The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Drugs circulation channels are not only related to the drug industry development, but also the human health and safety, therefore, the implementation of government supervision on drug circulation channel is one of the key content of the social and economic regulation. This paper established a basic model of drug circulation channel of government supervision, and tried to seek and explore a more effective...
Firstly, this article introduce foreign theoretical research of risk management in the subway tunnel project from four aspects that evaluation theory, management model, accident statistics, risk analysis. Secondly, the paper analyze foreign practice research of risk management in the subway tunnel project from four aspects that computer simulation, information platform, standards, government regulations...
Because of the complex influencing factors, it is very difficulty to resolve the problem of large scale pillar extraction and goaf disposal in underground mine. Fortunately, with the rapid development of computational mechanics, numerical methods and computer technology, the feasibility of numerical simulation has become an important feature of the current rock mass mechanics. Accordingly, using the...
From the angle of improving data encryption in the information domain, put forward an arithmetic that applies the fractal geometry characteristic and spatial alternation to data encryption technology, Simultaneously uses the method that spoil the data to achieve the purpose that protect the data. Turn a ordered and significant data into several out-of-order and insignificant data, then combine the...
This paper presents a comparative analysis, set in Vanet scenarios and based on simulations, between the well-known IEEE 802.11p standard and an efficient slotted protocol based on RR-Aloha (MS-Aloha). Notably the chosen slotted protocol is completely distributed and based on reservation, and has been specifically designed to face issues typical of mobility, while preserving quality of service guarantee...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.