期刊文献+
共找到72篇文章
< 1 2 4 >
每页显示 20 50 100
Joint jammer and user scheduling scheme for wireless physical-layer security
1
作者 丁晓进 宋铁成 +1 位作者 邹玉龙 陈晓曙 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期261-266,共6页
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is select... In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station ( BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio( MER) regions. 展开更多
关键词 security-reliability tradeoff (SRT) multi-user scheduling artificial noise physical-layer security
下载PDF
Analysis of conflict factors between pedestrians and right-turning vehicles at signalized intersections 被引量:8
2
作者 Chen Yongheng Liu Fanghong +2 位作者 Bai Qiaowen Tao Chuqing Qi Xingzu 《Journal of Southeast University(English Edition)》 EI CAS 2019年第1期118-124,共7页
Due to the fact that there is no protected signal phase for right turns at most signalized intersections, the conflict between pedestrians and right-turning vehicles is one of the most common conflict types for pedest... Due to the fact that there is no protected signal phase for right turns at most signalized intersections, the conflict between pedestrians and right-turning vehicles is one of the most common conflict types for pedestrians. A pedestrian safety analysis of the common right-turn mode at four-phase signalized intersections is presented. Relative risk is used as a measure of the effect of behaviors. The analysis mainly includes five pedestrian factors that affect the conflict process between pedestrians and right-turning vehicles. Pedestrians tend to have a higher risk of being involved in conflicts in the following six situations: crossing with others, running over the crossing, entering the intersection, being near the exit lane, crossing in the middle or at the end of a green light when the right-turn lane is shared, crossing at the beginning of a green light or red period when the right-turn lane is exclusive. It is easier for pedestrians to get priority when crossing the street in the following situations: running over a crossing, entering the intersection, being near the entrance lane, and not using the crosswalk. However, pedestrians are more inclined to yield to right-turning vehicles when pedestrians are crossing in the middle of the green light time. Some measures to alleviate the conflict are put forward according to the conclusion. Video observations also indicate that a clear pedestrian waiting area must be marked for both pedestrian safety and right-turning vehicle efficiency at major flat intersections, particularly when the arms cover the lateral dividing strips. 展开更多
关键词 SAFETY conflicts pedestrian behaviors right-turning vehicles relative risk
下载PDF
Evaluation methods of man-machine-environment system for clean and safe production in phosphorus mines: A case study 被引量:5
3
作者 DONG Long-jun ZHOU Ying +2 位作者 DENG Si-jia WANG Mei SUN Dao-yuan 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第12期3856-3870,共15页
Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phospho... Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phosphorus mines encounters great challenges. For this purpose, a man-machine-environment system composed of evaluation indexes was established, and the grading standards of indexes were defined. Firstly, the measurements of 39 qualitative indexes were obtained through the survey data. According to the measured values of 31 quantitative indexes, the measurements of quantitative indexes were calculated by linear measurement function(LM) and other three functions. Then the singleindex measurement evaluation matrixes were established. Secondly, the entropy weight method was used to determine the weights of each index directly. The analytic hierarchy process(AHP) was also applied to calculate the weights of index and index factor hierarchies after the established hierarchical model. The weights of system hierarchies were given by the grid-based fuzzy Borda method(GFB). The comprehensive weights were determined by the combination method of AHP and GFB(CAG). Furthermore, the multi-index comprehensive measurement evaluation vectors were obtained.Thirdly, the vectors were evaluated by the credible degree recognition(CDR) and the maximum membership(TMM)criteria. Based on the above functions, methods, and criteria, 16 combination evaluation methods were recommended.Finally, the clean and safe production grade of Kaiyang phosphate mine in China was evaluated. The results show that the LM-CAG-CDR is the most reasonable method, which can not only determine the clean and safe production grade of phosphorus mines, but also improve the development level of clean and safe mining of phosphorus mines for guidance.In addition, some beneficial suggestions and measures were also proposed to advance the clean and safe production grade of Kaiyang phosphorus mine. 展开更多
关键词 phosphorus mines clean and safe production man-machine-environment system unascertained measurement evaluation grid-based fuzzy borda method analytic hierarchy process
下载PDF
Patient safety culture and handoff evaluation of nurses in small and medium-sized hospitals 被引量:1
