首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15篇
  免费   0篇
安全科学   5篇
环保管理   3篇
基础理论   5篇
灾害及防治   2篇
  2023年   1篇
  2021年   1篇
  2019年   1篇
  2012年   1篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2006年   1篇
  2005年   2篇
  2004年   2篇
  1994年   1篇
  1990年   1篇
排序方式: 共有15条查询结果,搜索用时 15 毫秒
1.
为了保障移动通信信息系统的安全,制定有效的、可操作性的、科学的安全风险评估体系是当务之急。通过对国内外移动通信信息系统安全风险评估研究的现状,结合其他行业诸如铁路系统、地理信息系统等的信息安全风险评估的经验,笔者首先从一个移动通信信息安全系统风险评估的基本概念入手,给出了诸如风险、脆弱性、威胁、残余风险等一系列定义,提出了移动通信信息系统安全风险评估工作的模型和方案,以及风险评估工作中应该考虑的要素和工作细节,旨在为风险评估工作提供理论指导,使风险评估的过程和结果更具有逻辑性、系统性和可操作性,从而提高风险评估的质量和效果。实践证明了模型和方案是行之有效的。  相似文献   
2.
The risk of predation drives many behavioral responses in prey. However, few studies have directly tested whether predation risk alters the way other variables influence prey behavior. Here we use information theory (Akaike’s Information Criterion, AICc) in a novel way to test the hypothesis that the decision-making rules governing elk behavior are simplified by the presence of wolves. With elk habitat use as the dependent variable, we test whether the number of independent variables (i.e., the size of the models) that best predict this behavior differ when wolves are present vs absent. Thus, we use AICc scores simply to determine the number of variables to which elk respond when making decisions. We measured habitat use using 2,288 locations from GPS collars on 14 elk, over two winters (14 elk winters), in the Gallatin Canyon portion of the Greater Yellowstone Ecosystem. We found that the use of three major habitat components (grass, conifer, sage) was sensitive to many variables on days that wolves were locally absent, with the best models (ΔAICc≤2) averaging 7.4 parameters. In contrast, habitat use was sensitive to few variables on days when wolves were present: the best models averaged only 2.5 parameters. Because fewer variables affect elk behavior in the presence of wolves, we conclude that elk use simpler decision-making rules in the presence of wolves. This simplification of decision-making rules implies that predation risk imposes selection pressures that do not allow prey to respond to other pressures in ways that they otherwise would. If the affected processes are important, then this indirect effect of predation is likely to be important.  相似文献   
3.
Recent research on the effects of personal threat suggests that perceived threat might enhance pro-environmental behavior when pro-environmental norms are in focus. In three experiments we found support for the latter assumption, showing that mortality salience and salience of pro-environmental norms interacted in predicting pro-environmental attitudes and information search (Study 1), sustainable behavior in a forest management game (Study 2), as well as pro-environmental intentions and behavior (Study 3). Specifically, mortality salience increased pro-environmental conduct only when pro-environmental norms were salient. Moreover, norm salience only had an effect on pro-environmental attitudes and behavior when the threat of personal mortality was salient. We discuss the implications of these results for both terror management theory and the promotion of pro-environmental behaviors.  相似文献   
4.
According to the threat-sensitive predator avoidance hypothesis, selection favors prey that accurately assess the degree of threat posed by a predator and adjust their anti-predator response to match the level of risk. Many species of animals rely on chemical cues to estimate predation risk; however, the information content conveyed in these chemical signatures is not well understood. We tested the threat-sensitive predator avoidance hypothesis by determining the specificity of the information conveyed to prey in the chemical signature of their predator. We found that fathead minnows (Pimephales promelas) could determine the degree of threat posed by northern pike (Esox lucius) based on the concentration of chemical cues used. The proportion of minnows that exhibited an anti-predator response when exposed to a predator cue increased as the concentration of the pike cue used increased. More surprisingly, the prey could also distinguish large pike from small pike based on their odor alone. The minnows responded more intensely to cues of small pike than to cues of large pike. In this predator–prey system small pike likely represent a greater threat than large pike.Communicated by A. Mathis  相似文献   
5.
Many lizard species use lateral compressions of the body during agonistic encounters. I investigated the signal value of the frequency at which these displays are presented and how that rate is affected by familiarity and threat. The response of resident collared lizards (Crotaphytus collaris) to tethered strangers, neighbors on the correct boundary, and neighbors displaced to the opposite boundary, was recorded by counting the number of lateral displays directed at the intruder and the number of subsequent acts of escalated aggression. There was no relationship between size asymmetry of the opponent and the rate of lateral display or aggression, nor was there a relationship between body size and the rate of lateral display or aggression. However, there was a high positive correlation between lateral display rate and aggression, suggesting that the rate of lateral displays is a conventional signal of motivation to attack. The highest rates of display and aggression were directed toward displaced neighbors, somewhat less toward strangers, and the least toward neighbors at the correct boundary. The ratio of aggressive acts to lateral displays followed the same pattern, presumably because the perceived threat to the resident decreases in the same order. Taken together these data suggest that collared lizards are able to assess the threat of an opponent and signal motivation to respond aggressively towards that opponent.Communicated by S. Downes  相似文献   
6.
