期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
中小学校安全管理模式及其启示——以赣州市学校安全台帐管理为例 被引量:3
1
作者 石连海 《当代教育科学》 北大核心 2009年第24期50-52,共3页
中小学校安全问题已成为全社会关注的焦点,成为制约教育发展的瓶颈。为解决这个问题,国家、地方政府、各级教育行政部门以及学校都进行了积极的探索,在这一探索中学校安全台帐管理模式在学校安全管理中取得了显著成效。学校安全事故明... 中小学校安全问题已成为全社会关注的焦点,成为制约教育发展的瓶颈。为解决这个问题,国家、地方政府、各级教育行政部门以及学校都进行了积极的探索,在这一探索中学校安全台帐管理模式在学校安全管理中取得了显著成效。学校安全事故明显减少,学校安全压力减轻,通过安全台帐的实施明确了安全责任的主体,安全职责清晰,这种新的安全管理模式值得学校举办者、管理者学习和借鉴。 展开更多
关键词 中小学安全 安全台 管理模式
下载PDF
塑料排水带应用于安全台排水固结的可行性分析 被引量:1
2
作者 梁沛华 何金平 《装备制造技术》 2008年第3期24-25,30,共3页
通过对软基处理方式,特别是排水固结方式的系统分析,研究了采用塑料排水带作为洞庭湖安全台排水固结措施的可行性,提出了水平向布置塑料排水带的思路,并对其经济性进行了比较和分析,拓宽了塑料排水带的应用范围。
关键词 安全台 排水固结 塑料排水带 可行性分析
下载PDF
天桥电厂安全台账汇总分析
3
作者 刘守忠 赵清华 《华北电力技术》 CAS 北大核心 1989年第9期30-32,共3页
本文根据天桥电厂的安全记录分析了该厂生产设备管理中的薄弱环节,对现存的事故隐患、典型的重复事故、障碍、异常进行了剖析。并从设备管理、心理因素对策两方面提出建议。
关键词 火力发电厂 安全台 设备管理 企业管理
下载PDF
安全台吹填工程中土料的排水设计
4
作者 胡跃辉 《科技资讯》 2007年第31期63-,共1页
在用挖泥船吹填的安全台工程中,若土料渗透系数较小且使其自然固结,固结时间会很长,安全台必定不能按时投入使用,会影响当地社会经济的发展。本排水设施设计能较大程度地加速安全台的排水固结,使其能按时投入使用。
关键词 安全台 吹填 渗透系数 排水 固结
下载PDF
为留守儿童 建安全台帐
5
作者 蒋鑫 《中国民政》 2016年第2期62-62,共1页
自2015年9月以来,贵州省盘县开展了为期3个月的留守儿童安全大排查,建立了留守儿童安全台账,完善了工作组织网络机构,有效防范侵犯留守儿童权益及留守儿童安全事故的发生。对排查发现的留守儿童身边的安全隐患,立即采取措施排除;... 自2015年9月以来,贵州省盘县开展了为期3个月的留守儿童安全大排查,建立了留守儿童安全台账,完善了工作组织网络机构,有效防范侵犯留守儿童权益及留守儿童安全事故的发生。对排查发现的留守儿童身边的安全隐患,立即采取措施排除;对暂时不能整改的隐患和问题,落实防范措施,指定专人负责,限期整改落实。 展开更多
关键词 留守儿童 安全台 儿童安全 有效防范 安全隐患 限期整改 网络机构 工作组织
下载PDF
做好施工企业安全台帐,为安全施工服务
6
作者 吴永规 《电力档案》 2002年第4期50-53,共4页
关键词 安全管理 安全台 安全档案 施工企业
下载PDF
谈交通工程安全台帐管理 被引量:1
7
作者 汤洪文 《才智》 2008年第15期265-266,共2页
阐述安全生产台帐的意义,分析当前交通工程安全台帐管理存在的问题,提出加强工程安全台帐建设的对策。
关键词 安全台帐管理
原文传递
民主垸蓄洪安全建设人口安置规划方案研究 被引量:1
8
作者 李志斌 张愫 《湖南水利水电》 2013年第6期41-43,共3页
民主垸为湖南省洞庭湖区24个蓄洪垸之一,在分析该垸蓄洪安全建设和人口安置现状的基础上,对人口安置方案进行了技术经济比较,确定利用现有安全台安置1.84万人,规划3个安全区安置8.28万人,新(扩)建6个安全台安置1.76万人。该方案在《全... 民主垸为湖南省洞庭湖区24个蓄洪垸之一,在分析该垸蓄洪安全建设和人口安置现状的基础上,对人口安置方案进行了技术经济比较,确定利用现有安全台安置1.84万人,规划3个安全区安置8.28万人,新(扩)建6个安全台安置1.76万人。该方案在《全国蓄滞洪区建设与管理规划报告》中人口安置方案的基础上增加了安全区,减少了安全台,更有利于垸内人民生命财产安全和社会经济发展,可供洞庭湖区同类工程参考。 展开更多
关键词 蓄洪安全建设 安全 安全台 人口安置规划
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
9
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
Analyzing the safety of removal sequences for piles of an offshore jacket platform
10
作者 潘新颖 张兆德 《Journal of Marine Science and Application》 2009年第4期311-315,共5页
An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming a... An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,. 展开更多
关键词 jacket platform REMOVAL safety analysis STRESS
下载PDF
简讯
11
《消防月刊》 1998年第9期44-44,共1页
全省消防部队宣传骨干 培训班在兰举办 5月18日至26目省公安消防总队在兰州举办了全省消防部队宣传骨干培训班。来自全省14个地、州、市消防支队的34名宣传业务骨干及总队宣传处的同志参加了培训。兰州大学新闻系副教授王作仁、张燕,甘... 全省消防部队宣传骨干 培训班在兰举办 5月18日至26目省公安消防总队在兰州举办了全省消防部队宣传骨干培训班。来自全省14个地、州、市消防支队的34名宣传业务骨干及总队宣传处的同志参加了培训。兰州大学新闻系副教授王作仁、张燕,甘肃日报社郝利平、陈国祥、田萍等老新闻工作者应邀讲课。参训学员对五泉山公园古建筑及西北石化公司西固油库的防火情况进行了实地参观采访,并写了采访习作。平凉支队陶华、甘南支队邢耀峰、兰州支队李成宏介绍了新闻报道工作中积累的经验和体会。 展开更多
关键词 消防监督 消防部队 重点单位 平凉 油库 安全台 五泉山 消防安全检查 金塔县 甘肃
下载PDF
洋溪水利枢纽临时滞洪影响区处理方案比较
12
作者 覃严 《广西水利水电》 2017年第4期21-24,共4页
