期刊文献+
共找到194篇文章
< 1 2 10 >
每页显示 20 50 100
运输企业安全数字化的研究
1
作者 李林根 《中文科技期刊数据库(文摘版)工程技术》 2022年第3期227-230,共4页
数智化是采用云,人工智能,机器学习和物联网等技术以提高业务流程效率的过程。随着企业自身发展和内部管控需求,数智化成为企业转型的有效工具,如何结合自身特点实现快速、高效的转型,是每个企业必须思考的问题。而如何基于自身现有情... 数智化是采用云,人工智能,机器学习和物联网等技术以提高业务流程效率的过程。随着企业自身发展和内部管控需求,数智化成为企业转型的有效工具,如何结合自身特点实现快速、高效的转型,是每个企业必须思考的问题。而如何基于自身现有情况进行数智化分析,才是企业转型快慢的决定因素。本文拟通过企业自身发展现状、数智化转型中的自研软件开发及后期数智化快速转型方向进行探讨,能为企业数智化转型提供思路。 展开更多
关键词 安全数智化 运输企业 监控数据分析 成熟软件
下载PDF
深入开展“我要安全”主题活动 全面提升安全数质量管理水平——2009年中国石化销售企业安全数质量工作会议在郑州召开
2
《石油库与加油站》 2009年第2期I0001-I0001,共1页
关键词 中国石化股份公司 油品销售事业部 安全数质量管理水平 石油行业
下载PDF
2005年中国石化销售企业安全数质量管理工作会议在武汉召开
3
《石油库与加油站》 2005年第4期F0002-F0002,共1页
为了进一步贯彻落实中国石化集团公司安全生产电视电话会议和销售企业工作会议精神,总结近年来中国石化销售企业安全数质量工作,部署新形势下更好地做好安全数质量工作任务,2005年6月29日至30日,中国石油化工股份有限公司油品销售... 为了进一步贯彻落实中国石化集团公司安全生产电视电话会议和销售企业工作会议精神,总结近年来中国石化销售企业安全数质量工作,部署新形势下更好地做好安全数质量工作任务,2005年6月29日至30日,中国石油化工股份有限公司油品销售事业部在湖北省武汉市召开了2005年中国石化销售企业安全数质量管理工作会议。 展开更多
关键词 中国石化销售企业安全数质量管理工作会议 石油市场 质量管理体制 队伍建设
下载PDF
Influence of pier height on the safety of trains running on high-speed railway bridges during earthquakes
4
作者 NIE Yu-tao GUO Wei +8 位作者 JIANG Li-zhong YU Zhi-wu ZENG Chen WANG Yang HE Xu-en REN Shao-xun HUANG Ren-qiang LIANG Guang-yue LI Chang-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第6期2102-2115,共14页
Sudden earthquakes pose a threat to the running safety of trains on high-speed railway bridges,and the stiffness of piers is one of the factors affecting the dynamic response of train-track-bridge system.In this paper... Sudden earthquakes pose a threat to the running safety of trains on high-speed railway bridges,and the stiffness of piers is one of the factors affecting the dynamic response of train-track-bridge system.In this paper,a experiment of a train running on a high-speed railway bridge is performed based on a dynamic experiment system,and the corresponding numerical model is established.The reliability of the numerical model is verified by experiments.Then,the experiment and numerical data are analyzed to reveal the pier height effects on the running safety of trains on bridges.The results show that when the pier height changes,the frequency of the bridge below the 30 m pier height changes greater;the increase of pier height causes the transverse fundamental frequency of the bridge close to that of the train,and the shaking angle and lateral displacement of the train are the largest for bridge with 50 m pier,which increases the risk of derailment;with the pier height increases from 8 m to 50 m,the derailment coefficient obtained by numerical simulations increases by 75% on average,and the spectral intensity obtained by experiments increases by 120% on average,two indicators exhibit logarithmic variation. 展开更多
关键词 pier height high-speed railway bridge running safety numerical model
下载PDF
Changes and Adjustments:The Rule of Law Response to Medical Institution Data Compliance
5
作者 Long Keyu 《科技与法律(中英文)》 2024年第5期110-122,共13页
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int... Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed. 展开更多
关键词 medical institution data privacy protection data security compliance governance
下载PDF
形如1/b(a^(2^n)+1)的孤立数 被引量:3
6
作者 蒋自国 杨仕椿 《西华师范大学学报(自然科学版)》 2007年第4期337-340,共4页
设n是正整数,a是大于1的正整数,论文证明了广义Fermat数1b(a2n+1),当n>max 5,lloogg2a,1+log(e2.6+llooggb2)-log loga时都是孤立数,作为推论,将已有结果以几种特殊情况给出.
