期刊文献+
共找到160篇文章
< 1 2 8 >
每页显示 20 50 100
门禁技术在动物笼舍安全技防改造中的应用
1
作者 吴菡 《畜牧兽医科技信息》 2013年第6期9-11,共3页
本文通过动物笼舍安全技防改造项目建设,介绍了动物笼舍门禁系统的设计思路及系统实现的技术方法。在项目建设中对于门禁技术的应用和尝试,为今后的动物笼舍安全技防工作实践提供了经验。
关键词 动物笼舍 门禁 安全技
下载PDF
浅谈吊熔融金属电动单梁桥式起重机的安全技术性能
2
作者 张涛 《江苏安全生产》 2011年第4期42-44,共3页
随着TSGQ0002—2008起重机安全技术监察规程一桥式起重机的实施,对新制作的吊熔融金属电动单梁桥式起重机的设计技术要求及检验使用有了明确的规定,使得冶金用单梁起重机设计及检验有了更为合理的标准。本文就这种形式的起重机在使用... 随着TSGQ0002—2008起重机安全技术监察规程一桥式起重机的实施,对新制作的吊熔融金属电动单梁桥式起重机的设计技术要求及检验使用有了明确的规定,使得冶金用单梁起重机设计及检验有了更为合理的标准。本文就这种形式的起重机在使用过程中的安全技术性能进行了分析,提出了这种起重机不同于普通LD单梁吊在结构焊接及驱动配置等方面的安全控制要求。 展开更多
关键词 吊熔融金属 电动单梁桥式起重机 安全技和陛能
下载PDF
Research Advance on Absorption Law of Cadmium by Rice and Safety Control Technology of Cadmium in Rice Grain 被引量:6
3
作者 陈群芳 叶瑶瑶 +3 位作者 徐青 范克关 王飞娟 朱诚 《Agricultural Science & Technology》 CAS 2014年第10期1801-1804,共4页
Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety contr... Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety control technology of cadmium in rice grain was summarized in this paper. We hoped to lay a foundation for the safety production of rice. 展开更多
关键词 RICE CADMIUM Low accumulation Safety control technology
下载PDF
Advances in Plant Science and Its Prospects
4
作者 许智宏 《Agricultural Science & Technology》 CAS 2011年第1期1-7,10,共8页
Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the soc... Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the social responsibility and play the role in solving the global problems like food security from the developmental status and potential of plant science and technology. Moreover,by working with agronomists, ecologists and environmental experts,plant scientists do provide novel ideas and technologies for developing low carbon agriculture,for breeding new crop varieties with high yield and quality and stress resistance,for developing new type of energy plants,for supplying healthy foods and drugs,reasonably using land and water resources,and for ameliorating environment,making better contribution to the sustainable development of the globe and human being ourselves. 展开更多
关键词 Plant science Food security BIOTECHNOLOGY TRANSGENE Medicinal plant Energy plant
下载PDF
试论漏电保护器的正确安装与选用
5
作者 赵钢锋 《建筑安全》 1997年第9期16-19,共4页
漏电保护器被广泛应用于工矿企业、建筑工地、居民住宅,但是往往由于安装接线错误或动作参数选用不合理,使之不能发挥其应有的安全保护作用。本文就漏电保护器的工作原理、不同配电系统、不同场合如何正确安装接线,及动作参数如何选... 漏电保护器被广泛应用于工矿企业、建筑工地、居民住宅,但是往往由于安装接线错误或动作参数选用不合理,使之不能发挥其应有的安全保护作用。本文就漏电保护器的工作原理、不同配电系统、不同场合如何正确安装接线,及动作参数如何选用,作一系统阐述,以期使人们更加正确认识和使用漏电保护器,更好地为我们的生产建设服务。 展开更多
关键词 漏电保护器 配电系统 安全保护 电气安全技
下载PDF
基于MFC框架下的WLAN端口扫描系统设计
6
作者 卜旭 《电子技术与软件工程》 2017年第19期17-18,共2页
WLAN在开通速度上比有线网络开通快,同时具有灵活的组网技术,在维护费用上较其他网络低等诸多优点,因此其在当代信息技术快速发展的时代具有更大的应用市场。然而伴随着WLAN的飞速发展,对于其所存在的安全性问题也越来越受到广大WLAN用... WLAN在开通速度上比有线网络开通快,同时具有灵活的组网技术,在维护费用上较其他网络低等诸多优点,因此其在当代信息技术快速发展的时代具有更大的应用市场。然而伴随着WLAN的飞速发展,对于其所存在的安全性问题也越来越受到广大WLAN用户的关注。本文在分析现有安全机制的基础上,针对计算机的端口使用MFC框架进行编写扫描程序,对端口进行扫描,分析扫描结果,过滤不安全的数据信息。 展开更多
关键词 WLAN MFC框架 端口扫描 安全技
下载PDF
大玩家入场,新格局渐成
7
作者 王左利 《中国教育网络》 2014年第11期12-13,共2页
当病毒在工业控系统中蔓延,其攻者想要获得什么?标何在?答案很多,摸不定。总之,一国家的核电站,水,国家电网都可以为它的目标。震网(Stuxnet)的发现在2010年之后,网络安全专家杜跃进将互联网安全威胁分成4个阶段:2001~2004年是"蠕... 当病毒在工业控系统中蔓延,其攻者想要获得什么?标何在?答案很多,摸不定。总之,一国家的核电站,水,国家电网都可以为它的目标。震网(Stuxnet)的发现在2010年之后,网络安全专家杜跃进将互联网安全威胁分成4个阶段:2001~2004年是"蠕虫阶段"(以蠕虫为代表的"损人不利己"式攻击为主);2004~2007年是"网络犯罪阶段"(开始大量出现趋利性的攻击);2007~2010年是"网络窃密阶段"(开始大量出现互联网窃密行为); 展开更多
关键词 犯罪阶段 互联网安全 网络安全专家 蠕虫病毒 国家电网 震网 网络攻击 趋利性 工业控制系统 安全技
下载PDF
Efficiency assessment of coal mine safety input by data envelopment analysis 被引量:22
8
作者 TONG Lei DING Ri-jia 《Journal of China University of Mining and Technology》 EI 2008年第1期88-92,共5页
