期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
浅谈如何在电视播出条件下进行现场扩声制作
1
作者 黄晨 《现代电视技术》 2023年第2期102-106,共5页
本文以江苏卫视大型综艺节目录制和直播为例,介绍了在电视播出条件下,现场扩声制作的特点、制作流程和制作经验。从理论、实际操作和经验总结等多个层面,对电视播出条件下的现场扩声制作进行了探讨。
关键词 电视播出 现场扩声 制作安全 融合协作
下载PDF
案例式变电站安全仿真培训系统设计与实现 被引量:4
2
作者 谭武光 张德刚 +4 位作者 江龙 李泽河 王达达 曹俊豪 王国平 《电工技术》 2018年第8期73-75,78,共4页
基于虚拟现实技术设计了一种案例式电力安全仿真培训系统,详细介绍了该系统的软硬件设计,重点介绍该系统采用的安全事故案例制作、沉浸式立体显示、自然人机交互和变电站多人协同操作等技术,实践证明,该系统通过沉浸式视觉体验和自然操... 基于虚拟现实技术设计了一种案例式电力安全仿真培训系统,详细介绍了该系统的软硬件设计,重点介绍该系统采用的安全事故案例制作、沉浸式立体显示、自然人机交互和变电站多人协同操作等技术,实践证明,该系统通过沉浸式视觉体验和自然操作交互方式实现了高效的安全教育培训方式,使学员在逼真的虚拟培训环境中,深刻体验违反安全规程操作的严重后果,从而提高培训效果。 展开更多
关键词 变电站安全培训仿真 变电站安全事故案例制作技术 立体显示 自然交互
下载PDF
论融媒体时代安全播出的重要性
3
作者 段盛云 《卫星电视与宽带多媒体》 2021年第11期103-104,共2页
融媒体时代下的广播电视安全播出既是广播电视系统的生命线,也是广电技术系统的根本任务和核心内容。
关键词 安全播出 制作安全 设备安全 操作安全 供配电安全 环境安全
下载PDF
分析化学实验学生易犯错误分析
4
作者 戴素珍 《张家口师专学报(自然科学版)》 1989年第1期61-62,共2页
本文讨论了人与安全,制度与安全的关系,分析了学生实验易犯的错误。
关键词 分析化学实验 错误分析 化学实验室 实验操作 安全制作 实验室管理
下载PDF
烟草企业如何构建自己的网站
5
作者 王峙 禹舰 钟净 《烟草科技》 EI CAS 2001年第5期30-32,共3页
对烟草企业网站建设过程的各个层次进行了分析 ,综合探讨了网络性能、网站设计制作及网络安全等方面的因素 ,以及企业网站建设的方法及采用的关键技术 ,提出了企业网站建设的 4个原则 ,介绍了适合企业网站建设的系统软硬件平台 ,以及网... 对烟草企业网站建设过程的各个层次进行了分析 ,综合探讨了网络性能、网站设计制作及网络安全等方面的因素 ,以及企业网站建设的方法及采用的关键技术 ,提出了企业网站建设的 4个原则 ,介绍了适合企业网站建设的系统软硬件平台 ,以及网站设计的制作 ,包括制作原则和制作工具等 ,为行业建立高效、实时。 展开更多
关键词 烟草企业 网站建设 设计 制作网络安全
下载PDF
THE PROPERTIES AND LONGITUDINAL EXPERIENCE OF CHINESE TYPE A BOTULINUM TOXIN FOR THE TREATMENT OF FOCAL DYSTONIA AND HEMIFACIAL SPASM 被引量:3
6
作者 万新华 汤晓芙 王荫椿 《Chinese Medical Sciences Journal》 CAS CSCD 2003年第4期254-259,共6页
Objective.To introduce the properties of Chinese type A botulinum toxin(CBTXA,made by Lanzhou Institute of Biological Products),and its long?term effect for focal dystonia and hemifacial spasm.Method.The purity and re... Objective.To introduce the properties of Chinese type A botulinum toxin(CBTXA,made by Lanzhou Institute of Biological Products),and its long?term effect for focal dystonia and hemifacial spasm.Method.The purity and recovery of crude and crystalline toxin were tested.Long?term data from305patients with hemifacial spasm(HFS),blepharospasm(BS)and cervical dystonia(CD)were evalu-ated and subgroups of patients received CBTXA injections between1994and2000in at least six sepa-rate treatment sessions,with follow up for2~8years.The therapeutic results of the last session CBTXA injections were analyzed in comparison with the first session.Result.CBTXA purity was high[(2.55~2.60)×10 7 LD50/mgPr ,A260/A280≤0.55,high molecular substance accounted for99.2%of total proteins].Long term treatment with CBTXA in patients with focal dystonia and HFS was not associated with any decline in benefit,and efficacy may improve slightly with repeat treatments.CBTXA is an excellent long-term treatment of HFS,BS and CD.Conclusion.We conclude that Chinese type A botulinum toxin is of botulinum toxin therapy quality standard according to results obtained from the basic study and long?term clinical applications.The re?injection of CBTXA significantly improves the quality of life of most patients and is a safe,effective and comparatively economical treatment for patients with focal dystonia and HFS. 展开更多
关键词 botulinum toxin type A focal dystonia hemifacial spasm
下载PDF
Void fill techniques for stabilizing roof conditions during longwall recovery 被引量:2
7
作者 Oldham Robin Dickerson Craig Mc Henry Rusty 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2016年第1期119-122,共4页