4
作者 Jung Hee Kim Jung Lim Lee Eun Man Kim 《International Journal of Nursing Sciences》 CSCD 2021年第1期58-64,I0004,共8页
Objectives:This study was conducted to investigate the current status of handoffs,perception of patient safety culture,and degrees of handoff evaluation in small and medium-sized hospitals and identified factors that ... Objectives:This study was conducted to investigate the current status of handoffs,perception of patient safety culture,and degrees of handoff evaluation in small and medium-sized hospitals and identified factors that make a difference in handoff evaluation.Methods:This is a descriptive study.425 nurses who work at small and medium-sized hospitals in South Korea were included in our study.They completed a set of self-reporting questionnaires that evaluated demographic data,handoff-related characteristics,perception of patient safety culture,and handoff evaluation.Results:Results showed that the overall score of awareness of a patient safety culture was 3.65±0.45,the level was moderate.The score of handoff evaluation was 5.24±0.85.Most nurses experienced errors in handoff and most nurses had no guidelines and checklist in the ward.Handoff evaluation differed significantly according to the level of education,work patterns,duration of hospital employment,handoff method,degree of satisfaction with the current handoff method,errors occurring at the time of handoff,handoff guidelines,and appropriateness of handoff education time(P<0.05).Conclusion:For handoff improvement,guidelines and standards should be established.It is necessary to develop a structured handoff education system.And formal handoff education should be implemented to spread knowledge uniformly. 展开更多
关键词 Evaluation studies HANDOFF Hospital nursing staff Patient safety
下载PDF
High-voltage live cleaning robot design based on security 被引量:1
5
作者 谢霄鹏 夏红卫 杨汝清 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期590-594,共5页
High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control sy... High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence. 展开更多
关键词 pollution and flashover high voltage live cleaning robot control system
下载PDF
Identity-based threshold key-insulated signature 被引量:3
6
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
工程施工企业“云网端一体化”安全管理实践 被引量:2
7
作者 王焕 薛峰 +7 位作者 刘全青 苏磊 栾昌和 郭传臣 栾心国 刘娟 陈俊颖 黄聪中铁十四局集团有限公司 《国企管理》 2021年第8期78-85,共8页
工程建设行业是国民经济的重要支柱产业之一,它与整个国家经济的发展、人民生活的改善有着密切的关系。近年来,我国建筑施工行业的技术水平逐渐向高端方向发展,许多技术领域已处于世界一流水平。然而,仅就施工现场安全管理方面而言,依... 工程建设行业是国民经济的重要支柱产业之一,它与整个国家经济的发展、人民生活的改善有着密切的关系。近年来,我国建筑施工行业的技术水平逐渐向高端方向发展,许多技术领域已处于世界一流水平。然而,仅就施工现场安全管理方面而言,依旧普遍存在施工安全致险因素多、范围广、识别困难、预警不及时、安全管控效果差等问题,施工结构健康管控和人员安全管控挑战极大。项目以“科技助力安全管理”为主线,结合“互联网+安全管理”理念,围绕“人-机-环”三条路线展开技术攻关,研发安全风险智能感知装备、建立大数据安全管理平台、卡控施工流程关键安全节点,最终构建基于“云网端一体化”的工程施工安全风险管理体系。各项技术研究成果已成功应用于港珠澳大桥珠海连接线项目、九绵高速公路LJ6合同段项目、北京兴延高速公路七标项目部、鲁南高铁项目、京唐铁路六标项目等众多国家大型重点工程项目,对国企施工现场的结构健康管控和人员安全管理起到了积极的推动作用,具有良好的经济社会效益,极具推广价值。 展开更多
关键词 施工安全管理 云网端一体化 “人--环”安全管理
下载PDF
Post-2015 Development Priorities for the Arab World
8
作者 Ibrahim Elnur Eileen Kuttab 《Management Studies》 2016年第2期49-59,共11页
The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being t... The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population. 展开更多
关键词 human security POVERTY gender inequality EMPOWERMENT millennium development goals (MDGs)
下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
9
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things PASSWORD BROADCAST UNICAST direct communication across realms
下载PDF
The Grain-population Relationship and the Effect of Main Food Producing Areas in China 被引量:1
10
作者 Zhang Jing 《Chinese Journal of Population,Resources and Environment》 2012年第4期64-68,共5页
With the increase of global population,grain-population relationship has attracted great attention worldwide.In China,grain-population relationship has become an increasingly important economic concern.Of central impo... With the increase of global population,grain-population relationship has attracted great attention worldwide.In China,grain-population relationship has become an increasingly important economic concern.Of central importance to the food security debate in China is the geography of grain supply and demand.This paper uses a grain demand and supply index (DSR) to analyze the spatial-temporal relationship between population and grain in China from 1949 to 2007 at national and provincial scales.The results are examined in three periods.(1) From 1949 to 2007,with the increase of grain production,the relationship between population and grain of China improved considerably.(2) Over the past 35 years (1970-2005),on the whole the grain producing areas have had grain surplus and contributed to the nation by providing grain,but the ability to provide sufficient grain is not stable.(3) Over the past 15 years (1990-2005),decreases in planting area brought pressure on national grain food security.The paper concludes that the key to providing more food for the main food producing provinces is increasing yield on the basis of steady plant area. 展开更多
关键词 POPULATION GRAIN regional difference food security China
下载PDF
