首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
转基因植物的出现是科技发展的必然,但转基因植物的安全问题有待验证,以至于转基因植物引发的伦理争议层出不穷。转基 因植物的发展有利于保证粮食安全,缓解世界粮食短缺;减少人工化学品投放,保护生态环境;降低农业生产成本,提高劳动生产率; 丰富人类食品的种类,提高食物的营养价值;预防或治疗某些疾病,增强食品卫生预防能力。与此同时,转基因植物还可能引发食物中 毒、产生过敏反应、引起抗生特性等食用方面的风险,以及损害物种遗传多样性等环境方面的伦理争议。因此,实现转基因植物安全评 价应遵循生命伦理学的尊重原则、不伤害原则、公正原则、效用原则等四大原则,以促进转基因植物的和谐发展。  相似文献   

2.
互联网的迅速发展使公共安全事件在网络上迅速发酵,在传播过程中可能出现失真现象,引发舆论危机。公安微博作为社会安全阀在网络舆情回应中发挥着减缓舆情压力、安抚社会情绪、提示社会报警、提升社会创新等关键作用。同时,公安微博存在着回应时效性有待提升、舆情发展后期的持续回应缺位等问题,因此,公安机关应针对舆情发展不同阶段进行精细化应对,借助微博平台完善涉警网络舆情预警机制,同时提升工作人员的专业素养和舆情应对的制度化、规范化水平。  相似文献   

3.
互联网的快速发展,使得黑客工具在网络上迅速传播。信息系统在没有得到有效保护的情况下,随时可能遭受到外界的攻击,遭到破坏,甚至崩溃,对生产造成严重的后果。  相似文献   

4.
随着猪疫苗种类和免疫次数的急剧增加,以及猪品种和应激因素等变化.近些年因注射疫苗而发生的过敏反应明显增多.而其中最引人注目的是过敏性休克,常因猝死而造成较大损失。猪注射疫苗的过敏反应率一般为1%~2%.但不同种类和批次的疫苗,不同猪群或窝次,其发生率差别可能很大,如过敏性反应属休克型.其致死率可达30%~70%。不同种类的疫苗(含菌苗),如全病原体苗、基因缺失苗、基因工程苗、组织苗、细胞苗或油乳剂、铝胶剂等  相似文献   

5.
序言:随着生活水平的提高,人们越来越希望更好地享受生活,而目前传统的CRT显示器已经很难满足人们要求,于是大屏幕投影技术迅速向家用市场方向发展,家用投影机也就越来越受到人们的重视。投影机是一种非常精密的光电设备,具有高亮度、高画质、低辐射、多功能等特点,利用它可以接收来自录像机、VCD、DVD等视频播放设备的信号源,来组建家庭影院;也可以连接电脑,播放影音图像或进行网上冲浪,因此家用投影机将成为新一代家庭娱乐产品的首选。  相似文献   

6.
数字内容递送是发展Internet上数字内容市场的一个关键。数字内容递送技术的目标是平滑的集成递送链上的各种应用、安全递送数字内容以及增强数字内容的可信度。由于XML的优良特性,它能够为数字内容递送技术带来巨大优势。文中探讨了一些应用XML的数字内容递送技术,包括基于XML的数字内容组织和管理技术、数字权限管理技术以及基于XML的安全技术;并对所实现的一个安全递送原型系统作了简单介绍。  相似文献   

7.
仔猪出生后立即注射猪瘟弱毒疫苗进行免疫的方法称为超前免疫(简称超免),或称乳前免疫、零时免疫等。据研究,这是一种避免母源抗体干扰,迅速提高初生仔猪抗体水平的有效方法。通过一二十年在我国多地试验研究和应用,对其效果的认识和评价不一.且分歧不断增大。现根据实际应用的体会及一些报道资料,对超免的认识、应用和存在的问题以及解决办法分述如下。  相似文献   

8.
掌上GPS导航系统的研究   总被引:2,自引:0,他引:2  
通过分析近年来地理信息系统(GIS)、全球定位系统(GPS)的进展和前景,探讨了在掌上电脑、PDA等迅速发展的今天,GIS、GPS和掌上电脑等技术有机结合的发展趋势;提出了掌上GPS导航系统构造模型及设计思想;分析了模型的具体实现方法;推出了掌上GPS导航系统产品,从而满足了大量大众化导航系统的需要。并在此基础上对掌上GPS导航系统的应用前景及发展趋势做了进一步的研究与探讨。  相似文献   