介绍了洋溪水利枢纽工程及其临时滞洪影响区的概况。根据有关规范要求,因地制宜提出洋溪水利枢纽工程临时滞洪影响区处理方案,通过对安全楼和安全台两种避洪方案的分析比较,推荐安全楼避洪为选择方案。并提出了对临时滞洪影响区规划设... 介绍了洋溪水利枢纽工程及其临时滞洪影响区的概况。根据有关规范要求,因地制宜提出洋溪水利枢纽工程临时滞洪影响区处理方案,通过对安全楼和安全台两种避洪方案的分析比较,推荐安全楼避洪为选择方案。并提出了对临时滞洪影响区规划设计的建议。 展开更多
关键词 蓄滞洪区 临时滞洪 安全 安全台 洋溪水利枢纽
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
13
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
Safety assessment of platform loadout procedures based on unascertained measures 被引量:4
14
作者 李彦苍 索娟娟 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2007年第4期354-358,共5页
Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they... Safety assessment of offshore platforms is an urgent task. Such assessments are now focusing on the structure, maintenance, and retirement of a platform. Some methods employed have many shortcomings. For example, they cannot make the reliability adequately explicable. Therefore, a mathematical tool, the unascertained measure, was introduced. First, the basic knowledge of the unascertained sets was introduced briefly. Second, the unascertained measure was defined and credible identification was set up. The method has been introduced into the fields for safety assessment of a jacket loadout procedure. Engineering practices showed that it can complete the safety assessment systematically and scientifically without any assumption. The work should have significance in theory and practice for offshore engineering. 展开更多
关键词 safety assessment offshore platform INSTALLATION unascertained measure information entropy
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
15
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Towards Efficient Security Policy Lookup on ManyCore Network Processing Platforms 被引量:1
16
作者 WANG Xiang QI Yaxuan +2 位作者 WANG Kai XUE Yibo LI Jun 《China Communications》 SCIE CSCD 2015年第8期146-160,共15页
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing... Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed. 展开更多
关键词 packet classification patternmatching ALGORITHMS data structures
下载PDF
Comparison of the safety and efficacy of two types of drug-eluting balloons (RESTORE DEB and SeQuent Please) in the treatment of coronary in-stent restenosis: study protocol for a randomized controlled trial (RESTORE ISR China)
17
作者 Lei GAO Qin QIN +9 位作者 Shao-Liang CHEN Hui CHEN Le-Feng WANG Ze-Ning JIN Hui LI Jun ZHANG Jian-An WANG Yang ZHENG Guo-Sheng FU Yun-Dai CHEN 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2018年第2期117-122,共6页
1 Introduction In-stent restenosis (ISR), characterized by neointimal proliferation and/or neoatherosclerosis in the vessel of the stent, can cause a reduction in lumen diameter after stent implantation, which can d... 1 Introduction In-stent restenosis (ISR), characterized by neointimal proliferation and/or neoatherosclerosis in the vessel of the stent, can cause a reduction in lumen diameter after stent implantation, which can directly induce the recurrence of angina symptoms or an acute coronary syndrome in patients and is usually life-threatening. 展开更多
