排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
浅谈水上地质钻探方法选择与应用 总被引:3,自引:0,他引:3
以新建东乌铁路线黄河特大桥水上钻探为例,介绍了在具有定向流向水域中搭建水上移动钻探平台,以及复杂地质条件、自然因素影响下钻探方法的选择及平台的设计应用,在保证施工安全、钻探质量、钻探进度的同时控制成本,并对拼船、浮箱、汽油桶筏等方案进行比选,最终采用汽油桶筏方案。 相似文献
2.
提出了采用无极绳天线吊装拱肋钢管,然后利用拱肋为支撑吊装横梁的钢管混凝土拱桥吊装新方案.并结合实例证明采用此种方案吊装,可以减少吊装重量,节省吊装费用. 相似文献
3.
5.
对于山区桥梁来说,由于地形的限制,桥梁一般位于平、竖曲线上。这种桥梁的地震响应有着其自身的特点。梁桥仍然是公路建设的主要桥型。用自编的梁桥地震响应分析程序,对此类桥梁进行了计算和分析,总结了此类桥梁的地震响应特点,提出了抗震设计的一些建议。 相似文献
6.
本文从传播学的角度,对邓小平同志在革命和建设时期的新闻传播思想进行了深入的阐述,如宣传者、宣传内容、宣传对象、宣传方法(策略或技巧)、宣传效果等,同时又进一步阐释了邓小平的宣传思想。指出邓小平同志的新闻传播思想是马列主义新闻传播观的重要组成部分,对新闻工作者的传播实践活动具有一定的现实指导意义。 相似文献
7.
8.
With increased cyber attacks over years,information system security assessment becomes more and more important.This paper provides an ontology-based attack model,and then utilizes it to assess the information system security from attack angle.We categorize attacks into a taxonomy suitable for security assessment.The proposed taxonomy consists of five dimensions,which include attack impact,attack vector,attack target,vulnerability and defense.Afterwards we build an ontology according to the taxonomy.In the ontology,attack related concepts included in the five dimensions and relationships between them are formalized and analyzed in detail.We also populate our attack ontology with information from national vulnerability database(NVD)about the vulnerabilities,such as common vulnerabilities and exposures(CVE),common weakness enumeration(CWE),common vulnerability scoring system(CVSS),and common platform enumeration(CPE).Finally we propose an ontology-based framework for security assessment of network and computer systems,and describe the utilization of ontology in the security assessment and the method for evaluating attack efect on the system when it is under attack. 相似文献
9.
10.