期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
虑及技术系统复杂性的基层核化安全策略
1
作者 沈志刚 《工业安全与环保》 2023年第1期72-75,共4页
针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安... 针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安全管理模式应对安全风险涌现的不足。提出基于技术系统时空风险公式的核化安全策略,罗列了4种风险成分的主要应对策略,阐述了在班组层面的关联化、信息化手段,分析了企业整合班组策略的作用点与总体步骤,并为安全信息化技术指出新的开发方向。 展开更多
关键词 基层班组 技术系统 风险涌现 安全复杂性 核化安全策略 信息化
下载PDF
滞后非线性车辆悬架系统多频激励下的安全与复杂性分析 被引量:1
2
作者 于威威 管克英 郭璇 《工程力学》 EI CSCD 北大核心 2007年第12期175-180,共6页
结合顺行平面Hamilton系统周期-能量关系和KAM理论,研究滞后非线性单自由度1/4车辆悬架系统多频激励下的受扰振动问题,给出两种初值条件下系统受扰固有周期运动的理论解析,证明了系统存在安全的拟周期状态。借助Melnikov函数讨论了系统... 结合顺行平面Hamilton系统周期-能量关系和KAM理论,研究滞后非线性单自由度1/4车辆悬架系统多频激励下的受扰振动问题,给出两种初值条件下系统受扰固有周期运动的理论解析,证明了系统存在安全的拟周期状态。借助Melnikov函数讨论了系统产生混沌的可能性及成因,分别对系统拟周期及混沌状态进行了数值模拟。为悬架系统的参数识别、稳定区域分析及优化设计提供理论依据。 展开更多
关键词 滞后非线性车辆悬架系统 安全复杂性分析 周期-能量关系 KAM理论 MELNIKOV函数
下载PDF
安全复杂学的学科基础理论研究:为安全科学新高地奠基 被引量:16
3
作者 吴超 《中国安全科学学报》 CAS CSCD 北大核心 2021年第5期7-17,共11页
为填补安全复杂学学科基础理论的空白和构建安全复杂学,运用历史分析法、推理法、归纳法、理论建模法和预测法等开展理论研究,预测未来安全科学研究的热点问题,提出判断安全复杂问题的4种途径,给出安全复杂性研究需要遵循的8条基本原则... 为填补安全复杂学学科基础理论的空白和构建安全复杂学,运用历史分析法、推理法、归纳法、理论建模法和预测法等开展理论研究,预测未来安全科学研究的热点问题,提出判断安全复杂问题的4种途径,给出安全复杂性研究需要遵循的8条基本原则,创建安全复杂学的5个核心概念和基于安全系统学的9个基础定义,归纳出安全复杂性研究的9类典型方法,构建表征安全复杂系统的通用模型及其超逻辑结构图和表达式,并提出安全复杂系统控制的5种策略,最后从8种视角给出安全复杂学的学科分支。研究结果表明:上述研究结果契合安全科学的发展趋势,构成安全复杂学的学科理论基础。 展开更多
关键词 安全复杂 学科基础理论 安全复杂问题 安全复杂性研究 安全系统
下载PDF
工业建筑结构设计的复杂性与安全性
4
作者 戚爱玲 《现代物业(中旬刊)》 2019年第3期38-38,共1页
随着我国国民经济迅速发展,我国工业也在不断进步,整体的工业化进程也在不断推进。在建筑行业发展的背景下,我国市场主要呈现出了工业建筑规模增加的趋势。为了能够保证工业建筑的质量,因此要从工业结构设计的复杂性与安全性这两个方面... 随着我国国民经济迅速发展,我国工业也在不断进步,整体的工业化进程也在不断推进。在建筑行业发展的背景下,我国市场主要呈现出了工业建筑规模增加的趋势。为了能够保证工业建筑的质量,因此要从工业结构设计的复杂性与安全性这两个方面来对工业建筑进行规范。本文通过,对工业建筑结构类型进行分析对比,并对结构设计中所涉及到的数据进行阐述,对工业建筑项目的施工提出相应的对策,就工业建筑项目如何以高质量完成提出建议。 展开更多
关键词 工业建筑 结构设计 复杂性安全
下载PDF
解读工业建筑结构设计的复杂性和安全性问题
5
作者 闵道武 《中文科技期刊数据库(文摘版)工程技术》 2022年第9期198-200,共3页
工业建筑涉及范围比较广泛,工厂生产场地及相关工业行为进行的建筑物都可称之为工业建筑,是工业方面大型建筑物的总称。工业生产直接关系到我国的经济发展,而工业建筑的结构设计也对工业生产效率产生直接的影响,工业建筑在结构设计的基... 工业建筑涉及范围比较广泛,工厂生产场地及相关工业行为进行的建筑物都可称之为工业建筑,是工业方面大型建筑物的总称。工业生产直接关系到我国的经济发展,而工业建筑的结构设计也对工业生产效率产生直接的影响,工业建筑在结构设计的基础上开展其他工作的开展,建筑结构设计对工业建筑建设有着特殊的指导作用,其中建筑结构设计准则明确规定了工业结构设计的基本材料、工艺、规范和条件,建筑结构设计可以使传统抽象主义的一般化工业建设更为系统化、实用化,方便相关主管部门借鉴和协调运用,并对工业生产建设具有重要的社会影响和实用价值。工程结构设计包含方面广泛且繁多复杂,且对安全性有一定的要求,本文从实际案例出发,着重从工业建筑结构设计的复杂性和安全性入手,并对如何实现复杂性和安全性的整合展开讨论。 展开更多
关键词 工业建筑 结构设计 复杂性安全
下载PDF
复杂性时代国家安全学的总体性、现代性与自反性
6
作者 杨华锋 沈绎州 《国家安全研究》 2024年第3期41-59,147,148,共21页
随着风险传导与演化的复杂性与不确定性趋升,安全边界日益模糊,基于工业线性思维的分工型社会日益陷入治理困境。以跨门类交叉、科际融合为特征的国家安全学基于融合型社会非线性发展的需要应运而生。回望来路,国家安全学学科建设经历... 随着风险传导与演化的复杂性与不确定性趋升,安全边界日益模糊,基于工业线性思维的分工型社会日益陷入治理困境。以跨门类交叉、科际融合为特征的国家安全学基于融合型社会非线性发展的需要应运而生。回望来路,国家安全学学科建设经历了“茕茕孑立,形影相吊”到“百花齐放,百家争鸣”再到“交叉融合,协同并进”三个历史阶段,呈现出从个体化、碎片化向系统化、协同化不断发展的趋势,彰显总体性建构的特征。在总体性建构的指引下,国家安全学肩负推进国家安全体系与能力建设的现代性使命,从理念话语体系的中国化、国家安全体系的现代化和安全治理能力的协同化三个维度勾勒出学科发展的任务与内容。瞻望前路,国家安全学将以自反性思维检视自主知识体系所依凭的问题意识与方法体系,并以新型学术命运共同体的建构为路径,在学科交叉与融合创新的基础上,推出超学科化的理论产品以适应实践需求。 展开更多
