期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
基于组态方式的风洞运行安全关车控制方法 被引量:1
1
作者 马列波 高鹏 +2 位作者 陈海峰 阎成 唐子奇 《计算机测量与控制》 2021年第6期114-118,共5页
针对某亚跨超声速风洞复杂的安全关车工况,设计了一种基于组态方式的风洞安全关车控制方法,通过灵活组态调压阀压力调节、模型迎角回零以及调压阀关闭功能模块,形成5种运行工况对应的安全关车控制策略;经调试运行:各功能模块能够实现设... 针对某亚跨超声速风洞复杂的安全关车工况,设计了一种基于组态方式的风洞安全关车控制方法,通过灵活组态调压阀压力调节、模型迎角回零以及调压阀关闭功能模块,形成5种运行工况对应的安全关车控制策略;经调试运行:各功能模块能够实现设计功能,稳定段总压控制精度为0.2%,满足压力控制精度要求;安全关车控制策略可以在异常报警情况下实现压力调节,模型迎角回零以及调压阀关闭,完成安全关车,保证风洞安全。 展开更多
关键词 风洞 组态方式 安全关
下载PDF
体育教师如何在体育课中把好安全关 被引量:1
2
作者 李辉 《德州学院学报》 2012年第S1期225-226,共2页
体育课中确实存在一定的风险与安全问题,体育教师要特别注意安全问题,防止运动损伤与伤害事故的发生,切实把好安全关。
关键词 体育教师 体育课 安全关
下载PDF
一种新型轨道交通控制用安全关断电路
3
作者 周舒扬 陈亚骏 王晓龙 《城市轨道交通研究》 北大核心 2013年第5期76-79,共4页
安全关断电路是轨道交通控制系统中必不可少的组成部分,其性能对轨道交通控制系统的可靠性和安全性有着重要的影响。分析了轨道交通控制系统中安全关断电路的设计要求,在故障-安全设计方法的指导下设计了一种新型的安全关断电路。该电... 安全关断电路是轨道交通控制系统中必不可少的组成部分,其性能对轨道交通控制系统的可靠性和安全性有着重要的影响。分析了轨道交通控制系统中安全关断电路的设计要求,在故障-安全设计方法的指导下设计了一种新型的安全关断电路。该电路在满足性能要求的同时满足相关标准的可靠性和安全性要求。所设计的安全关断电路已通过样机测试并准备投入应用。 展开更多
关键词 内在式失效-安全 安全关断电路 轨道交通控制 系统
下载PDF
Foxmail5.0攻克安全关
4
作者 小梅 《中学生电脑》 2003年第11期18-19,共2页
关键词 Foxmail5.0版 安全关 中学 计算机 教学 电子邮件 邮件发送
下载PDF
八月十五 把住月饼安全关
5
作者 陈敬 罗小春 《质量技术监督研究》 2002年第9期25-28,共4页
不用谁提醒,也不必查看日历,只需感受一下大街小巷那花花绿绿、热热闹闹的月饼广告,闻一闻扑面而来的阵阵饼香,人们自然会想到:一年一度的中秋佳节又来到了。 年年中秋,今又中秋。年年月饼,年年有新味。中秋节不能没有月饼,因为它寄托... 不用谁提醒,也不必查看日历,只需感受一下大街小巷那花花绿绿、热热闹闹的月饼广告,闻一闻扑面而来的阵阵饼香,人们自然会想到:一年一度的中秋佳节又来到了。 年年中秋,今又中秋。年年月饼,年年有新味。中秋节不能没有月饼,因为它寄托着人们无限的祝福和向往。商家热爱中秋节,因为月饼销售是其不可多得的商机。而本刊今天推出此月饼专版,是想为消费者选购月饼作一点小小的提示,为中秋这一合家团圆的美好节日尽一份心意。 展开更多
关键词 安全关 月饼市场 糕点 中秋节 消费者委员会 食品标准 市场准入制度 食品市场准入 质监 南京冠生园
下载PDF
“老不时髦”严把“安全关”
6
作者 韩玉贵 《农电管理》 2002年第9期37-37,共1页
关键词 安全关 习惯性违章 农网改造 热闹的场面 倒杆 违反规程 安全隐患 安全事故 误工期 安全监督
下载PDF
石家庄地区严把企业升级安全关
7
《劳动保护》 北大核心 1990年第1期7-8,共2页
关键词 石家庄地区 安全关 企业升级 考核验收 企业安全生产 生产现场 独审 职工安全教育 劳动安全监察 安全管理
原文传递
某亚跨超声速风洞安全联锁控制系统研制 被引量:1
8
作者 马列波 高鹏 +2 位作者 陈海峰 阎成 唐子奇 《测控技术》 2021年第9期96-101,共6页
某亚跨超声速风洞安全联锁控制系统针对风洞复杂的运行工况,采用Profinet实时以太网RT通信协议,对安全联锁控制策略以及PLC软件关车程序进行模块化设计,实现了风洞系统状态的实时监测,安全联锁控制策略的自动配置部署以及自动回零、手... 某亚跨超声速风洞安全联锁控制系统针对风洞复杂的运行工况,采用Profinet实时以太网RT通信协议,对安全联锁控制策略以及PLC软件关车程序进行模块化设计,实现了风洞系统状态的实时监测,安全联锁控制策略的自动配置部署以及自动回零、手动、紧急这3种安全关车手段,保证了风洞试验的高效安全运行。 展开更多
关键词 亚跨超声速风洞 安全联锁 实时监测 安全关
下载PDF
铁路信号域形式化方法研究 被引量:3
9
作者 张磊 吴芳美 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2002年第10期1281-1284,共4页
铁路信号系统作为安全关键系统 ,它的失效可能带来灾难性的后果或重大经济损失 ,因此 ,安全关键系统的软件开发对可靠性和安全性的要求非常苛刻 .而需求分析及描述是软件生命周期的一个重要环节 ,它所确立的系统逻辑模型是设计和实现目... 铁路信号系统作为安全关键系统 ,它的失效可能带来灾难性的后果或重大经济损失 ,因此 ,安全关键系统的软件开发对可靠性和安全性的要求非常苛刻 .而需求分析及描述是软件生命周期的一个重要环节 ,它所确立的系统逻辑模型是设计和实现目标系统的基础 .提出了一种适合于计算机处理的铁路信号域知识的形式化表达方法 ,希望代替以往继电器接点电路表示的逻辑关系处理方式 . 展开更多
关键词 形式化方法 知识表示 铁路信号系统 安全关链系统 软件开发
下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
10
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
抓好大容量火电机组试运中的重点关
11
作者 李兴平 孙东新 李刚 《科技资讯》 2007年第29期14-15,共2页
火电机组调试中,由于受到影响的因素较多,容易出现各种各样的问题,只要把握好机组试运中的重点关,就可以少出问题,作到事半功倍之目的。
关键词 火电机组 试运 安全关 调试 验收 组织 计划 培训
下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
12
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
下载PDF
Safety evaluation on the clinical application of Tenghuangjiangu tablet for osteoarthritis:a hospital registration study 被引量:2
13
