期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
抽水蓄能电站爆破作业安全环境监测系统应用 被引量:1
1
作者 郝金笑 郭佑国 《电力安全技术》 2023年第6期42-44,共3页
针对抽水蓄能电站基建期爆破施工安全管理的难题,基于爆破过程安全风险、有毒物质等方面的分析,利用传感器技术、电子信息技术构建安全环境监测系统,通过采集现场数据并进行分析处理,及时准确地进行报警和信息推送,为爆破作业提供安全... 针对抽水蓄能电站基建期爆破施工安全管理的难题,基于爆破过程安全风险、有毒物质等方面的分析,利用传感器技术、电子信息技术构建安全环境监测系统,通过采集现场数据并进行分析处理,及时准确地进行报警和信息推送,为爆破作业提供安全技术保障。 展开更多
关键词 抽水蓄能电站 隧道 洞室 爆破 安全环境监测
下载PDF
基于移动定位技术的人影弹药安全环境监测方法
2
作者 阿依努尔 阿地里江.玉苏甫江 《科技创新导报》 2016年第32期91-92,共2页
人影火器安全环境监测是当前急需解决的一个重要课题。人影火器及弹药的安全不仅影响人影工作开展并对社会安全生产有较大影响。如何通过先进的技术手段实现和提高火器安全环境是当前一个重要的研究领域。该文通过讨论使用火器安全环境... 人影火器安全环境监测是当前急需解决的一个重要课题。人影火器及弹药的安全不仅影响人影工作开展并对社会安全生产有较大影响。如何通过先进的技术手段实现和提高火器安全环境是当前一个重要的研究领域。该文通过讨论使用火器安全环境监测方法解决所遇到的技术问题,探讨通过应用移动定位技术提高火器及弹药的安全水平。 展开更多
关键词 火器安全环境监测 移动定位技术 人工影响天气
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
3
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
4
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部