期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
路线安全设计方法在公路交通设计中的运用实践探究
1
作者 高建文 《交通科技与管理》 2023年第7期45-47,共3页
为了保证公路交通安全,合理化规划线路设计,结合山西省某国道公路实际情况,从选定公路等级、优化曲线半径设计、直线线路设计、纵坡设计、平纵组合及桥隧设计、平纵面线形设计以及合理规划避险车道等方面,提出线路安全设计方法的应用路... 为了保证公路交通安全,合理化规划线路设计,结合山西省某国道公路实际情况,从选定公路等级、优化曲线半径设计、直线线路设计、纵坡设计、平纵组合及桥隧设计、平纵面线形设计以及合理规划避险车道等方面,提出线路安全设计方法的应用路径。该公路自通车运行以来,因道路线形因素诱发的交通事故发生明显降低,使车辆通行安全性得到有效保障。 展开更多
关键词 公路交通设计 路线安全设计方法 公路等级 平曲线设计
下载PDF
电动汽车动力电池碰撞安全设计方法研究 被引量:3
2
作者 胡海涛 郭凤骏 《上海汽车》 2021年第1期2-6,16,共6页
文章结合国内外汽车法规及新车评价规程,研究了不同碰撞工况对某款电动汽车动力电池的损伤影响。研究发现,在侧面斜柱碰工况下,电池模组容易受到挤压,动力电池系统发生短路、漏液及起火的风险较大;同时,通过对某款电动汽车在斜柱碰工况... 文章结合国内外汽车法规及新车评价规程,研究了不同碰撞工况对某款电动汽车动力电池的损伤影响。研究发现,在侧面斜柱碰工况下,电池模组容易受到挤压,动力电池系统发生短路、漏液及起火的风险较大;同时,通过对某款电动汽车在斜柱碰工况下电安全防护设计的研究,提出一种基于电池模组损伤容限的动力电池防护设计方法,该方法有利于车辆的轻量化开发,可降低电动汽车能耗及整车物料成本。 展开更多
关键词 动力电池 损伤容限 碰撞安全设计方法 轻量化 电动汽车
下载PDF
探讨路线安全设计方法在公路交通设计中的应用 被引量:1
3
作者 刘鑫榕 《低碳世界》 2015年第9期260-261,共2页
本文结合一些公路交通现场观测的试验数据统计出来的结果与室内外试验的进行了对比分析,通过公路交通的实际工程项目对适用性进行了分析,针对公路交通提出了路线安全设计方法,并且提出了符合我国公路交通特点、驾驶行为特征以及道路... 本文结合一些公路交通现场观测的试验数据统计出来的结果与室内外试验的进行了对比分析,通过公路交通的实际工程项目对适用性进行了分析,针对公路交通提出了路线安全设计方法,并且提出了符合我国公路交通特点、驾驶行为特征以及道路环境的公路安全性评价指标和对应安全性的评价标准。 展开更多
关键词 路线 安全设计方法 公路交通设计
下载PDF
一种机动式系统的网络通信安全设计方法 被引量:1
4
作者 康望东 柳林 许桂明 《网络安全技术与应用》 2017年第6期34-37,共4页
近年来机动式信息系统发展迅速,由于其使用要求的特殊性,网络通信安全运行是保障机动式信息系统可靠运行的最重要基础之一。机动式系统的网络通信安全涉及信息安全、链路可用等多个方面,本文从工程设计角度出发,结合系统的安全要求提出... 近年来机动式信息系统发展迅速,由于其使用要求的特殊性,网络通信安全运行是保障机动式信息系统可靠运行的最重要基础之一。机动式系统的网络通信安全涉及信息安全、链路可用等多个方面,本文从工程设计角度出发,结合系统的安全要求提出一种网络通信的安全设计方法,对机动式信息系统建设有一定的参考意义。 展开更多
关键词 机动式信息系统 信息安全 网络通信 链路可用 网络通信安全设计方法
原文传递
10 kV高压开关柜内部短路电弧冲击过程仿真及安全设计 被引量:8
5
作者 董盼 杨鑫 +3 位作者 贾鹏飞 仇炜 钟淼龙 雷佳成 《高电压技术》 EI CAS CSCD 北大核心 2022年第1期328-336,共9页
目前10 kV开关柜由于内部短路电弧引起的爆炸事故仍时有发生,其内部短路电弧冲击过程的仿真计算方法复杂度和准确度难以兼顾,安全设计缺少理论和方法指导。该文基于温度场、流体场和位移场耦合的有限元计算方法,利用热源等效和分舱建模... 目前10 kV开关柜由于内部短路电弧引起的爆炸事故仍时有发生,其内部短路电弧冲击过程的仿真计算方法复杂度和准确度难以兼顾,安全设计缺少理论和方法指导。该文基于温度场、流体场和位移场耦合的有限元计算方法,利用热源等效和分舱建模方式,对开关柜内部电弧冲击过程进行仿真计算,兼顾了准确性和灵活性。以电缆室为例,通过仿真计算得到内部短路电弧爆炸波能冲击下泄压板的动作时刻t=10.5 ms,以该时刻下柜体最大应力畸变点是否超过柜体材料的极限应力值作为柜体安全设计和校核依据。对该时刻下电缆室内壁应力分布进行仿真计算,结合提出的安全设计方法,得到优质钢板柜体壁厚2 mm的安全设计建议;针对内部短路电弧冲击过程中防护较为薄弱的后柜门,给出至少需要安装20个高强度M10螺栓的安全建议。通过相关测试结果,证明了该文设计方法的可靠性,可为10 kV开关柜的安全设计提供理论基础和方法指导。 展开更多
关键词 10 kV开关柜 短路电弧故障 安全设计方法 多物理场耦合 有限元仿真
下载PDF
玉米收获机整机安全性设计要求分析与实施方法
6
作者 惠兆元 倪国庆 +3 位作者 刘艳秋 吴宗江 庞德亮 刘绪丽 《农业机械》 2021年第6期107-109,112,共4页
依据玉米收获机相关的国家安全性强制性标准,进行了针对性分析和技术解读,梳理出安全标准中的24项具体要素进行了逐一分析和解读。提出了安全强标设计控制落实方法和建议和读者一起共勉。
关键词 玉米收获机 安全设计、控制方法 建议
原文传递
Development of Bayesian Network Models for Risk-Based Ship Design 被引量:3
7
作者 Dimitris Konovessis Wenkui Cai Dracos Vassalos 《Journal of Marine Science and Application》 2013年第2期140-151,共12页
In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advo... In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare. 展开更多
