Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: December 2013
Authors: Lei Zhan, Ji Guo Sun, Jin Guang He
The ergonomics investigation on the footrest could not only improve the occupant comfort of the seat, but also reduce the safety issues for the passengers.
Therefore, only two elements should be considered during the ergonomics analysis of the rear passengers: i) occupant comfort and ii) operability and safety.
In addition, the safety of the footrest should be considered besides the operability during the design.The safety issues indicate all the dangers which could potentially occurred during the use of the footrest.
It is worthy to mention that the designed structure of the footrest needs to optimize further to guarantee the structure strength and traffic safety.
Boileau, Distribution of humanseat interface pressure on a soft automotive seat under vertical vibration, International Journal of Industrial Ergonomics 24 (1999) :545~557
Therefore, only two elements should be considered during the ergonomics analysis of the rear passengers: i) occupant comfort and ii) operability and safety.
In addition, the safety of the footrest should be considered besides the operability during the design.The safety issues indicate all the dangers which could potentially occurred during the use of the footrest.
It is worthy to mention that the designed structure of the footrest needs to optimize further to guarantee the structure strength and traffic safety.
Boileau, Distribution of humanseat interface pressure on a soft automotive seat under vertical vibration, International Journal of Industrial Ergonomics 24 (1999) :545~557
Online since: July 2013
Authors: Yan Hou, Xin Min Xiong
Introduction
Vehicle rollover is the serious traffic accident causing the significant loss of life and property.
Optimizing the vehicle parameters in the design and studying the anti-rollover control system, which can improve the vehicle anti-rollover stability and the running safety of vehicle.
Journal of Terramechanics, 2010, vol. 47, issue 3, pp.179-189
[6] Shushan Xu, Junxia Guo, and Sanxu Yang: Electron Influence on Characteristics in Capacitance Weighing Sensor of Traffic with Velocity and Acceleration, J.
Journal of Henan Normal University (Natural Science), 2008, vol.36, issue 5, pp.65-68, in Chinese
Optimizing the vehicle parameters in the design and studying the anti-rollover control system, which can improve the vehicle anti-rollover stability and the running safety of vehicle.
Journal of Terramechanics, 2010, vol. 47, issue 3, pp.179-189
[6] Shushan Xu, Junxia Guo, and Sanxu Yang: Electron Influence on Characteristics in Capacitance Weighing Sensor of Traffic with Velocity and Acceleration, J.
Journal of Henan Normal University (Natural Science), 2008, vol.36, issue 5, pp.65-68, in Chinese
Online since: November 2015
Authors: Steven McNeil, Peter Ingham, Matthew Sunderland, Warren Meade
Fire safety.
Wool carpets provide comfort and safety for standing and walking.
Tapp, The design and initial evaluation of visual cues in carpets to assist walking, Journal Text.
Marazzi, Lanasan NCF: nanoparticles enhance carpet performance, International Dyer. 191(1) (2006) 23-25
, International Dyer. 185(9) (2000) 14-16
Wool carpets provide comfort and safety for standing and walking.
Tapp, The design and initial evaluation of visual cues in carpets to assist walking, Journal Text.
Marazzi, Lanasan NCF: nanoparticles enhance carpet performance, International Dyer. 191(1) (2006) 23-25
, International Dyer. 185(9) (2000) 14-16
Online since: December 2011
Authors: Ye Fei, Tian En Zhu, Yan Jun Liu
The rearch of finite element analysis method about the boom of truck crane
Fei Ye, Zhu Tianen and Liu Yanjun
School of Traffic & Mechanical Engineering, Shenyang Jianzhu University, Shenyang, China
School of Traffic & Mechanical Engineering, Shenyang Jianzhu University, Shenyang, China
School of Traffic & Mechanical Engineering, Shenyang Jianzhu University, Shenyang, China
feiye0@sina.com,tianenci@163.com,liujun19872008@126.com
Keywords: truck crane, telescopic boom, finite element analysis
Abstract.