In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal m... In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results. 展开更多
关键词 safety input coal mining enterprise efficiency assessment data envelopment analysis (DEA)
下载PDF
Design and R&D Progress of China Lead-Based Reactor for ADS Research Facility 被引量:29
9
作者 Yican Wu 《Engineering》 SCIE EI 2016年第1期124-131,共8页
In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Instit... In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Institute of Nuclear Energy Safety Technology,was selected as the reference reactor for ADS development,as well as for the technology development of the Generation IV lead-cooled fast reactor.The conceptual design of CLEAR-I with 10 MW thermal power has been completed.KYLIN series lead-bismuth eutectic experimental loops have been constructed to investigate the technologies of the coolant,key components,structural materials,fuel assembly,operation,and control.In order to validate and test the key components and integrated operating technology of the lead-based reactor,the lead alloy-cooled non-nuclear reactor CLEAR-S,the lead-based zero-power nuclear reactor CLEAR-0,and the lead-based virtual reactor CLEAR-V are under realization. 展开更多
关键词 Accelerator-driven subcritical system (ADS) China Lead-based Reactor (CLEAR) Lead-bismuth eutectic (LBE)Technology R&D
下载PDF
Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs) 被引量:4
10
作者 YOUSEFI Saleh FATHY Mahmood BENSLIMANE Abderrahim 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1990-2004,共15页
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio... Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications. 展开更多
关键词 Safety applications Inter-vehicle communications Vehicular Ad hoc NETworks (VANETs) Application level QoS Effective range
下载PDF
Assessing performance of collision mitigation brake system in Chinese traffic environment 被引量:5
11
作者 ZHAO Zhi-guo ZHENG Xun-jia +2 位作者 WANG Jian-qiang XU Qing KODAKA Kenji 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第10期2854-2869,共16页
Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to bette... Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to better evaluate the performance of the CMBS in the Chinese traffic environment.First,because safety-critical situations can be diverse especially in the Chinese environment,the Chinese traffic-accident characteristics are analyzed according to accident statistics over the past 17 years.Next,10 Chinese traffic-accident scenarios accounting for more than 80%of traffic accidents are selected.For each typical scenario,353 representative cases are collected from the traffic-management department of Beijing.These real-world accident cases are then reconstructed by the traffic-accident-reconstruction software PC-Crash on the basis of accident-scene diagrams.This study also proposes a systematic analytical process for estimating the effectiveness of the technology using the co-simulation platform of PC-Crash and rateEFFECT,in which 176 simulations are analyzed in detail to assess the accident-avoidance performance of the CMBS.The overall collision-avoidance effectiveness reaches 82.4%,showing that the proposed approach is efficient for avoiding collisions,thereby enhancing traffic safety and improving traffic management. 展开更多
关键词 active-safety technology effectiveness assessment accident reconstruction autonomous emergency braking PC-CRASH
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
12
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous Attestation Trusted Domain.