关键词 risk-based ship design risk assessment data mining Bayesian networks ship safety
下载PDF
Design of motion control of dam safety inspection underwater vehicle 被引量:5
8
作者 孙玉山 万磊 +2 位作者 甘永 王建国 姜春萌 《Journal of Central South University》 SCIE EI CAS 2012年第6期1522-1529,共8页
Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(... Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials. 展开更多
关键词 dam safety inspection remotely operated vehicle (DSIROV) control system architecture embedded system automaticcontrol of dam-scanning dead-reckoning
下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
9
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
下载PDF
Probability and reliability analysis of pillar stability in South Africa
10
作者 Gaofeng Song Shengli Yang 《International Journal of Mining Science and Technology》 EI CSCD 2018年第4期704-708,共5页
A deterministic approach is frequently used in engineering design. In this quantitative design methodology, a safety factor, which is typically a strength-to-stress ratio, is derived as an index for the stability asse... A deterministic approach is frequently used in engineering design. In this quantitative design methodology, a safety factor, which is typically a strength-to-stress ratio, is derived as an index for the stability assessment of the engineering design. In underground coal mining applications such as pillar design,however, the inputs of pillar design are variables. This is widely overlooked in the deterministic approach. A probabilistic approach assessing the probability of failure or reliability of a system might be an alternative to the conventional quantitative methodology. This approach can incorporate the degree of uncertainty and deviations of variables and provide more versatile and reliable results. In this research, the reliability of case histories from stable and failed pillars of South Africa presented by Merwe and Mathey is examed. The updated Salamon and Munro strength formula(S-M formula) and Merwe and Mathey strength formula(M-M formula) are evaluated through a probabilistic approach. It is concluded that stable pillar cases have a reliability value greater than 0.83 while the reliability value of failed pillar cases are slightly larger than 0.50. There seems to be a positive relation between safety factor and reliability. The reliability of a pillar increases with pillar width but decreases with depth of cover, pillar height and entry width. The reliability analysis also confirms that M-M strength formula has a better distinction between the stable and failed pillar cases. 展开更多
关键词 Pillar design Probabilistic approach RELIABILITY Monte Carlo simulation
下载PDF
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
11
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部