期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
用和谐社会思想指导企业安全治防工作
1
作者 路振峰 《改革与开放》 2012年第10X期74-74,76,共2页
随着我国经济的发展,企业内部治安防范工作在企业发展中的作用越来越突出。本文在对安全防治工作重要性进行分析的基础上,简要概述了我国企业安全保卫工作中存在的普遍性问题,并由此对企业实施安全保卫工作的有效途径进行探讨,以期能为... 随着我国经济的发展,企业内部治安防范工作在企业发展中的作用越来越突出。本文在对安全防治工作重要性进行分析的基础上,简要概述了我国企业安全保卫工作中存在的普遍性问题,并由此对企业实施安全保卫工作的有效途径进行探讨,以期能为企业安全防治工作的实施提供借鉴,让安全防治工作真正起到为企业的生产经营保驾护航的作用。 展开更多
关键词 安全治防 现状 途径
下载PDF
Study on multi-component combustible gas explosive characteristics of high gas mine 被引量:2
2
作者 周西华 王继仁 +2 位作者 李昕 李诚玉 胡春岩 《Journal of Coal Science & Engineering(China)》 2008年第4期538-541,共4页
Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxy... Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxygen,other combustible gas,coal dust,energy of fire source,and the inert gas,proposed a new method of divide gas explo- sive triangle partition,and gave new partition linear equations.The gas explosive triangle and its new partition has important directive significance in distinguishing if the fire area has a gas explosion when sealing or opening fire area,or fire extinguishing in sealed fire area,and judging if there will be a gas explosion or other trend while fire extinguishing with inert gas. 展开更多
关键词 gas explosion explosive characteristics gas explosive limit
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
3
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Postpartum intrauterine device contraception: A review
4
作者 Shadi Rezai Pameela Bisram +2 位作者 Hasan Nezam Ray Mercado Cassandra E Henderson 《World Journal of Obstetrics and Gynecology》 2016年第1期134-139,共6页
AIM: To review the safety (infection, perforation) and efficacy (expulsion, continuation rates, pregnancy) of intrauterine device (IUD) insertion in the postpartum period. METHODS: MEDLINE, PubMed and Google S... AIM: To review the safety (infection, perforation) and efficacy (expulsion, continuation rates, pregnancy) of intrauterine device (IUD) insertion in the postpartum period. METHODS: MEDLINE, PubMed and Google Scholar were searched for randomized controlled trials and prospective cohort studies of IUD insertions at different times during the postpartum period. Time of insertion during the postpartum period was documented speci-fically, immediate post placenta period (within 10 min), early post placenta period (10 min to 72 h), and de-layed/interval period (greater than 6 wk). Other study variables included mode of delivery, vaginal vs cesarean, manual vs use of ring forceps to insert the IUD. RESULTS: IUD insertion in the immediate postpartum (within 10 min of placental delivery), early postpartum (10 min up to 72 h) and Interval/Delayed (6 wk onward) were found to be safe and effcacious. Expulsion rates were found to be highest in the immediate postpartum groups ranging from 14% to 27%. Immediate post placental insertion found to have expulsion rates that ranged from 3.6% to 16.2%. Expulsion rate was significantly higher after insertion following vaginal vs cesarean delivery. The rates of infection, perforation and unplanned pregnancy following postpartum IUD insertion are low. Method of insertion such as with ring forceps, by hand, or another placement method unique to the type of IUD did not show any signifcant difference in expulsion rates. Uterine perforations are highest in the delayed/interval IUD insertion groups.Breastfeeding duration and infant development are not affected by delayed/interval insertion of the non-hormonal (copper) IUD or the Levonorgestrel IUD. Timing of the Levonorgestrel IUD insertion may affect breastfeeding. CONCLUSION: IUD insertion is safe and efficacious during the immediate postpartum, early postpartum and delayed postpartum periods. Expulsion rates are highest after vaginal delivery and when inserted during the immediate postpartum period. IUD associated infection rates were not increased by insertion during the postpartum period over interval insertion rates. There is no evidence that breastfeeding is negatively affected by postpartum insertion of copper or hormone-secreting IUD. Although perforation rates were higher when inserted after lactation was initiated. Randomized controlled trials are needed to further elucidate the consequence of lactation on postpartum insertion. Despite the concerns regarding expulsion, perforation and breastfeeding, current evidence indicates that a favorable risk beneft ratio in support of postpartum IUD insertion. This may be particularly relevant for women for whom barriers exist in achieving desired pregnancy spacing. 展开更多
关键词 Access to intrauterine devices Contra-ception EXPULSION Intrauterine device Long acting reversible contraception Postpartum contraception Postpartum intrauterine device Postpartum intrauterine device placement Post-placental insertion
下载PDF
Memory Safety Based on Probabilistic Memory Allocation
5
作者 Xue Jingfeng Hu Changzhen +2 位作者 Guo Xiaojing Leng Bingxing Ma Rui 《China Communications》 SCIE CSCD 2012年第4期115-122,共8页
Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory... Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory allocating strategy is improved and a new probabilistic memory allocation technology is presented.By combining random memory allocating algorithm and virtual memory,memory errors are avoided in all probability during software executing.By replacing default memory allocator to manage allocation of heap memory,buffer overflows and dangling pointers are prevented.Experiments show it is better than Diehard of the following aspects:memory errors prevention,performance in memory allocation set and ability of controlling working set.So probabilistic memory allocation is a valid memory errors prevention technology and it can tolerate memory errors and provide probabilistic memory safety effectively. 展开更多
关键词 software security PROBABILISTIC memory errors memory allocation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部