(2) in Eq.2: ——lifting pulley block rate; ——angle between axis of boom and horizontal line ——lifting pulley block efficiency; (3) horizontal inertia force of rotary plane: (3) in Eq.3: ——deflection angle between vertical wore rope and plumb line, for truck crane3- ; (4) wind load: (4) in Eq.4: ——wind factor; ——wind pressure variety factor; ——wind vibration factor(for common crane =1.0); ——frontal area of structure and goods(m2); ——calculated wind pressure(N/m2); (5) maximum normal stress: (5) (6) allowable stress []: (6) in Eq.6: n——safety
Engineering Journal, 2002, 39(2): 74-85
Japanese focus-International rescure[J].Cranes Today, 1998(7): 73-81
(2) in Eq.2: ——lifting pulley block rate; ——angle between axis of boom and horizontal line ——lifting pulley block efficiency; (3) horizontal inertia force of rotary plane: (3) in Eq.3: ——deflection angle between vertical wore rope and plumb line, for truck crane3- ; (4) wind load: (4) in Eq.4: ——wind factor; ——wind pressure variety factor; ——wind vibration factor(for common crane =1.0); ——frontal area of structure and goods(m2); ——calculated wind pressure(N/m2); (5) maximum normal stress: (5) (6) allowable stress []: (6) in Eq.6: n——safety
Engineering Journal, 2002, 39(2): 74-85
Japanese focus-International rescure[J].Cranes Today, 1998(7): 73-81
Online since: September 2013
Authors: Xun Yi Ren, Yang Yu
The attacker monitors the traffic of B and changes its status from running to offline to bring about communication interrupt by traffic attack or modifying the configuration file.
In traditional mode, there is a set of independent security protection products on each physical machine or server as well as products such as firewall, gateway safety protection equipments and WAF deployed at the periphery.
However, new network model is used in virtualized data center, where dozens of operating systems or application programs are deployed on physical server in the form of VMs so that the hardware resources are shared and external networks can be imperceptible to the network traffic among the VMs.
Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology.
Chinese Journal of Computers, 2009, 4(4): 709-720.
In traditional mode, there is a set of independent security protection products on each physical machine or server as well as products such as firewall, gateway safety protection equipments and WAF deployed at the periphery.
However, new network model is used in virtualized data center, where dozens of operating systems or application programs are deployed on physical server in the form of VMs so that the hardware resources are shared and external networks can be imperceptible to the network traffic among the VMs.
Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology.
Chinese Journal of Computers, 2009, 4(4): 709-720.
Online since: February 2011
Authors: Tie Zhu Zhang, Yong Min Lu
It can be seen that most domestic and international scholars regard the repair problem of road network as a combinatorial optimization problem, mostly use travel time, traffic and other information to performance the assessment goal of the scheduling procedure for post-disaster road network rehabilitation, and repair time as a specific value.
References [1] Fiedrich, F., Gehbauer, F., Rickers, U: Optimized Resource Allocation for Emergency Response after Earthquake Disasters, Safety Science, Vol.35 (2000), p. 41-57
[5] Liang Yana, Bao Jinsong, Hu Xiaofeng, Jin Ye, in: A heuristic project scheduling approach for quick response to maritime disaster rescue, International Journal of Project Management, Vol. 8(2009), p.620-628
Leaning, in: Disasters and Emergency Planning, International Encyclopedia of Public Health, Vol. 20(2008), p.204-215
[7] Brysy O, Dullaert W, in: A Fast Evolutionary Metaheuristic for the Vehicle Routing Problem with Time Windows, International Journal of Artificial Intelligence Tools, Vol. 12(2002).
References [1] Fiedrich, F., Gehbauer, F., Rickers, U: Optimized Resource Allocation for Emergency Response after Earthquake Disasters, Safety Science, Vol.35 (2000), p. 41-57
[5] Liang Yana, Bao Jinsong, Hu Xiaofeng, Jin Ye, in: A heuristic project scheduling approach for quick response to maritime disaster rescue, International Journal of Project Management, Vol. 8(2009), p.620-628
Leaning, in: Disasters and Emergency Planning, International Encyclopedia of Public Health, Vol. 20(2008), p.204-215
[7] Brysy O, Dullaert W, in: A Fast Evolutionary Metaheuristic for the Vehicle Routing Problem with Time Windows, International Journal of Artificial Intelligence Tools, Vol. 12(2002).