Three-dimension path planning for UAV using improved A* algorithm in complicated threat environment 被引量:3
11
作者 李霞 Wei Ruixuan Wang Zhike 《High Technology Letters》 EI CAS 2011年第1期13-18,共6页
In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed an... In order to improve the battle effectiveness of the unmanned aerial vehicle (UAV) under the increasingly complex threat environment, a three-dimension path planning method based on an A * al- gorithm is proposed and simulated in this paper which makes the UAV satisfy requirements of different missions. At first, the digital map information is processed vdth an integrated terrain smoothing algorithm, and a safe flight surface which integrates the vehicle dynamic is built and added on the terrain, and then, models of the complicated threats are established and integrated into the digital terrain. At last, an improved A * algorithm is used to plan the three-dimension path on the safe sur- face, and then smooth the path. Simulation results indicate that the approach has a good perform- ance in creating an optimal path in the three-dimension environment and the path planning algorithm is more simple, efficient and easily realized in the engineering field. 展开更多
关键词 improved A* algorithm path planning digital map path smoothing
下载PDF
Safety architecture of internet based multi-robot teleoperation system
12
作者 赵杰 高永生 蔡鹤皋 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第6期599-602,共4页
Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presen... Safety subsystem is one of the important parts in robot teleoperation system. In this paper, a safety architecture of safety subsystem in Internet based multi-operator-multi-robot (MOMR) teleoperation system is presented. The subsystem is divided into three layers in its logic architecture: interactive monitor layer, collaborative control layer and real-time control layer. The safety problems and the related strategy are clarified by detailed analysis of each layer and relationship among the layers. So we can obtain a high performance MOMR teleoperation system with multi-layer safety architecture. 展开更多
关键词 TELEOPERATION safety architecture multi-operator-multi-robot (MOMR) coordination
下载PDF
Distributed virtual environment-based safety control for Internet tele-robots
13
作者 高永生 Zhao Jie +1 位作者 Gao Sheng Cai Hegao 《High Technology Letters》 EI CAS 2006年第2期175-181,共7页
The inherent complexity and uncertainty of multi-operator multi-robot (MOMR) tele-operation system make its safeguard an essential problem. Hazardous factors in the system are analyzed using fault tree analysis(FTA... The inherent complexity and uncertainty of multi-operator multi-robot (MOMR) tele-operation system make its safeguard an essential problem. Hazardous factors in the system are analyzed using fault tree analysis(FTA) technology, and three-layer interactive safety architecture with information flow is designed in modules to control the factors according to the holistic control mode. After that, distributed virtual environment (DVE) including the characteristics of virtual guide (VG) technology is discussed to help the operators achieve some tasks through the visibility of control commands, time-delay, movement collision and operators' intentions. Finally an experiment is implemented to test the efficiency of safety control architecture by using two robots to place some building blocks in the same workspace. 展开更多
关键词 safety architecture multi-operator multi-robot (MOMR) TELE-OPERATION distributed virtual environment (DVE) virtual guide (VG)
下载PDF
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
14
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
输油气站场“人-机”工程原理和3E原则 被引量:1
15
作者 刘学铭 张晓辉 +1 位作者 冯锐 高志永 《油气储运》 CAS 北大核心 2009年第4期71-73,共3页
概述了安全"人—机"工程原理,指出了针对事故突发时人的不安全行为宜采取的工程技术、教育和法制的3E原则。通过对雷击高发区老城站的工艺流程分析,由3E原则在老城站"人—机"系统中的应用实践,表明"人—机&qu... 概述了安全"人—机"工程原理,指出了针对事故突发时人的不安全行为宜采取的工程技术、教育和法制的3E原则。通过对雷击高发区老城站的工艺流程分析,由3E原则在老城站"人—机"系统中的应用实践,表明"人—机"系统与3E原则在输油气站场可以形成一个良性闭环管理系统,能达到有效保证输油场站安全运行管理的目的。 展开更多
关键词 输油站场 安全“人- 机”工程 原理 3E原则 管理 应用
下载PDF
APPLICATION OF HUMAN COGNITIVE MODEL FOR TIME DEPENDENT OPERATOR BEHAVIOR IN CHINESE NPP
16
作者 黄祥瑞 高佳 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1998年第1期31-35,共5页
This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of ca... This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered. 展开更多
关键词 reliability analysis cognitive model human error behavior probabilistic safety assessment human machine interaction
下载PDF
Vegetation Changes and Human Influences on Qian’an Basin Since the Middle Holocene 被引量:1
17
作者 许清海 孔昭宸 +2 位作者 阳小兰 梁文栋 孙黎明 《Acta Botanica Sinica》 CSCD 2002年第5期611-616,共6页
