"理论视阈评估国际金融危机背景下中国周边安全的新态势,同时相应提出从提升综合国力立足解决国内问题、积极培植集体安全理念和安全氛围以及采取灵活多样的外交策略等方面来优化中国周边安全环境。 展开更多
关键词 国际金融危机 周边安全 “三维安全”
下载PDF
“三维安全”视角下的中国周边安全优化分析
2
作者 许晓丽 《吉首大学学报(社会科学版)》 北大核心 2013年第5期99-104,共6页
"三维安全"即客观性安全、主体性安全、话语性安全,是基于经验性和规范性相结合的研究范式和以国家作为行为主体所作出的安全概念界定。根据"三维安全"理论评估当前中国周边安全的新态势,应从提高综合国力"练... "三维安全"即客观性安全、主体性安全、话语性安全,是基于经验性和规范性相结合的研究范式和以国家作为行为主体所作出的安全概念界定。根据"三维安全"理论评估当前中国周边安全的新态势,应从提高综合国力"练内功",致力于创造"积极和平"的周边环境和采取灵活多样的外交策略等方面来优化中国周边安全环境。 展开更多
关键词 “三维安全” 周边安全 中国崛起
下载PDF
Three-dimensional stability of landslides based on local safety factor 被引量:4
3
作者 YANG Tao Man-chu Ronald YEUNG +2 位作者 YANG Bing LIU Yong-jiang YANG Yan-xin 《Journal of Mountain Science》 SCIE CSCD 2016年第9期1515-1526,共12页
Unlike the limit equilibrium method(LEM), with which only the global safety factor of the landslide can be calculated, a local safety factor(LSF) method is proposed to evaluate the stability of different sections of a... Unlike the limit equilibrium method(LEM), with which only the global safety factor of the landslide can be calculated, a local safety factor(LSF) method is proposed to evaluate the stability of different sections of a landslide in this paper. Based on three-dimensional(3D) numerical simulation results, the local safety factor is defined as the ratio of the shear strength of the soil at an element on the slip zone to the shear stress parallel to the sliding direction at that element. The global safety factor of the landslide is defined as the weighted average of all local safety factors based on the area of the slip surface. Some example analyses show that the results computed by the LSF method agree well with those calculated by the General Limit Equilibrium(GLE) method in two-dimensional(2D) models and the distribution of the LSF in the 3D slip zone is consistent with that indicated by the observed deformation pattern of an actual landslide in China. 展开更多
关键词 Landslide stability Local safety factor Stability analysis method Slip mechanism
下载PDF
Three-dimensional analysis of slopes reinforced with piles 被引量:8
4
作者 高玉峰 叶茂 张飞 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第6期2322-2327,共6页
Based on the upper bound of limit analysis, the plane-strain analysis of the slopes reinforced with a row of piles to the 3D case was extended. A 3D rotational failure mechanism was adopted to yield the upper bound of... Based on the upper bound of limit analysis, the plane-strain analysis of the slopes reinforced with a row of piles to the 3D case was extended. A 3D rotational failure mechanism was adopted to yield the upper bound of the factor of safety. Parametric studies were carried out to explore the end effects of the slope failures and the effects of the pile location and diameter on the safety of the reinforced slopes. The results demonstrate that the end effects nearly have no effects on the most suitable location of the installed piles but have significant influence on the safety of the slopes. For a slope constrained to a narrow width, the slope becomes more stable owing to the contribution of the end effects. When the slope is reinforced with a row of piles in small space between piles, the effects of group piles are significant for evaluating the safety of slopes. The presented method is more appropriate for assessing the stability of slopes reinforced with piles and can be also utilized in the design of plies stabilizing the unstable slopes. 展开更多
关键词 three-dimensional rotational failure mechanism stability of slopes limit analysis LANDSLIDES PILES
下载PDF
Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement 被引量:8
5
作者 施锦 龚彦晓 +2 位作者 徐平 祝世宁 詹佑邦 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第11期831-836,共6页
We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformatio... We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols. 展开更多
关键词 quantum secure direct communication hyperentanglement Bell bases measurement
下载PDF
An improved bicubic imaging fitting algorithm for 3D radar detection target
6
作者 Li Fan-Ruo Yang Feng +3 位作者 Yan Rui Qiao Xu Li Yi-Jin Xing Hong-Jia 《Applied Geophysics》 SCIE CSCD 2022年第4期553-562,604,共11页
3D ground-penetrating radar has been widely used in urban road underground disease detection due to its nondestructive,efficient,and intuitive results.However,the 3D imaging of the underground target body presents the... 3D ground-penetrating radar has been widely used in urban road underground disease detection due to its nondestructive,efficient,and intuitive results.However,the 3D imaging of the underground target body presents the edge plate phenomenon due to the space between the 3D radar array antennas.Consequently,direct 3D imaging using detection results cannot reflect underground spatial distribution characteristics.Due to the wide-beam polarization of the ground-penetrating radar antenna,the emission of electromagnetic waves with a specific width decreases the strong middle energy on both sides gradually.Therefore,a bicubic high-precision 3D target body slice-imaging fitting algorithm with changing trend characteristics is constructed by combining the subsurface target characteristics with the changing spatial morphology trends.Using the wide-angle polarization antenna’s characteristics in the algorithm to build the trend factor between the measurement lines,the target body change trend and the edge detail portrayal achieve a 3D ground-penetrating radar-detection target high-precision fitting.Compared with other traditional fitting techniques,the fitting error is small.This paper conducts experiments and analyses on GpaMax 3D forward modeling and 3D ground-penetrating measured radar data.The experiments show that the improved bicubic fitting algorithm can eff ectively improve the accuracy of underground target slice imaging and the 3D ground-penetrating radar’s anomaly interpretation. 展开更多
关键词 urban underground space safety 3D ground-penetrating radar detection of the abnormal bicubic fitting algorithm high-precision imaging
下载PDF
Study on life-cycle risk management of high earth-rock dam project
7
作者 Zhang Nianmu Zhang Zongliang Yan Lei 《Engineering Sciences》 EI 2013年第5期45-50,共6页
Based on advanced computer technology, internet of things (lOT) technology, project management con- cept and professional technology and combined with the innovative theories, methods and techniques in earlier hy- d... Based on advanced computer technology, internet of things (lOT) technology, project management con- cept and professional technology and combined with the innovative theories, methods and techniques in earlier hy- dropower projects, the life-cycle risk management system of high earth-rock dam project for Nuozhadu project was developed. The system mainly includes digital dam, three-dimensional design, construction quality monito- ring, safety assessment and warning, etc, to integrally manage and analyze the dam design, constructional quality and safety monitoring information. It realized the dynamic updates of the comprehensive information and the safe- ty quality monitoring in the project life cycle, and provided the basic platform for the scientific management of the construction and operation safety of high earth-rock dam. Application in Nuozhadu earth-rock dam showed that construction safety monitoring and warning greatly helped accelerate the construction progress and improve project quality, and provided a new way for the quality safety control of high earth-rock dam. 展开更多
关键词 high earth-rock dam Nuozhadu hydropower station LIFE-CYCLE safety construction risk management
下载PDF
Construction of Three-dimensional power security Defense System Based on T-S Model Fuzzy Neural Network
8
作者 Zeyu SUN 《International Journal of Technology Management》 2015年第5期105-108,共4页
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex... With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment. 展开更多
关键词 Information network power security Neural network Network environment Data FEATURE Threat information
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部