关键词 FERMAT数 广义FERMAT数 相亲数 安全数 孤立数
下载PDF
Probability evaluation method for cable safety of long-span cable-stayed bridges 被引量:8
7
作者 朱劲松 肖汝诚 何立志 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期92-97,共6页
A method of cable safety analysis is proposed for safety evaluation of long-span cable-stayed bridges. The Daniels' effect and the probability of broken wires in the cable are introduced to develop the cable strength... A method of cable safety analysis is proposed for safety evaluation of long-span cable-stayed bridges. The Daniels' effect and the probability of broken wires in the cable are introduced to develop the cable strength model and the reliability assessment technique for long-span cable-stayed bridges based on the safety factors analysis of stay cables in service. As an application of the proposed model, the cable safety reliability of the cable No. 25 of Zhaobaoshan cable-stayed bridge in China is calculated. The effects of various parameters on the estimated cable safety reliability are investigated. The results indicate that the proposed method can be used to assess the safety level of stay cables in cable-stayed bridges effectively. The Daniels' effect should be taken into account for assessment, and the probability of broken wires can be used to simulate the deterioration of stay cables in service. 展开更多
关键词 safety factor PROBABILITY EVALUATION cable-stayed bridge
下载PDF
Safe mining technology of undersea metal mine 被引量:15
8
作者 彭康 李夕兵 +2 位作者 万串串 彭述权 赵国彦 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2012年第3期740-746,共7页
Xinli district of Sanshandao Gold Mine is the first subsea metal mine in China.To achieve 6 kt/d production capacity under the premise of safe mining,high-intensity mining might destroy the in-situ stress filed and th... Xinli district of Sanshandao Gold Mine is the first subsea metal mine in China.To achieve 6 kt/d production capacity under the premise of safe mining,high-intensity mining might destroy the in-situ stress filed and the stability of rockmass.According to sampling and testing of ore-rock and backfill and in-situ stress field measurement,safety factor method calculation model based on stress-strain strength reduction at arbitrary points and Mohr-Coulomb yield criterion was established and limit displacement subsidence values under the safety factor of different limit stoping steps were calculated.The results from three years in-situ mining and strata movement monitoring using multi-point displacements meter showed that the lower settlement frame stope hierarchical level filling mining method,mining sequence are reasonable and rockmass stability evaluation using safety factor method,in-situ real-time monitoring can provide the technical foundation for the safety of seabed mining. 展开更多
关键词 subsea bedrock mining frame stope upward horizontal slicing and filling mining method safety factor method multi-point displacement measurement
下载PDF
New signature scheme based on two cryptographic assumptions 被引量:2
9
作者 郑明辉 崔国华 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期461-464,共4页
In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mat... In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities. 展开更多
关键词 digital signature SECURITY factoring problem discrete logarithm problem
下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
10
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
下载PDF
SECURE DATA SYNCHRONIZATION EXCHANGE SERVICE APPLICATION PROGRAM INTERFACE BASED ON SyncML PROTOCOL
11
作者 王立松 李杰 +1 位作者 王海峰 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2006年第1期47-51,共5页
The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interfa... The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interface (SDSXS-API) to ensure the reliability, the integrity, and the security in the data transmission and exchange. The design and the implementation of SDSXS-API are also given. The proposed APIs can be conveniently used as a uniform exchange interface for any related application programs. And their effectiveness is verified in the prototype mobile database system. 展开更多
关键词 SYNCML mobile computing SYNCHRONIZATION data security
下载PDF
Conditional autoregressive negative binomial model for analysis of crash count using Bayesian methods 被引量:1
12
作者 徐建 孙璐 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期96-100,共5页
In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackl... In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackled by the NB component), unobserved heterogeneity and spatial autocorrelation (captured by the CAR process), using Markov chain Monte Carlo methods and the Gibbs sampler. Statistical tests suggest that the CAR-NB model is preferred over the CAR-Poisson, NB, zero-inflated Poisson, zero-inflated NB models, due to its lower prediction errors and more robust parameter inference. The study results show that crash frequency and fatalities are positively associated with the number of lanes, curve length, annual average daily traffic (AADT) per lane, as well as rainfall. Speed limit and the distances to the nearest hospitals have negative associations with segment-based crash counts but positive associations with fatality counts, presumably as a result of worsened collision impacts at higher speed and time loss during transporting crash victims. 展开更多
关键词 traffic safety crash count conditionalautoregressive negative binomial model Bayesian analysis Markov chain Monte Carlo
下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
13
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
下载PDF
Security of Application System 被引量:1