关键词 Drug-eluting balloons In-stent restenosis Percutaneous coronary interventions
下载PDF
Development of a six drillhead roof bolting machine 被引量:1
18
作者 Kyslinger Bill A. 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2017年第1期37-41,共5页
In underground mining, machine design is predominantly dictated by mine conditions and individual customer desires. In partnership with Foresight Energy, J. H. Fletcher & Company was tasked to design and manufactu... In underground mining, machine design is predominantly dictated by mine conditions and individual customer desires. In partnership with Foresight Energy, J. H. Fletcher & Company was tasked to design and manufacture a new roof bolting machine with six independent drilling apparatus on board capable of drilling and bolting the roof and ribs with material handling. The objective was to produce a machine capable of drilling and installing six bolts simultaneously with a limited number of operators. The goal of the mine is to decrease the time to bolt a cut to improve the safety level of the current roof bolting method, improve efficiency and to improve the bottom line cost of entry development. The customer wanted four drills at the front of the machine dedicated to installing roof bolts and then another two drills behind them dedicated to rib bolts. This dictated the requirement of latched controls, which would allow the operator to start drilling one hole and then latch the controls to be able to move on to the next.The result of the design is a machine with a single platform and six independent masts with drillheads:four masts strictly for drilling and installing roof bolts on the front of the platform and two masts on the back of the platform for rib bolts. The controls at each operator's station include a latch control for drilling. The six-head roof bolter allows fewer operators to drill and install roof and rib bolts, which in turn lowers the miners' roof exposure per cut. This design reduces the operator's exposure from the inherent pinch points and rotary hazards once he has engaged the latch drilling. Therefore, the machine will help to decrease the time to bolt a cut, improving productivity while enhancing the ability to operate the machine safely. 展开更多
关键词 Roof bolter MiningSix-head FletcherLatched Material handling
下载PDF
Research on Network Platform of Information Management and Security
19
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
Research on Heterogeneous Network Security Devices
20
作者 Yishui Lin Tingting Yu 《International Journal of Technology Management》 2013年第3期23-27,共5页
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de... With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices. 展开更多
关键词 heterogeneous networks security management security equipment
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部