期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
铁路货车用K_2转向架安全索制造工艺研究 被引量:1
1
作者 祁忠星 《科技创新与应用》 2013年第13期55-56,共2页
转K2是我国引进美国Barber公司交叉支撑的转向架,安全索作为零部件之一,国产化后能降低整机成本,带来可观的经济效益。文章分析了安全索的制造工艺,解决了端头缩颈、钢丝绳下料等工艺难点,开发出符合技术要求的产品。
关键词 铁路货车 K2转向架 安全索 制造工艺
下载PDF
安全索端头与钢丝绳连接浅析
2
作者 靳志宇 白增任 《科技创新导报》 2015年第10期87-87,共1页
安全索是铁路车辆转向架上的一种重要配件,特别是用于转K2型转向架及转K6型转向架。安全索由钢丝绳、端头和接头鉏成,分为钢丝绳与端头的连接紧固和钢丝绳与接头连接紧固,该文以安全索端头与钢丝绳连接紧固效果为研究对象,通过工艺手段... 安全索是铁路车辆转向架上的一种重要配件,特别是用于转K2型转向架及转K6型转向架。安全索由钢丝绳、端头和接头鉏成,分为钢丝绳与端头的连接紧固和钢丝绳与接头连接紧固,该文以安全索端头与钢丝绳连接紧固效果为研究对象,通过工艺手段进行分析分析不合格品产生原因,通过计算得出合理的挤压力,选用合适的生产设备。利用计算机虚拟技术建立安全索端头的冷挤压模型,采用有限元分析端头挤压变形后尺寸的变化和挤压力的变化,通过对不同尺寸的端头模型分析,选用合理的端头尺寸范围和钢丝绳尺寸范围。在实际生产过程中,由于端头加工后出现尺寸误差,在一定的公差范围为,加工出不同直径的端头进行试验,得出合理的公差范围,确保安全索端头与钢丝绳连接后的质量。 展开更多
关键词 安全索 端头 钢丝绳
下载PDF
安全生产二十四年
3
作者 吴乡 《苏南科技开发》 1994年第3期23-23,共1页
吴县横泾镇采石厂是一家已有24年开采历史的老企业,全厂始终贯彻"安全第一"的生产原则,实现了二十四年开采无重大伤亡事故。一、建立安全组织网络,层层落实安全生产责任制。他们建立了厂长、安全科和班组长三结合的安全管理网... 吴县横泾镇采石厂是一家已有24年开采历史的老企业,全厂始终贯彻"安全第一"的生产原则,实现了二十四年开采无重大伤亡事故。一、建立安全组织网络,层层落实安全生产责任制。他们建立了厂长、安全科和班组长三结合的安全管理网络,做到了指挥灵、效果好,安全科专职安全员每天坚持在第一线,跟班爆破,现场监督。兼职安全员根据自己班组的情况,对现场作业时的火工品使用,登高作业带安全索、炮位选择、装药量等一一把关。同时,厂部同各班组签订了安全生产责任制,实行奖罚制度。由于严格的安全制度,奖罚兑现,充分调动了广大干部群众安全生产的积极性、自觉性。 展开更多
关键词 安全生产责任制 火工品 安全 重大伤亡事故 安全管理网络 安全思想教育 爆破 组织网络 现场监督 安全索
下载PDF
三种不是老虎的“虎”
4
作者 王小梅 《新疆林业》 2023年第3期30-31,共2页
除了猫科动物里的虎以外,其他有什么动物名称里也有“虎”?这些“虎”有着什么样的掠食超能力呢?今天来来说说三种不是老虎的“虎”。蝇虎善跳视力极强。如果仔细观察,在住家墙角,有时可以看到一种身长约1厘米的小“蜘蛛”,这就是蝇虎... 除了猫科动物里的虎以外,其他有什么动物名称里也有“虎”?这些“虎”有着什么样的掠食超能力呢?今天来来说说三种不是老虎的“虎”。蝇虎善跳视力极强。如果仔细观察,在住家墙角,有时可以看到一种身长约1厘米的小“蜘蛛”,这就是蝇虎。蝇虎擅长跳跃,又叫“跳蛛”,虽然不结网,但会吐丝作为安全索来保持平衡,避免自己跳跃时摔落。 展开更多
关键词 猫科动物 超能力 安全索 动物名称 跳跃 老虎
下载PDF
浅谈受限空间劳动防护盲区以及应急处理新思路
5
作者 金鸣 《商情》 2013年第6期109-109,共1页
对受限空间作业中可能存在的人员幽闭恐惧现象和利用安全索来进行事故应急处理的思路进行了阐述。
关键词 受限空间 幽闭恐惧症 安全索 引导工具
下载PDF
原来还能这样攀
6
作者 刘懿 《科学健身》 2011年第7期35-35,共1页
攀岩是从登山活动中派生出来的一项运动,是人类从猿到人留下的攀爬本性,是人类释放压力的方式,是历史发展与社会流行的必然结果。
关键词 攀爬 社会流行 人体肌肉 青春活力 智能芯片 安全索 地面距离 机械制造工艺 挑战自我 阻尼系统
下载PDF
Aging effects on QT interval: Implications for cardiac safety of antipsychotic drugs 被引量:1
7
作者 Simon W. Rabkin 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2014年第1期20-25,共6页
Objectives To explore the effect of aging on cardiac toxicity specifically the interaction of age and antipsychotic drugs to alter the QT interval. Methods The Medline databases were searched using the OvidSP platform... Objectives To explore the effect of aging on cardiac toxicity specifically the interaction of age and antipsychotic drugs to alter the QT interval. Methods The Medline databases were searched using the OvidSP platforms with the search strategy: "QT interval" or "QT" and "age" or "aging". The entry criteria were: over 10,000 apparently healthy individuals with data on both sexes; QT interval corrected for heart rate (QTc) and an expression of its variance for multiple age decades extending into the older ages. Results QTc increased in duration with increasing age. Considering a modest one SD increment in QTc in the normal population, the addition of Chlorpromazine produced a QTc on average greater than 450 ms for ages 70 years and older. Risperidone, that did not on