14
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
The Scale of Constructing Mountainous Cities in Yunnan Province based on “Benchmark” Farmlands
15
作者 许明军 杨子生 《Agricultural Science & Technology》 CAS 2015年第7期1558-1561,共4页
In 2011, Yunnan provincial committee and government proposed the strat- egy of constructing mountainous cities in order to protect farmlands and guarantee crop safety, which makes full use of hills and gentle-slopes a... In 2011, Yunnan provincial committee and government proposed the strat- egy of constructing mountainous cities in order to protect farmlands and guarantee crop safety, which makes full use of hills and gentle-slopes and transforms land use pattern. However, social and economic development performs unevenly in Yun- nan, supplemented by varied geographical conditions, so that constructing mountain- ous cities should proceed as per local conditions. The research proposed the con- trol of constructing mountainous cities provided crop safety under the principle of farmland protection and measured the quantities of demanded construction lands ac- cording to science of population prediction and ekistics, based on which the control scales of constructing mountainous cities were determined by multiplying basic farm- land coefficient and the area of newly increased construction lands. The research is of significance for guiding the construction of mountainous cities and avoiding the occupation of construction lands on farmlands. 展开更多
关键词 Constructing mountainous cities Cultivated land protection Food safety Coefficient of "Benchmark" farmlands Scale of mountainous cities
下载PDF
On the Problem of All Equal Positive Odd Number Solutions of the Dissemination of the Ends' Guess 被引量:1
16
作者 刘元宗 《Chinese Quarterly Journal of Mathematics》 CSCD 2000年第2期108-109,共2页
The thesis is concerned with the problem of the dissemination of the Ends’ guess and offers the formula of all equal positive odd number solutions.
关键词 Ends’ guess DISSEMINATION all equal positive odd number solutions
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
17
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
18
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
Directly searching method for slip plane and its influential factors based on critical state of slope 被引量:30
19
作者 林杭 曹平 +2 位作者 宫凤强 李江腾 桂易林 《Journal of Central South University》 SCIE EI CAS 2009年第1期131-135,共5页
In order to determine the slip plane of slope directly by the calculation results of strength reduction method, and analyze the influential factors of slope stability, a numerical model was established in plane strain... In order to determine the slip plane of slope directly by the calculation results of strength reduction method, and analyze the influential factors of slope stability, a numerical model was established in plane strain mode by FLAC3D for homogeneous soil slope, whose parameters were reduced until the slope reached the critical state. Then FISH program was used to get the location data of slip plane from displacement contour lines. Furthermore, the method to determine multiple slip planes was also proposed by setting different heights of elastic areas. The influential factors for the stability were analyzed, including cohesion, internal friction angle, and tensile strength. The calculation results show that with the increase of cohesion, failure mode of slope changes from shallow slipping to the deep slipping, while inclination of slip plane becomes slower and slipping volume becomes larger; with the increase of friction angle, failure mode of slope changes from deep slipping to shallow slipping, while slip plane becomes steeper and upper border of slip plane comes closer to the vertex of slope; the safety factor increases little and slip plane goes far away from vertex of slope with the increase of tensile strength. 展开更多
关键词 SLOPE strength reduction slip plane STABILITY influential factors
下载PDF
Comprehensive safety factor of roof in goaf underdeep high stress 被引量:9
20
作者 JIANG Li-chun JIAO Hua-zhe +1 位作者 WANG Yu-dan WANG Ge-ge 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第2期595-603,共9页
The safety factor of roof under deep high stress is a quantitative index for evaluating roof stability.Based on the failure mode of surrounding rock of stope roof,the mechanics model of goaf roof is constructed,and th... The safety factor of roof under deep high stress is a quantitative index for evaluating roof stability.Based on the failure mode of surrounding rock of stope roof,the mechanics model of goaf roof is constructed,and the internal force of roof is deduced by the theory of hingeless arch.The calculation method of roof safety factor(K)under the environment of deep mining is proposed in view of compression failure and shear failure of roof.The calculation formulas of shear safety factor(K1),compression safety factor(K2)and comprehensive safety factor(K)of roof are given.The influence of stope span and roof thickness on roof stability is considered in this paper.The results show that when the roof thickness remains constant,the roof safety factor decreases with the increasing of the stope span;when the stope span remains constant,the roof safety factor increases with the increasing of the roof thickness.The deep mining example shows that when the stope span is 30 m and the roof thickness is 10 m,the roof comprehensive safety factor is 1.12,which indicates the roof is in a stable state. 展开更多
关键词 deep mining high stress hingeless arch comprehensive safety factor stope span
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部