作者 Min Huang 《Traditional Medicine Research》 2017年第1期51-57,共7页
To evaluate the treatment safety of Tenghuangjiangu tablet on osteoarthritis,3365 osteoarthritis patients whose prescription included Tenghuangjiangu tablet from 15 hospitals were involved in the prospective and multi... To evaluate the treatment safety of Tenghuangjiangu tablet on osteoarthritis,3365 osteoarthritis patients whose prescription included Tenghuangjiangu tablet from 15 hospitals were involved in the prospective and multi-center clinical trial.Tenghuangjiangu tablet dosage was decided by instruction or doctors’experience.The course of treatment and observation was 4 weeks.The adverse drug reactions were observed in the treatment process.Results showed male and female patients were 1018(30.25%)and 2347(69.75%),respectively,and 528 patients had allergic history.The patients’average age was 58.30±8.99 years,and the average disease course was 33.29±37.40 months.The average score of WOMAC scale was 95.07±42.42,which indicated the light conditions.2275 patients were treated with combined drug regimen.There were two adverse drug reactions in this research.One reaction was skin rashes with itching and the interventions were stopped original drugs and give antianaphylactic treatment.The other reaction was stomach discomfort with disgusting and the intervention was stopped the original drugs temporarily,then continued to take two drugs after 3 days and the reaction didn’t appear.The accident rate of adverse drug reaction was 0.059%.The safety of Tenghuangjiangu tablet clinical application was good,and the mechanism of adverse drug reaction should be researched in-depth. 展开更多
关键词 Tenghuangjiangu tablet SAFETY OSTEOARTHRITIS
下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
14
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
Application of causality diagram in system safety analysis 被引量:1
15
作者 梁新元 《Journal of Chongqing University》 CAS 2005年第3期158-163,共6页
Causality Diagram (CD) is a new graphical knowledge representation based on probability theory. The application of this methodology in the safety analysis of the gas explosion in collieries was discussed in this paper... Causality Diagram (CD) is a new graphical knowledge representation based on probability theory. The application of this methodology in the safety analysis of the gas explosion in collieries was discussed in this paper, and the Minimal Cut Set, the Minimal Path Set and the Importance were introduced to develop the methodology. These concepts are employed to analyze the influence each event has on the top event ? the gas explosion, so as to find out about the defects of the system and accordingly help to work out the emphasis of the precautionary work and some preventive measures as well. The results of the safety analysis are in accordance with the practical requirements; therefore the preventive measures are certain to work effectively. In brief, according to the research CD is so effective in the safety analysis and the safety assessment that it can be a qualitative and quantitative method to predict the accident as well as offer some effective measures for the investigation, the prevention and the control of the accident. 展开更多