average alter QTc, would be expected to produce a QTc of 450 ms in persons in their mid 70 years under some circumstances. QTc prolongation 〉 500 ms with antipsychotic drugs is more likely for persons with QTc initially at the 99th percentile. It may occur with Haloperidol which does not on average alter QTc. Conclusions The range of values for the QT interval in apparently normal older men or women, when combined with the range of expected QT interval changes induced by antipsychotic drugs, can readily be associated with prolonged QTc. Individuals with QTc at the 99th percentile may have serious QTc prolongation with antipsychotic drugs even those that are not usually associated with QTc prolongation. 展开更多
关键词 Cardiac safety Antipsychotic drugs Psychotropic drugs QT interval AGING
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
8
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
An Effective Long String Searching Algorithm towards Component Security Testing 被引量:2
9
作者 Jinfu Chen Lili Zhu +4 位作者 Zhibin Xie Michael Omari Hilary Ackah-Arthur Saihua Cai Rubing Huang 《China Communications》 SCIE CSCD 2016年第11期153-169,共17页
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t... In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing. 展开更多
关键词 component testing security detection monitor log abnormal information string-searching
下载PDF
Discussions and Recommendations for Supervision of Vegetable Quality and Safety in Miyun County
10
作者 袁胜君 张林武 《Agricultural Science & Technology》 CAS 2015年第12期2711-2714,2745,共5页
Vegetable is a pillar industry of agriculture in Miyun County. Improving vegetable quality and ensuring consumers rest assured in consumption are essential for promoting increase of agricultural efficiency and farmers... Vegetable is a pillar industry of agriculture in Miyun County. Improving vegetable quality and ensuring consumers rest assured in consumption are essential for promoting increase of agricultural efficiency and farmers' income, and also the necessity for promoting sustainable development of vegetable industry. This paper elaborated current situations of vegetable production and quality and safety in Miyun County, summarized practice and exploration in supervision of vegetable quality and safety, and came up with recommendations for reinforcing supervision of vegetable quality and safety in view of weak points. 展开更多
关键词 VEGETABLE Quality and safety SUPERVISION
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
11
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
Modified electromagnetism-like algorithm and its application to slope stability analysis 被引量:2
12
作者 张科 曹平 《Journal of Central South University》 SCIE EI CAS 2011年第6期2100-2107,共8页
