期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
水运公路工程项目初始安全度评价体系探讨
1
作者 刘玲 范智杰 《中国水运(下半月)》 2009年第12期56-57,共2页
为加强水运公路工程建设项目的监督管理,科学地评价水运公路工程建设项目的安全风险,实现水运公路工程建设项目安全评价工作的规范化和制度化,在提出基本安全度的概念基础上,又提出项目初始安全度的概念,建立水运公路工程建设项目初始... 为加强水运公路工程建设项目的监督管理,科学地评价水运公路工程建设项目的安全风险,实现水运公路工程建设项目安全评价工作的规范化和制度化,在提出基本安全度的概念基础上,又提出项目初始安全度的概念,建立水运公路工程建设项目初始安全度评价体系,旨在促进项目建设各有关单位安全生产管理水平的提高。 展开更多
关键词 水运工程项目 公路工程项目 初始安全 评价指标体系
下载PDF
嵌入式USB主机的安全初始化模型设计与实现 被引量:1
2
作者 刘晶晶 戴紫彬 蔺守河 《微计算机信息》 北大核心 2007年第23期32-34,共3页
通过对密码设备的安全初始化问题的研究,并针对目前有关密码设备的安全初始化模型的不足,提出一种基于嵌入式USB主机的安全初始化模型,并对其加以设计与实现。
关键词 USB主机 密码设备 安全初始
下载PDF
改进的HTTP摘要认证方案的设计与实现 被引量:2
3
作者 朱云 《光通信研究》 北大核心 2008年第4期59-62,共4页
由于现有的认证机制不能有效解决会话初始协议(SIP)消息传送时网络侦听的问题,因此SIP网络传输时存在易遭受异常消息攻击、数据包被侦听、密文被分析等诸多安全威胁。文章经比较分析、研究改进,应用一个并行多进程的SIP非法消息检测流程... 由于现有的认证机制不能有效解决会话初始协议(SIP)消息传送时网络侦听的问题,因此SIP网络传输时存在易遭受异常消息攻击、数据包被侦听、密文被分析等诸多安全威胁。文章经比较分析、研究改进,应用一个并行多进程的SIP非法消息检测流程,扩展了SIP认证头域,引进了密文隐写系统,能有效保证应用层的安全。实验结果验证了该方案的有效性。 展开更多
关键词 会话初始协议安全 检测 认证 密文隐写
下载PDF
克服旧的管理弊端 建立新的管理体系
4
作者 周同贵 贾涛 《机械工业标准化与质量》 2004年第6期30-32,共3页
关键词 GB/T28001-2001 职业健康安全管理体系 企业管理 初始安全评审 危险源辨识 风险评价
下载PDF
A numerical simulation of the influence initial temperature has on the propagation characteristics of, and safe distance from, a gas explosion 被引量:12
5
作者 Jiang Bingyou Lin Baiquan +3 位作者 Shi Shulei Zhu Chuanjie tiu Qian Zhai Cheng 《International Journal of Mining Science and Technology》 SCIE EI 2012年第3期307-310,共4页
A model roadway with a cross-sectional area of 80 mm 80 mm and a length of 100 m was used to estimate the overpressure, the temperature, the density, and the combustion rate during an explosion. Auto-ReaGas software w... A model roadway with a cross-sectional area of 80 mm 80 mm and a length of 100 m was used to estimate the overpressure, the temperature, the density, and the combustion rate during an explosion. Auto-ReaGas software was used for the calculations and the initial temperatures were 248, 268, 308, or 328 K. The methaneair mixture had a fuel concentration of 9.5% and the tunnel had a filling ratio of 10%. The results show that the safe distance necessary to avoid harm from the shock wave increases with increasing initial temperature. The distance where the peak overpressure begins to rise, and where the maximum value occurs, increases as the initial temperature increases. These are almost linear functions of the initial temperature. At locations before shock wave attenuation has occurred increasing the initial temperature linearly increases the maximum temperature at each point following along the tunnel. At the same time, the peak overpressure, the maximum density, and the maximum combustion rate decrease linearly. How-ever, after the shock wave has attenuated the attenuation extent of the peak overpressure decreases with an increase in initial temperature. The influence of the initial temperature on the explosion propagation depends on the combined effects of inhibiting and enhancing factors. The research results can provide a theoretical guidance for gas explosion disaster relief and treatment in underground coal mines. 展开更多
关键词 Initial temperatureGas explosionShock waveSafety distanceNumerical simulation
下载PDF
Limit equilibrium method for slope stability based on assumed stress on slip surface 被引量:2
6
作者 邓东平 赵炼恒 李亮 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第11期2972-2983,共12页
In the limit equilibrium framework, two- and three-dimensional slope stabilities can be solved according to the overall force and moment equilibrium conditions of a sliding body. In this work, based on Mohr-Coulomb(M-... In the limit equilibrium framework, two- and three-dimensional slope stabilities can be solved according to the overall force and moment equilibrium conditions of a sliding body. In this work, based on Mohr-Coulomb(M-C) strength criterion and the initial normal stress without considering the inter-slice(or inter-column) forces, the normal and shear stresses on the slip surface are assumed using some dimensionless variables, and these variables have the same numbers with the force and moment equilibrium equations of a sliding body to establish easily the linear equation groups for solving