期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
汽车碰撞安全保护结构 被引量:2
1
作者 刘建新 周本宽 赵华 《西南交通大学学报》 EI CSCD 北大核心 1997年第6期616-620,共5页
轴向压皱的圆管可以用来吸收能量。提出了一种由圆管组作为汽车碰撞安全保护结构的方法,并用动态渐近屈曲的理论分析了这种结构的力学性能,同时还研究了这种装置的吸能特性。碰撞保护结构的吸能量与车辆实际碰撞部位以及碰撞安全保护... 轴向压皱的圆管可以用来吸收能量。提出了一种由圆管组作为汽车碰撞安全保护结构的方法,并用动态渐近屈曲的理论分析了这种结构的力学性能,同时还研究了这种装置的吸能特性。碰撞保护结构的吸能量与车辆实际碰撞部位以及碰撞安全保护结构的特性密切相关。安全保护结构的吸能特性。 展开更多
关键词 汽车 碰撞 力学性能 安全保护结构
下载PDF
大型工程车辆司机保护结构检测试验台主体结构的设计 被引量:1
2
作者 刘玉周 韩刚 《起重运输机械》 2014年第1期22-25,共4页
根据检测试验台的技术要求,设计了大型工程车辆司机安全保护结构检测试验台的主体结构。采用SolidWorks进行三维实体建模,利用Ansys进行有限元分析,校核了结构的强度和刚度。
关键词 工程车辆 安全保护结构 试验台 主体结构 设计
下载PDF
邻轻轨深基坑单排桩结合微型锚杆支护变形控制技术 被引量:1
3
作者 姚炳祥 《地基处理》 2023年第S01期1-5,81,共6页
城市轨道交通由于其自身的结构特点及重要性,对其保护区范围内的外部作业均有严格的变形控制要求。尤其是在保护区内的深基坑开挖作业,由于其对轨道交通结构的影响较大,需采取专门的保护措施。本文通过紧邻金华金义线城际轻轨的深基坑... 城市轨道交通由于其自身的结构特点及重要性,对其保护区范围内的外部作业均有严格的变形控制要求。尤其是在保护区内的深基坑开挖作业,由于其对轨道交通结构的影响较大,需采取专门的保护措施。本文通过紧邻金华金义线城际轻轨的深基坑支护设计实践,在以岩石地基为主的深基坑支护中采用单排桩结合微型锚杆的支护形式,通过理论计算及施工实践,最终总变形量满足了轨道交通结构安全保护规程的变形控制要求,取得了较好的技术、经济效果,可为后续类似工程的设计和施工提供借鉴。 展开更多
关键词 轨道交通结构 结构安全保护 变形控制 深基坑 单排桩 微型锚杆
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
4
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
Development of Light Weight Structures to Provide Blast-Resistant Designs
5
作者 CRAWFORD John E 《Transactions of Tianjin University》 EI CAS 2006年第B09期16-21,共6页
In the past, blast-resistant designs for structures were often constructed with massive type structural systems, which relied more on brute strength than on finesse to achieve the required blast resistance. However, s... In the past, blast-resistant designs for structures were often constructed with massive type structural systems, which relied more on brute strength than on finesse to achieve the required blast resistance. However, structures composed of COLD-FORMED steel components, such as sheet metal and metal studs, have shown great promise in providing blast resistance with the added benefits of low cost and ease of construction. Some examples of using such structures to provide containment for package handling facilities (PHF) are described in the paper for situations where blast containment is needed, such as a potential package bomb being discovered during the package vetting process. Results from tests and analytic data are used to illustrate aspects of design peculiar to such types of applications. Designs for specific capacities of PHF are described. 展开更多
关键词 blast containment package handling facility hardened design light weight structures COLD-FORMED steel structures
下载PDF
A Key Management Scheme Based on Hypergraph for Fog Computing
6
作者 Zhi Li Yanzhu Liu +3 位作者 Di Liu Chunyang Li Wei Cui Guanglin Hu 《China Communications》 SCIE CSCD 2018年第11期158-170,共13页
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s... Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme. 展开更多
关键词 fog computing fog security keymanagement HYPERGRAPH
下载PDF
推土机
7
《工程机械文摘》 2007年第6期64-65,共2页
关键词 履带式推土机 安全保护结构 工程机械 故障诊断 支持向量机算法 承载能力 决策系统 维修质量 粗糙集理论 司机
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部