On the basis of the data of biological and nonbiological factors collected respectively from 1989 to 1990 and from 1995 to 1996 in the waters nearby the Qinshan Nuclear Power Station, the ecological environment and wa...On the basis of the data of biological and nonbiological factors collected respectively from 1989 to 1990 and from 1995 to 1996 in the waters nearby the Qinshan Nuclear Power Station, the ecological environment and water quality of the waters are analyzed and assessed in the paper. The results show: (a) the surveyed area has the typical ecological characteristics of high tidal range estuary, rich nutrients and low biological productivity, (b) tide, runoff and offshore seawater intrusion are the key factors which result in seasonal and annual changes of various biological and non-biological factors, (c) the risking of seawater eutrophication index is resulted from enormous amount of the discharges of industrial and domestic sewage, (d) because the survey area is located in a high tidal-range estuary, thermal effluent from cooling system does not induce significant temperature changes, ( e) the first stage project of Qinshan nuclear power station has no notable impacts on the ecological environment in展开更多
During 1991-1993, the radioactivity levels of the bone-coal mines were investigated in Hubei, Hunan, Ji-angxi, Zhejiang and Anhui Provinces, respectively, where the reserve of bone-coal is about 90% of our country’s ...During 1991-1993, the radioactivity levels of the bone-coal mines were investigated in Hubei, Hunan, Ji-angxi, Zhejiang and Anhui Provinces, respectively, where the reserve of bone-coal is about 90% of our country’s total reserve. The annual additional collective dose equivalent within 80km evaluated region of bone-coal power stations in Nijiangkou and Anren is 1.7 and 1.9 man·mSv, respectively, and that of Zhuantanyan bone-coal shaft is 1.4 man·mSv. The collective dose equivalent caused by bone-coal cinder brick produced for 25 years in the five prov-inces is 1.6×105 man Sv.展开更多
The effect of two bone-coal power stations(6MWe) on environment was investigated within the scope of the dose contribution caused by various radionucildes in different ways.It is found that the best measures to reduce...The effect of two bone-coal power stations(6MWe) on environment was investigated within the scope of the dose contribution caused by various radionucildes in different ways.It is found that the best measures to reduce the effect of bone-coal power station on radiation environment include to select a fine boiler system and a comprehensive utilization of the bone-coal cinder(BCC),soot and ash in the catchers.展开更多
Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, ...Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.展开更多
Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achie...Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.展开更多
In this paper, virtual instnnnent technology is applied in the development of an electric parameter measta'ement system for mobile power stations. Virtual inset technology is used to lmasure and analyze electric para...In this paper, virtual instnnnent technology is applied in the development of an electric parameter measta'ement system for mobile power stations. Virtual inset technology is used to lmasure and analyze electric parameters of mobile power stations. The whole measurement system is mmpmed of computer, data acquisition card and LabView virtual instnnnent platform. It can be used to monitor, record, and analyze electric parameters of sinusoidal alternating ciroait These parameters include voltage, effective value of ctaxent, phase differences, power, and etc. Experimental results show that this virtual measuring device satisfy the requirement of mobile power station montoring anti dynamic property analysis. Hardware and software design of the system will be discussed in detail.展开更多
文摘On the basis of the data of biological and nonbiological factors collected respectively from 1989 to 1990 and from 1995 to 1996 in the waters nearby the Qinshan Nuclear Power Station, the ecological environment and water quality of the waters are analyzed and assessed in the paper. The results show: (a) the surveyed area has the typical ecological characteristics of high tidal range estuary, rich nutrients and low biological productivity, (b) tide, runoff and offshore seawater intrusion are the key factors which result in seasonal and annual changes of various biological and non-biological factors, (c) the risking of seawater eutrophication index is resulted from enormous amount of the discharges of industrial and domestic sewage, (d) because the survey area is located in a high tidal-range estuary, thermal effluent from cooling system does not induce significant temperature changes, ( e) the first stage project of Qinshan nuclear power station has no notable impacts on the ecological environment in
基金Supported by State Environment Protection Bureau and Chinese Nuclear Industry Corporation (Project No.90201001)
文摘During 1991-1993, the radioactivity levels of the bone-coal mines were investigated in Hubei, Hunan, Ji-angxi, Zhejiang and Anhui Provinces, respectively, where the reserve of bone-coal is about 90% of our country’s total reserve. The annual additional collective dose equivalent within 80km evaluated region of bone-coal power stations in Nijiangkou and Anren is 1.7 and 1.9 man·mSv, respectively, and that of Zhuantanyan bone-coal shaft is 1.4 man·mSv. The collective dose equivalent caused by bone-coal cinder brick produced for 25 years in the five prov-inces is 1.6×105 man Sv.
文摘The effect of two bone-coal power stations(6MWe) on environment was investigated within the scope of the dose contribution caused by various radionucildes in different ways.It is found that the best measures to reduce the effect of bone-coal power station on radiation environment include to select a fine boiler system and a comprehensive utilization of the bone-coal cinder(BCC),soot and ash in the catchers.
文摘Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.
文摘Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.
文摘In this paper, virtual instnnnent technology is applied in the development of an electric parameter measta'ement system for mobile power stations. Virtual inset technology is used to lmasure and analyze electric parameters of mobile power stations. The whole measurement system is mmpmed of computer, data acquisition card and LabView virtual instnnnent platform. It can be used to monitor, record, and analyze electric parameters of sinusoidal alternating ciroait These parameters include voltage, effective value of ctaxent, phase differences, power, and etc. Experimental results show that this virtual measuring device satisfy the requirement of mobile power station montoring anti dynamic property analysis. Hardware and software design of the system will be discussed in detail.