关键词 国家安全复杂性 总体性 现代性 自反性
原文传递
关于水利工程建设现场安全管理
7
作者 李淑娟 《黑龙江科技信息》 2012年第30期261-261,共1页
随着我国经济的发展,我国建筑业也取得了一定的发展成绩。下文中笔者将结合自己的工作经验,对水利工程的建设现场管理问题进行分析,文中笔者将从水利工程的工特点和隐患、水利工程现场安全管理要点几个方面,对水利工程建设的现场安全管... 随着我国经济的发展,我国建筑业也取得了一定的发展成绩。下文中笔者将结合自己的工作经验,对水利工程的建设现场管理问题进行分析,文中笔者将从水利工程的工特点和隐患、水利工程现场安全管理要点几个方面,对水利工程建设的现场安全管理问题进行探讨,谈谈自己的看法和建议。 展开更多
关键词 水利工程:安全管理:复杂性
下载PDF
Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding 被引量:9
8
作者 LIU Guangjun LIU Binyue +2 位作者 LIU Ximeng LI Fang GUO Wangmei 《China Communications》 SCIE CSCD 2015年第6期116-125,共10页
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions... Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively. 展开更多
关键词 network coding security wiretap-ping attacks algebraic coding ENCRYPTION
下载PDF
Key substitution attacks on some verifiably encrypted signature schemes
9
作者 夏琦 Xu Chunxiang Yu Yong 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos... As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting. 展开更多
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
10
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
下载PDF
Theoretical study on safety assessment indexes system of coal mines
11
作者 施式亮 李润求 谢建湘 《Journal of Coal Science & Engineering(China)》 2003年第2期63-69,共7页
The safety status of the coal mines is closely correlated with the operating status and its changes of the whole working system in the coal mines, and the safety system is the sub system of the whole production system... The safety status of the coal mines is closely correlated with the operating status and its changes of the whole working system in the coal mines, and the safety system is the sub system of the whole production system. In this paper, based on the analysis of the complicacy of the safety sub system and its affecting factors, the theory basis of the indexes system of the safety assessment was studied, including the establishing principles of the indexes system , the structure of the indexes system, the determining methods of the assessment indexes. The complete indexes system was established for the safety assessment of the coal mines in the paper. 展开更多
关键词 safety assessment index system coal mines
下载PDF
Information Security Protocol Based System Identification with Binary-Valued Observations 被引量:2
12
作者 XU Changbao ZHAO Yanlong ZHANG Ji-Feng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期946-963,共18页
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases. 展开更多
关键词 CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部