期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于ETAP的380 V安全段保护定值优化
1
作者 刘争光 马永立 +1 位作者 洪琪旭 吴建超 《设备管理与维修》 2021年第17期135-137,共3页
利用ETAP仿真软件的Star TCC(时间电流特性)曲线功能,分析某核电380 V安全I段的进线开关与下游负荷电源开关的级差配合问题,发现部分整定值设置不合理,存在进线开关越级跳闸的风险。结合不同型号的断路器的保护动作方程重新对该段的进... 利用ETAP仿真软件的Star TCC(时间电流特性)曲线功能,分析某核电380 V安全I段的进线开关与下游负荷电源开关的级差配合问题,发现部分整定值设置不合理,存在进线开关越级跳闸的风险。结合不同型号的断路器的保护动作方程重新对该段的进线开关和负荷电源开关的整定值进行计算,并利用TCC曲线功能进行验证,结果表明:新的整定值满足级差配合的要求,能减少越级跳闸的风险,并为后续优化380 V安全段的保护定值提供一些借鉴。 展开更多
关键词 ETAP 安全段 TCC 保护定值
下载PDF
基于“事故-安全”平衡模型的安全分析法研究 被引量:2
2
作者 李海丽 陈勇 +1 位作者 黄湛 胡斌 《石油化工安全环保技术》 CAS 2019年第4期22-25,56,I0001,I0002,共7页
为了研究系统安全与事故之间的转化过程与关系,分析了影响安全的各种因素,将其分类为促进系统安全的因素F人、F调控和F物和造成系统事故的因素f人、f阻力和f物,并构建了安全管理“事故—安全”平衡模型。把系统放在一个固定轨道上进行分... 为了研究系统安全与事故之间的转化过程与关系,分析了影响安全的各种因素,将其分类为促进系统安全的因素F人、F调控和F物和造成系统事故的因素f人、f阻力和f物,并构建了安全管理“事故—安全”平衡模型。把系统放在一个固定轨道上进行分析,在安全因素与事故隐患的共同作用下,该平衡模型不断动态变化,最终处于某动态平衡状态,该状态分为安全段、平衡段、事故段,在不同的阶段会导致不同的后果。该模型指出事故的发生是动态平衡被打破,系统不发生事故不代表一定安全。在构建模型时,对其安全影响性明确分组,可更有效地区分安全影响因素的积极性与消极性。利用平衡力学中的平衡概念来帮助实现管理的优化,可更好地梳理目前的安全状态,更好地为安全管理提供思路。 展开更多
关键词 安全 “事故-安全”平衡 安全段 平衡段 事故段
下载PDF
Land Use Change During 1960~2000 Period and itsEco-environmental Effects in the Middle and UpperReaches of the Yangtze River:a Case Study in YiliangCounty,Yunnan,China 被引量:4
3
作者 YANGZisheng LIANGLuohui +1 位作者 LIUYansui HEYimei 《Journal of Mountain Science》 SCIE CSCD 2004年第3期250-263,共14页
Land use/land cover change (LUCC) is a focus of the research of global environmental changes. The middle and upper reaches of the Yangtze River, which are the most ecologically fragile mountainous area in China as wel... Land use/land cover change (LUCC) is a focus of the research of global environmental changes. The middle and upper reaches of the Yangtze River, which are the most ecologically fragile mountainous area in China as well as one of the areas in China with most notable LUCC, have been on the Chinese Government's list of priority areas for ecological restoration. This paper is to reveal the trend of LUCC and the ecological degradation arising from it, and to provide a basis for the future sustainable use of land resources in the region based on a detailed analysis of Yiliang County. Based on the county's land use/cover maps in 1960, 1980 and 2000 drawn with the aid of aerial photograph interpretation, field investigation and GIS based spatial-temporal data analysis, LUCC during 1960~2000 period and the ecological degradation arising from it were analyzed. Using the Markv model, the paper brings out a forecast of what the county's LUCC would be like if the county's current land use continues, as well as the reasons and countermeasures for restoring degraded ecosystems. 展开更多
关键词 Land use/cover change (LUCC) drivingforce eco-environmental effect ecological security sustainable use upper reaches of the Yangtze River
下载PDF
Prediction of bridge temperature field and its effect on behavior of bridge deflection based on ANN method 被引量:3
4
作者 WEN Jiwei CHEN Chen 《Global Geology》 2011年第4期249-253,共5页
In recent years, the bridge safety monitoring has been paid more attention in engineering field. How- ever, the financial and material resources as well as human resources were costly for the traditional monitoring me... In recent years, the bridge safety monitoring has been paid more attention in engineering field. How- ever, the financial and material resources as well as human resources were costly for the traditional monitoring means. Besides, the traditional means of monitoring were low in accuracy. From an engineering example, based on neural network method and historical data of the bridge monitoring to construct the BP neural network model with dual hidden layer strueture, the bridge temperature field and its effect on the behavior of bridge deflection are forecasted. The fact indicates that the predicted biggest error is 3.06% of the bridge temperature field and the bridge deflection behavior under temperature field affected is 2. 17% by the method of the BP neural net-work, which fully meet the precision requirements of the construction with practical value. 展开更多