Introduction: The U.S. experience with motorcycle helmets affords an important insight into the responses of adolescents to age-specific laws. Political contention has led to a number of U.S. state law changes back and forth between universal and age-specific laws. Because both kinds of law require adolescent motorcyclists to wear helmets, relatively few studies have focused on how the law type affects their behavior. Method: Differential behavior is tested by a systematic review of literature, leading to a meta-analysis, in relation to the experience of various states’ motorcycle helmet laws. An electronic search was conducted for before-and-after studies in U.S. states that include data on adolescent helmet usage – both with a universally applicable motorcycle helmet law, and with an age-restricted law (usually, under-21 or under-18) – from observational, injury or fatality records for a certain period (e.g., 12 months) pre and post the state law change. Results: The search yielded ten studies, including two that compared a set of age-specific law states with a set of universal law states over the same time period. Heterogeneity analysis of seven single-state studies with raw data revealed an acceptable fit for a random-effects model. Additional noncompliance with age-restricted laws was indicated by an attributable percentage among exposed of over 65% and odds ratio exceeding 4. Conclusions: About two-thirds of adolescent noncompliance with age-restricted motorcycle helmet usage laws disappears with universal applicability. Evidence from numerous international studies of youth reaction to helmet laws suggests that a large part of the greater compliance with universal laws is due to their conveying a more convincing message that helmets afford protection against injury. Practical Applications: The meta-analysis provides fresh, young-rider perspective on the continuing debate over motorcycle-helmet laws. Broader insight into adolescent psychology suggests considering alternatives to age-restricted laws more widely in safety and health policy.  相似文献   
7.
无线局域网由于其自由组网的快捷、使用方便和成本低等优势 ,备受青睐 ,尤其是那些受地理条件限制的地方布置有线网络困难且成本高 ,以及临时使用的诸如国际会议、灾区救助的情况下的局域通信需要快速组网等 ,但是由于其通信的内容的公开性也容易被攻击者获得 ,其安全问题变得十分突出。基于对无线局域网的信息机密性、完整性和可用性面临的攻击的详细分析 ,结合相应的安全技术原理的论述 ,提出了将双向认证、数据加密技术、防火墙和增强的完整性校验 ,“四位一体”的安全防卫方案 ,从而保证了无线局域网的整体安全 ,对无线局域网的健康发展具有一定的理论和实践意义。  相似文献   
8.
Despite the importance of acquired predator recognition in mediating predator–prey interactions, we know little about the specific characteristics that prey use to distinguish predators from non-predators. Recent experiments with mammals and fish indicate that some prey lacking innate predator recognition have the ability to display anti-predator responses upon their first encounter with those predators if they are similar to predators that the prey has recently learned to recognize. This phenomenon is referred to as generalization of predator recognition. In this experiment, we documented for the first time that larval amphibians (woodfrog, Rana sylvatica) have the ability to generalize the recognition of known predators to closely related novel predators. Moreover, we demonstrated that this ability is dependent on the level of risk associated with the known predator. When red-bellied newt, Cynops pyrrhogaster (known predator), was paired with simulated low risk, tadpoles displayed fright responses to newts and novel tiger salamanders, Ambystoma tigrinum, but not to novel African clawed frogs, Xenopus laevis. However, when the newt was paired with simulated high risk, tadpoles generalized their responses to both tiger salamanders and African clawed frogs. Larval anurans seem to have a wider generalization frame than other animals.  相似文献   
9.
Climate change can increase societies’ propensity to conflict by changes in socio-structural conditions (e.g., resource scarcity, migration). We propose an additional, subtle, and general effect of climate change threat via increases in authoritarian attitudes. Three studies in Germany and the UK support this suggestion. Reminding participants of the adverse consequences climate change may have for their country increased the derogation of societal groups that may threaten the collective (e.g., criminals) as well as general authoritarian attitudes. Salient climate change threats also led to system justification and approval of system supporting groups (e.g., judges) in those people who were highly identified with their nation. We discuss the implications of these findings for the explanation of authoritarian attitudes and the question of how societies may cope with the subtle social psychological effects of climate change.  相似文献   
10.
The objectives of this study were to (1) evaluate the performance of the Multi‐Radar Multi‐Sensor (MRMS) system in capturing precipitation compared to gauge data, and (2) assess the effects of spatial (1–50 km) and temporal (15–120 min) data aggregation scales on the performance of the MRMS system. Point‐to‐grid comparisons were conducted between 215 rain gauges and the MRMS system. The MRMS system at 1 km spatial and 15 min temporal resolutions captured precipitation reasonably well with average R2, root mean square error (RMSE), and percent bias (PBIAS) values of 0.65, 0.5 mm, and 11.9 mm; whereas Threat Score, probability of detection, and false alarm ratio were 0.57, 0.92, and 0.40, respectively. Decreasing temporal resolution from 15 min to two hours resulted in an increase in R2 and a decrease in RMSE, whereas PBIAS was not affected. Reducing spatial resolution from 1 to 50 km resulted in increases in R2 and PBIAS, whereas RMSE was decreased. Increasing spatial aggregation scale from 1 to 50 km resulted in an R2 increase of only 0.08. Similarly, improvement in R2 was only modest (0.17) compared to an eightfold reduction in temporal resolution (from 15 min to two hours). While aggregating data at coarser temporal resolutions resolved some of the under/overestimation issues of the MRMS system, it was apparent even at coarser spatial and temporal resolutions the MRMS system inherently overestimated smaller precipitation events while underestimated bigger events.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号