In the view of the disadvantages of complex method (CM) and electromagnetism-like algorithm (EM), complex electromagnetism-like hybrid algorithm (CEM) was proposed by embedding complex method into electromagnetism-lik... In the view of the disadvantages of complex method (CM) and electromagnetism-like algorithm (EM), complex electromagnetism-like hybrid algorithm (CEM) was proposed by embedding complex method into electromagnetism-like algorithm as local optimization algorithm. CEM was adopted to search the minimum safety factor in slope stability analysis and the results show that CEM holds advantages over EM and CM. It combines the merits of two and is more stable and efficient. For further improvement, two CEM hybrid algorithms based on predatory search (PS) strategies were proposed, both of which consist of modified algorithms and the search area of which is dynamically adjusted by changing restriction. The CEM-PS1 adopts theoretical framework of original predatory search strategy. The CEM-PS2 employs the idea of area-restricted search learned from predatory search strategy, but the algorithm structure is simpler. Both the CEM-PS1 and CEM-PS2 have been demonstrated more effective and efficient than the others. As for complex method which locates in hybrid algorithm, the optimization can be achieved at a convergence precision of 1×10-3, which is recommended to use. 展开更多
关键词 slope stability hybrid optimization algorithm complex method electromagnetism-like algorithm predatory searchstrategy
下载PDF
奇妙的绳结--称人结
13
作者 王靖东 《初中生学习指导》 2021年第20期60-61,共2页
问题线索提起绳结,相信大家都不会陌生,从工人高空作业用的安全索,到中国结、蝴蝶结,这些都是绳结。绳结的种类繁多,应用广泛。今天,我们一起来学习一种稳固的绳结——称人结!
关键词 绳结 高空作业 蝴蝶结 安全索 问题线索
原文传递
Discovering optimal features using static analysis and a genetic search based method for Android malware detection 被引量:7
14
作者 Ahmad FIRDAUS Nor Badrul ANUAR +1 位作者 Ahmad KARIM Mohd Faizal Ab RAZAK 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第6期712-736,共25页
Mobile device manufacturers are rapidly producing miscellaneous Android versions worldwide. Simultaneously, cyber criminals are executing malicious actions, such as tracking user activities, stealing personal data, an... Mobile device manufacturers are rapidly producing miscellaneous Android versions worldwide. Simultaneously, cyber criminals are executing malicious actions, such as tracking user activities, stealing personal data, and committing bank fraud. These criminals gain numerous benefits as too many people use Android for their daily routines, including important communications. With this in mind, security practitioners have conducted static and dynamic analyses to identify malware. This study used static analysis because of its overall code coverage, low resource consumption, and rapid processing. However, static analysis requires a minimum number of features to efficiently classify malware. Therefore, we used genetic search(GS), which is a search based on a genetic algorithm(GA), to select the features among 106 strings. To evaluate the best features determined by GS, we used five machine learning classifiers, namely, Na?ve Bayes(NB), functional trees(FT), J48, random forest(RF), and multilayer perceptron(MLP). Among these classifiers, FT gave the highest accuracy(95%) and true positive rate(TPR)(96.7%) with the use of only six features. 展开更多
关键词 Genetic algorithm Static analysis ANDROID MALWARE Machine learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部