关键词 neural network bridge temperature field deflection behavior PREDICTION
下载PDF
What Kind of Security Concept Does Our World Need?
5
作者 Huang Zhaoyu 《Contemporary International Relations》 2017年第2期16-39,共24页
While the threat of war has decreased, there have appeared intricate security issues that affect all aspects of human life, breaking through various defenses and threatening the well being of all actors in the contemp... While the threat of war has decreased, there have appeared intricate security issues that affect all aspects of human life, breaking through various defenses and threatening the well being of all actors in the contemporary world, including nations, groups and individuals. This risky situation calls for a new security concept, one that transcends traditional state centrism, national supremacy and coercion. The new security concept, which should assimilate the general theory of grand strategy,focuses on a vision that spans time and space, valuing humankind as it exists as one of the dynamic factors of nature and society. The essentials of the new security concept are to recognize balanced development as the substance of security and to govern national strength and the application of means and tactics. It aims at realizing comprehensive security across various social fields within states, to achieve mutual security among national, international and individual actors, as well as harmony between man and nature, continuous security leading to lasting and universal peace in the future. 展开更多
关键词 New Security Concept HUMANISM vision spanning time and space balanced development recycling security
下载PDF
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
6
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
下载PDF
Where do Random Rough Surfaces Fail? Part I: Fracture Loci Safety Envelopes at Early Stages of Degradation
7
作者 Hector Medina Brian Hinderliter 《Journal of Energy and Power Engineering》 2013年第5期907-916,共10页
Damage on surfaces often compromises the efficiency of some types of energy production, the safety and reliability of components, and ultimately increases costs. The environment can degrade the structural integrity of... Damage on surfaces often compromises the efficiency of some types of energy production, the safety and reliability of components, and ultimately increases costs. The environment can degrade the structural integrity of surfaces in service by the accumulation of large numbers of small destructive events, which based on the Central Limit Theorem leads to a Gaussian distribution of pit depth. In order to develop safety envelopes relating fracture loci with topological parameters of a brittle material, scatter plots were obtained and analyzed. Starting with an engineering surface, after 6 to 9 micrometers of average degradation depth, safety envelopes could be developed using average roughness and two other proposed parameters. Interestingly, maximum pit depth showed very low correlation with the location of fracture, at the early stage of degradation studied. This is attributed to relaxation of stress concentration at a given pit location due to the assuaging effect caused by neighboring pits. Additionally, energy at fracture was obtained, and a maximum relaxation region was observed. Analytical and experimental study of this region, as well as ductility effects are currently under research. 展开更多
关键词 Safety envelopes ROUGHNESS surfaces.
下载PDF
Research and Application of Safety Information and Control System of Nuclear Power Station
8
作者 L.M. Zhang W.J. Huang Y.B. Sun G.J. Jiang 《Journal of Energy and Power Engineering》 2011年第12期1159-1162,共4页
The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and moni... The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system. 展开更多
关键词 Safety information and control system back-up panel emergency control panel.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部