Online since: May 2014
Authors: Yan Li, Nuo Wang, Li Min Yuan
Support vector machine algorithm, K-means clustering algorithm, database management traffic characteristics transform algorithm and the proposed algorithm are used respectively to make intrusion detection of multi-layer distributed and large differences database.
According to the above experimental data, it can be learned that by using this algorithm make intrusion detection of multi-layer distributed and large differences database, can greatly improve the detection rate and reduce the false alarm rate, to ensure maximum safety of database.
On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks.
Journal of Chengdu University of Information technology, 2005, 20(1):1-4
Proceedings of the First International Conference on Broadband Networks, 2004: 690-699.
According to the above experimental data, it can be learned that by using this algorithm make intrusion detection of multi-layer distributed and large differences database, can greatly improve the detection rate and reduce the false alarm rate, to ensure maximum safety of database.
On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks.
Journal of Chengdu University of Information technology, 2005, 20(1):1-4
Proceedings of the First International Conference on Broadband Networks, 2004: 690-699.
Online since: September 2011
Authors: Ze Hao Min
Zhao Ying (1999) believes that national economic security is a country's economic competitiveness, the capacity to withstand a variety of domestic and foreign interference, threats, invasion, etc., and also a country’s growing domestic and international environment for its existence and development.
Currently, nuclear power is welcomed in the international energy industry, but its accompanying negative impacts on economic security bring the country some insecurity, its disadvantages are as follows: (1) Possibility of nuclear leakage of nuclear power plants, i.e. security issues.
Analyzed the Safety of Nuclear Power Station [J].
International nuclear power application and its prospect forecast and our country nuclear electricity development [J].
Journal of North China Electric Power University(Natural Science Edition), 2007(5)
Currently, nuclear power is welcomed in the international energy industry, but its accompanying negative impacts on economic security bring the country some insecurity, its disadvantages are as follows: (1) Possibility of nuclear leakage of nuclear power plants, i.e. security issues.
Analyzed the Safety of Nuclear Power Station [J].
International nuclear power application and its prospect forecast and our country nuclear electricity development [J].
Journal of North China Electric Power University(Natural Science Edition), 2007(5)
Online since: October 2011
Authors: Sheng Xiang Lei, Bo Gao
Both are within the permitted vibration velocity and can ensure the safety of rock and structure.
Tunnels and Tunnelling International. 2003, 35(7):43-44 [2] Yin Zhizheng.
Vibration monitoring and safety evaluation of blasting at an underground engineering[J].
Vibration monitoring and safety evaluation of blasting at an underground engineering[J].
International Journal of Mining, Reclamation and Environment, 2009, 23(4): 261-273
Tunnels and Tunnelling International. 2003, 35(7):43-44 [2] Yin Zhizheng.
Vibration monitoring and safety evaluation of blasting at an underground engineering[J].
Vibration monitoring and safety evaluation of blasting at an underground engineering[J].
International Journal of Mining, Reclamation and Environment, 2009, 23(4): 261-273
Online since: January 2013
Authors: Ya Lan Li, Wei Peng Guo, Wen Tao Jiang, Yu Bo Fan, Qingyuan Wang
In some situations, the trauma caused by serious traffic accidents, falls and beat, infections and tumors etc may result in mandibular discontinuity or deformation.
This is considered beneficial for the implant’s safety.
On the contrary, this will improve the safety on a certain extent.
Journal of Mater Processing Technology, 1996, 57 (1-2):48-54
International Journal of Plasticity, 2002, 18 (5-6) :63-65
This is considered beneficial for the implant’s safety.
On the contrary, this will improve the safety on a certain extent.
Journal of Mater Processing Technology, 1996, 57 (1-2):48-54
International Journal of Plasticity, 2002, 18 (5-6) :63-65