下载PDF
Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks 被引量:5
13
作者 邱婧 BAI Jun +1 位作者 SONG Xin-chuan HOU Su-mei 《Journal of Chongqing University》 CAS 2013年第2期91-96,共6页
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc... In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given. 展开更多
关键词 SIGNCRYPTION multi-receiver multi-message bilinear pairings provable security ad hoc networks introduction
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
14
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
下载PDF
Contrastive Analysis of Software Networks Based on Different Coupling Relationships 被引量:3
15
作者 XU Guoai GAO Yang +2 位作者 QI Yana PENG Junhao TANG Xianjing 《China Communications》 SCIE CSCD 2010年第4期76-82,共7页
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy... Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively. 展开更多
关键词 Software System Software Networks Coupling Relationship Degree Distribution
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
16
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
下载PDF
Patterns and security technologies for co-extraction of coal and gas in deep mines without entry pillars 被引量:5
17
作者 Nong Zhang Fei Xue Nianchao Zhang Xiaowei Feng 《International Journal of Coal Science & Technology》 EI 2015年第1期66-75,共10页
Retaining gob-side entryways and the stability of gas drainage boreholes are two essential techniques in the co-extraction of coal and gas without entry pillars (CECGWEP). However, retained entryways located in deep... Retaining gob-side entryways and the stability of gas drainage boreholes are two essential techniques in the co-extraction of coal and gas without entry pillars (CECGWEP). However, retained entryways located in deep coal mines are hard to maintain, especially for constructing boreholes in confined spaces, owing to major deformations. Consequently, it is difficult to drill boreholes and maintain their stability, which therefore cannot guarantee the effectiveness of gas drainage. This paper presents three measures for conducting CECGWEP in deep mines on the basis of effective space in retained entryways for gas drainage, They are combinations of retaining roadways and face-lagging inclined boreholes, retaining roadways and face-advancing inclined boreholes, and retaining roadways and high return airway inclined boreholes. Several essential techniques are suggested to improve the maintenance of retained entryways and the stabilization of boreholes. For the particular cases considered in this study, two field trials have verified the latter two measures from the results obtained from the faces 1111(1) and 11112(1) in the Zhuji Mine. The results indicate that these models can effectively solve the problems in deep mines. The maximum gas drainage flow for a single hole can reach 8.1 m^3/min and the effective drainage distance can be extended up to 150 m or more. 展开更多
关键词 Retaining gob-side entryways Stability of borehole Gas pressure relief Co-extraction of coal and gas without the entry pillar
下载PDF
Vertical transportation system of solid material for backfilling coal mining technology 被引量:8
18
作者 Ju Feng Zhang Jixiong,Zhang Qiang 《International Journal of Mining Science and Technology》 2012年第1期41-45,共5页
For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertica... For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertical transportation system to transport this type of solid backfill material. Given the demands imposed on safely in feeding this material, we also investigated the structure and basic parameter of this system. For a mine in the Xingtai mining area the results show that: (1) a vertical transportation system should include three main parts, i.e., a feeding borehole, a maintenance chamber and a storage silo; (2) we determined that 486 mm is a suitable diameter for bore holes, the diameter of the storage silo is 6 m and its height 30 m in this vertical transportation system; (3) a conical buffer was developed to absorb the impact during the feeding process. To ensure normal implementation of fully mechanized backfilling coal mining technology and the safety of underground personnel, we propose a series of security technologies for anti-blockage, storage silo cleaning, high pressure air release and aspiration. This vertical transporting system has been applied in one this particular mine, which has fed about 4 million tons solid material with a feeding depth of 350 m and safely exploited 3 million tons of coal. 展开更多
关键词 Fully mechanized backfilling coal mining Feeding bore hole Conical buffer Security guarantee
下载PDF
Roles of Financial Innovation and Information Technology:Lessons from US Sub-prime Mortgage Crisis and Its Implications for China 被引量:2
19
作者 James H LENZER JR Simon Xiaobin ZHAO 《Chinese Geographical Science》 SCIE CSCD 2012年第3期343-355,共13页
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t... The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development. 展开更多
关键词 shadow banking US sub-prime mortgage crisis financial tsunami global financial crisis wealth man- agement vehicle China asset bubble
下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
20
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部