them. After these variables are determined, the normal stresses, shear stresses, and slope safety factor are also obtained using the stresses assumptions and M-C strength criterion. In the case of a three-dimensional slope stability analysis, three calculation methods, namely, a non-strict method, quasi-strict method, and strict method, can be obtained by satisfying different force and moment equilibrium conditions. Results of the comparison in the classic two- and three-dimensional slope examples show that the slope safety factors calculated using the current method and the other limit equilibrium methods are approximately equal to each other, indicating the feasibility of the current method; further, the following conclusions are obtained: 1) The current method better amends the initial normal and shear stresses acting on the slip surface, and has the identical results with using simplified Bishop method, Spencer method, and Morgenstern-Price(M-P) method; however, the stress curve of the current method is smoother than that obtained using the three abovementioned methods. 2) The current method is suitable for analyzing the two- and three-dimensional slope stability. 3) In the three-dimensional asymmetric sliding body, the non-strict method yields safer solutions, and the results of the quasi-strict method are relatively reasonable and close to those of the strict method, indicating that the quasi-strict method can be used to obtain a reliable slope safety factor. 展开更多
关键词 two-dimensional slope three-dimensional slope limit equilibrium analysis normal stress shear stress safety factor
下载PDF
应急信息意识:如何实现分享——美国佛罗里达州坦帕市警察局案例分析
7
作者 丛小蔓 《计算机光盘软件与应用》 2011年第13期1-3,共3页
在应急响应时,不论大规模行动还是日常操作,所需要信息交互都非常困难。在不同的场所和形式都需要访问应急资源和信息,只有各自地方政府的典型嵌入式垂直应用系统可以访问。用户通过高级用户界面或者复杂分析系统来访问数据。和该垂... 在应急响应时,不论大规模行动还是日常操作,所需要信息交互都非常困难。在不同的场所和形式都需要访问应急资源和信息,只有各自地方政府的典型嵌入式垂直应用系统可以访问。用户通过高级用户界面或者复杂分析系统来访问数据。和该垂直应用系统联系不太紧密的用户则无法访问某些数据。 美国·马萨诸塞州的Raytheon公司曾为美国国土安全部设计过模拟全国部署的运行原型,在此基础之上,Raytheon公司同佛罗里达州坦帕市警察局、高性能运行规划设备的供应商合作研发了一个网络接入系统,该系统运用通用的标准访问机制,无需考虑系统或数据库的类型,实现数据的无缝访问。 展开更多
关键词 应急信息 网络安全初始系统 数据查询 数据库 信息共享
下载PDF
Seepage characteristics of collapse column fillings 被引量:2
8
作者 Zhang Boyang Bai Haibo Zhang Kai 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2016年第2期333-338,共6页
With concealment and hysteresis,water-inrush from Karst collapse column has become an important security hazard of lower group coal mining in North China.Based on the MTS8 15.02 seepage test system,we analyzed the imp... With concealment and hysteresis,water-inrush from Karst collapse column has become an important security hazard of lower group coal mining in North China.Based on the MTS8 15.02 seepage test system,we analyzed the impact of consolidation pressure,initial moisture content and confining pressure on the permeability of fillings in order to study the seepage characteristics of collapse column fillings.The results show that:(l)The permeability of collapse column fillings is of the order of 10^(-16)-10^(-15) magnitude and decreases with an increase in consolidation pressure and decrease in initial moisture content.(2) The essence of filling seepage law change is the change in porosity,and a power function relationship exists between the permeability ratio and porosity ratio.(3) With increasing confining pressure,the permeability of fillings decreases.However,under low confining pressure(1.2-4 MPa),the change of confining pressure has no obvious influence on the permeability. 展开更多
关键词 Collapse column Filings Porosity Consolidation Permeability Moisture content
下载PDF
用于虚拟化环境的进程隔离方法研究与实现 被引量:2
9
作者 赵波 夏忠林 +1 位作者 安杨 向騻 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第11期74-79,共6页
针对虚拟化环境中用户进程运行安全问题,提出一种适用于虚拟化环境的进程隔离方法.该方法引入安全域作为进程隔离保护的基本单元,安全域是进程以及进程运行过程中依赖的环境构成的整体,通过建立安全域之间的依赖关系和安全域之间信息的... 针对虚拟化环境中用户进程运行安全问题,提出一种适用于虚拟化环境的进程隔离方法.该方法引入安全域作为进程隔离保护的基本单元,安全域是进程以及进程运行过程中依赖的环境构成的整体,通过建立安全域之间的依赖关系和安全域之间信息的交换规则,确保进程初始安全和运行过程中的隔离性.给出了安全域的相关概念和形式化描述,以及安全域之间信息流交换和依赖关系的建立方法和相关证明.以Xen虚拟化系统为基础,给出了该保护方法的具体实现以及实验结果,实验结果分析表明:该方法在虚拟化环境中能够抵御多种攻击手段,额外执行开销不超过10%. 展开更多
关键词 虚拟化 进程隔离 初始安全 运行安全 信息交换规则 形式化
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部