期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
煤矿区域地质灾害时空分布与安全防治技术 被引量:1
1
作者 段芳 《能源与环保》 2022年第10期62-67,共6页
为充分了解煤矿区域地质发展规律,为灾害的有效治理提供可靠参考依据,提出一种煤矿区域地质灾害时空分布与安全防治技术。采集煤矿区域遥感图像,并实施图像校正、图像均色、图像去噪预处理,以处理好的图像为基础,提取图像特征,识别灾害... 为充分了解煤矿区域地质发展规律,为灾害的有效治理提供可靠参考依据,提出一种煤矿区域地质灾害时空分布与安全防治技术。采集煤矿区域遥感图像,并实施图像校正、图像均色、图像去噪预处理,以处理好的图像为基础,提取图像特征,识别灾害区域,确定灾害类型,界定灾害范围,分析灾害时空变化特征,进而提出“防和治”联合治理方法。结果表明,随着时间的推移,灾害区域面积都呈现逐渐扩大的趋势,塌陷灾害主要向着西北方向扩散,滑坡灾害主要向着西南方向成扇形发展。经过防治后,研究区两种地质灾害指数都有所降低,其中塌陷区域灾害由高风险降低到了一般风险,滑坡区域由较高风险降低到了较低风险,安全防治效果较佳。 展开更多
关键词 煤矿区域 地质灾害 遥感 时空分布 安全防治技术
下载PDF
温室内安全防治的最新技术动向
2
作者 张耀宏 《国外科技》 1991年第3期35-37,共3页
关键词 温室 安全防治技术 病害 虫害 杂草
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
3
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Study on multi-component combustible gas explosive characteristics of high gas mine 被引量:2
4
作者 周西华 王继仁 +2 位作者 李昕 李诚玉 胡春岩 《Journal of Coal Science & Engineering(China)》 2008年第4期538-541,共4页
Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxy... Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxygen,other combustible gas,coal dust,energy of fire source,and the inert gas,proposed a new method of divide gas explo- sive triangle partition,and gave new partition linear equations.The gas explosive triangle and its new partition has important directive significance in distinguishing if the fire area has a gas explosion when sealing or opening fire area,or fire extinguishing in sealed fire area,and judging if there will be a gas explosion or other trend while fire extinguishing with inert gas. 展开更多
关键词 gas explosion explosive characteristics gas explosive limit
下载PDF
Memory Safety Based on Probabilistic Memory Allocation
5
作者 Xue Jingfeng Hu Changzhen +2 位作者 Guo Xiaojing Leng Bingxing Ma Rui 《China Communications》 SCIE CSCD 2012年第4期115-122,共8页
Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory... Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory allocating strategy is improved and a new probabilistic memory allocation technology is presented.By combining random memory allocating algorithm and virtual memory,memory errors are avoided in all probability during software executing.By replacing default memory allocator to manage allocation of heap memory,buffer overflows and dangling pointers are prevented.Experiments show it is better than Diehard of the following aspects:memory errors prevention,performance in memory allocation set and ability of controlling working set.So probabilistic memory allocation is a valid memory errors prevention technology and it can tolerate memory errors and provide probabilistic memory safety effectively. 展开更多
关键词 software security PROBABILISTIC memory errors memory allocation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部