Vegetation changes and human influences on natural environments since 5 000 a BP were discussed based on the pollen data supported by radiocarbon dating from Cangumiao and Yujiawa profiles in Qian'an Basin, th... Vegetation changes and human influences on natural environments since 5 000 a BP were discussed based on the pollen data supported by radiocarbon dating from Cangumiao and Yujiawa profiles in Qian'an Basin, the southern area of Yanshan Mountain. The research indicates that (1) from 4 600 to 3 100 a BP, deciduous broad_leaved forests dominated by Quercus grew in the Basin, (2) after 3 100 a BP, broad_leaved species reduced and Pinus increased, in response to the cooling climate, (3) since 1 600 a BP, forests had been destroyed seriously due to the increase of agricultural activities, and (4) pollen analysis showed that Castanea trees had been cultivated for 1 600 years, and Oryza had been planted for 700 years in Qian'an Basin. 展开更多
关键词 Qian'an Basin pollen analysis human activities
下载PDF
Human Error Model and Definition of Human Reliability
18
作者 景国勋 冯长根 王海亮 《Journal of Beijing Institute of Technology》 EI CAS 1999年第2期103-107,共5页
Aim A model of human errors is given. His reliability of action is also determined. Safety countermeasures to prevent human errors are put forward. Methods\ Human system is regarded as a maintainable Markov system. O... Aim A model of human errors is given. His reliability of action is also determined. Safety countermeasures to prevent human errors are put forward. Methods\ Human system is regarded as a maintainable Markov system. On the basis of Markov method, the deduction and calculation in practice are made. Results\ Human errors are the chief factors leading to accidents, and may appear in different models. There are two kinds of states the normal and error state in a process of work. The process of state transfer human system is a Markov process. Human action reliability will be decreased with the continuation of time. Conclusion\ Human errors are described in the quantified form. It will have some significance in terms of theory in the study of the relationship between human action and accidents. Thus helping us in the preven tion of accident occurrence. The safety of a system can be improved in this way. 展开更多
关键词 human error RELIABILITY safety countermeasures
下载PDF
NEW METHOD FOR SAFETY ASSESSMENT OF PARALLEL ROUTES 被引量:1
19
作者 隋东 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第1期36-43,共8页
A new safety assessment method for parallel routes is presented. From the aspects of safety guard system of air traffic control(ATC) and considering the flight conflict as causing event of air collision accidents, t... A new safety assessment method for parallel routes is presented. From the aspects of safety guard system of air traffic control(ATC) and considering the flight conflict as causing event of air collision accidents, this paper fosters a four-layer safety guard of controller command, short-term conflict alerts (STCAs), pilot visual avoidance, and traffic alert collision avoidance system(TCAS). Then, the problem of parallel routes collision risk is divided into two parts:the calculation of potential flight conflict and the analysis of failure probability of the four-layer safety guard. A calculation model for controller interference times is induced. By using cognitive reliability and error analysis method(CREAM),the calculation problem to failure probability of controller sequencing flight conflicts is solved and a fault tree model of guard failure of STCA and TCAS is established. Finally, the Beijing-Shanghai parallel routes are taken as an example to be calculated and the collision risk of the parallel routes is obtained under the condition of radar control. Results show that the parallel routes can satisfy the safety demands. 展开更多
关键词 air traffic control human factors safety assessment short-term conflict alerts traffic alert collision avoidance system
下载PDF
A theoretical model for the estimation of maximum impact force from a rockfall based on contact theory 被引量:6
20
作者 ZHANG Shi-lin YANG Xing-guo ZHOU Jia-wen 《Journal of Mountain Science》 SCIE CSCD 2018年第2期430-443,共14页
Rockfall poses a great threat to buildings and personal security. To understand the dynamic characteristics of rockfalls is a prerequisite for disaster prevention and assessment. Models for rockfalls in different form... Rockfall poses a great threat to buildings and personal security. To understand the dynamic characteristics of rockfalls is a prerequisite for disaster prevention and assessment. Models for rockfalls in different forms are established based on the theory of rigid body motion. The equivalent velocity considering the rotational effect is determined by the energy ratio. Besides, considering plastic deformation and nonlinear hardening, the maximum impact force is estimated based on the Hertz contact theory. Then, a case study is carried out to illustrate the applicability of the model and sensitive analyses on some affecting parameters are also made. Calculation results show that the maximum impact force increases with the increasing of incident velocity, angle and slope gradient reflected by the changing of energy ratio. Moreover, the model for the estimation of maximum impact force is validated by two different scales of experiments and compared with other theoretical models. Simulated maximum impact forces agree well with the experiments. 展开更多
关键词 RockfaU Motion characteristics Contacttheory Maximum impact force
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部