It has been proven that longwall faces can be moved safely and efficiently. However,abutment pressures and poor ground control conditions can halt operations and be hazardous to coal miners. Recently at a mine in Sout... It has been proven that longwall faces can be moved safely and efficiently. However,abutment pressures and poor ground control conditions can halt operations and be hazardous to coal miners. Recently at a mine in Southwestern Pennsylvania,roof material collapsed above shields that created two large voids and caused major challenges for shield recovery. A unique,engineering solution was developed that utilized a modified concrete material to fill the voids,creating stability in the affected area. The many phases of this project included the construction phase,void pumping,cutting out,and bolting of the concrete material. This project eliminated the hazards associated with bolting the recovery face and removing shields in adverse conditions,making it possible for the mine operator to safely complete the longwall move. 展开更多
关键词 Longwall miningLongwall recoveryVoid fillNon-traditional recovery
下载PDF
A Control Simulation Method of High-Speed Trains on Railway Network with Irregular Influence
8
作者 杨立兴 李想 李克平 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第9期411-418,共8页
Based on the discrete time method, an effective movement control model is designed for a group of high- speed trains on a rail network. The purpose of the model is to investigate the specific traffic characteristics o... Based on the discrete time method, an effective movement control model is designed for a group of high- speed trains on a rail network. The purpose of the model is to investigate the specific traffic characteristics of high-speed trains under the interruption of stochastic irregular events. In the model, the high-speed rail traffic system is supposed to be equipped with the moving-block signalling system to guarantee maximum traversing capacity of the railway. To keep the safety of trains' movements, some operational strategies are proposed to control the movements of trains in the model, including traction operation, braking operation, and entering-station operation. The numerical simulations show that the designed model can well describe the movements of high-speed trains on the rail network. The research results can provide the useful information not only for investigating the propagation features of relevant delays under the irregular disturbance but also for rerouting and reseheduling trains on the rail network. 展开更多
关键词 high-speed train rail network discrete-time simulation irregular event
下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
9
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
下载PDF
Design of motion control of dam safety inspection underwater vehicle 被引量:5
10
作者 孙玉山 万磊 +2 位作者 甘永 王建国 姜春萌 《Journal of Central South University》 SCIE EI CAS 2012年第6期1522-1529,共8页
Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(... Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials. 展开更多
关键词 dam safety inspection remotely operated vehicle (DSIROV) control system architecture embedded system automaticcontrol of dam-scanning dead-reckoning
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
11
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部