关键词 causality diagram (CD) gas explosion safety analysis minimal cut set (MCS) minimal path set (MPS)
下载PDF
T-IP: A Self-Trustworthy and Secure Internet Protocol
16
作者 Xiaofeng Wang Huan Zhou +3 位作者 Jinshu Su Baosheng Wang Qianqian Xing Pengkun Li 《China Communications》 SCIE CSCD 2018年第2期1-14,共14页
IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose ... IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec. 展开更多
关键词 identity-based cryptography self-trustworthy LIGHTWEIGHT low latency in-cremental deployment
下载PDF
A software cost model with maintenance and risk costs for safety-critical systems
17
作者 刘宏伟 杨孝宗 +1 位作者 曲峰 董剑 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期584-587,共4页
According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are ... According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained. 展开更多
关键词 safety-critlcal system software reliability growth model software cost model optimal software release time
下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
18
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
下载PDF
Improved slope safety analysis by new Druker-Prager type criterion 被引量:1
19
作者 朱俊高 彭凯 +1 位作者 J.F.Shao 刘汉龙 《Journal of Central South University》 SCIE EI CAS 2012年第4期1132-1137,共6页
Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptio... Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria. 展开更多
关键词 yield criterion non-associated flow rule dilatancy angle plastic potential function
下载PDF
Regulation or Property Rights: The Effect of China's Coal Mine Shutdown Policy on Work Safety
20
作者 白重恩 王鑫 钟笑寒 《China Economist》 2012年第3期114-127,共14页
Since 1999, shutdown policy has been one of the most important industrial policies in China 'S coal mining industry. There have been many controversies surrounding this policy and its effect on coal mine safety. This... Since 1999, shutdown policy has been one of the most important industrial policies in China 'S coal mining industry. There have been many controversies surrounding this policy and its effect on coal mine safety. This paper summarizes, analyzes and tests two contradicting views of the effects of shutdown policy on the mortality rate of township-and-village-owned coal mines. One view, or the regulative view, believes that shutdown policy induces firms to increase safety input, thus decreasing mortality. The opposing view, or the property rights view, argues that shutdown policy disturbs property rights stability and actually increases mortality. We built a simple theoretical model to analyze these contrasting rationales. The model uses the difference-in-difference method and provincial panel data from 1995 to 2005 to empirically test the policy's effects. Our findings are that shutdown policy significantly decreases output while also increasing mortality in township-and-village coal mines. This result is consistent with the property rights view. 展开更多
关键词 REGULATION property rights shutdown policy coal mine safety differencen-difference
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部