9.
近年来,计算机技术、网络技术等发展迅速,若将这些先进技术应用于会议系统中,可以使会议系统的功能更强大、性能更优越、操作更加人性化。因此,网络化及无纸化多媒体已成为会议系统的主要发展方向。  相似文献   

10.
大数据时代下信息技术、计算机网络全面发展,迅速普及,但同时其安全性也面临着巨大挑战,因此采用一系列有效的措施来保证网络安全是当下亟待结果的关键问题。本文在阐述大数据技术和网络安全防范重要性的基础上,从管理体系、数据储存、防范技术和人员素质等4个方面剖析了当前网络安全存在的问题;进一步就如何加强网络安全防范提出了3个建议措施。  相似文献   

11.
Content Adaptation Architectures Based on Squid Proxy Server   总被引:4,自引:0,他引:4  
The overwhelming popularity of Internet and the technology advancements have determined the diffusion of many different Web-enabled devices. In such an heterogeneous client environment, efficient content adaptation and delivery services are becoming a major requirement for the new Internet service infrastructure. In this paper we describe intermediary-based architectures that provide adaptation and delivery of Web content to different user terminals. We present the design of a Squid-based prototype that carries out the adaptation of Web images and combines such a functionality with the caching of multiple versions of the same resource. We also investigate how to provide some form of cooperation among the nodes of the intermediary infrastructure, with the goal to evaluate to what extent the cooperation in discovering, adapting, and delivering Web resources can improve the user-perceived performance.  相似文献   

12.
13.
Transdermal drug delivery has given cardinal contribution to medical practices. First-generation transdermal delivery of small, lipophilic, low-dose drugs and second-generation delivery systems using chemical enhancers, non-cavitational ultrasound and iontophoresis have also resulted in various clinical products provides added functionality. Third-generation delivery systems using microneedles, thermal ablation, microdermabrasion, electroporation and cavitational ultrasound targeting skin’s barrier layer of stratum corneum. Microneedles acquire pronounced intrigue in recent days. Currently, microneedles are advancing through clinical trials for delivery of macromolecules and vaccines, such as insulin, parathyroid hormone and influenza vaccine. The review explains about the concept of transdermal drug microneedle system comprising of microreservoir, micropumps, flow sensors, types of microneedles. Various researches carried out on these components of microneedle system is elaborately discussed in this review.  相似文献   

14.
An attack tree is a useful analytical technique to model security threats and/or risks, and hence model attacks as actual realizations of the former. Research on attack trees have focused either on applying such trees to model various ranges of security systems, or on advancements to this technique in itself. In this paper, we revisit the notion of attack tree attribution, i.e. how explicit attribute values of child nodes are aggregated to form the attribute of the parent node, and propose a novel attribution approach. We then show using this approach within the context of analyzing the weakest links of security systems, how the weakest link may not necessarily always be so, but instead it depends on the existence of other stronger links within the system.  相似文献   

15.
16.
In the era of Industry 4.0, 3D printing unlocks a wide array of solutions to rapidly-produce spare parts for maintenance operations. In this research, we propose a hybrid simulation approach, combining agent-based and discrete event simulation methods, to investigate how the adoption of 3D printing technologies to manufacture spare parts for maintenance operations will improve operational efficiency and effectiveness. Specifically, our framework is applied to the United States Navy’s fighter jet maintenance operations to study various network configurations, where 3D printing facilities may be centralized, decentralized, or hub configured. System performance in terms of the total cost, timeliness of delivery, and vulnerability under disruptions such as cyber-attacks and emergencies are evaluated. Lastly, the impact of 3D printing technological advancements on operational performance is investigated to obtain managerial insights.  相似文献   

17.
The German energy market is facing several challenges due to changes in regulation, technical advancements as well as increasing energy costs and climate achievements like CO2 reduction. This results in changing requirements for companies in the energy market and thus business information systems, which support their core tasks and processes. Software product managers in energy and software developing companies in charge of driving the functional development of information systems have to deal with these challenges and need to develop new information systems or enhance existing ones. Conceptual models proved helpful to design and implement information systems within several industries. However, identification and management of models as well as impact analysis of model changes results difficult. This contribution describes methods to construct, use and maintain a domain specific reference model catalog to support requirements analysis for software product manager in the German electricity and gas market.  相似文献   

18.
Technological advancements, including advancements in the medical field have drastically improved our quality of life, thus pushing life expectancy increasingly higher. This has also had the effect of increasing the number of elderly population. More than ever, health-care institutions must now care for a large number of elderly patients, which is one of the contributing factors in the rising health-care costs. Rising costs have prompted hospitals and other health-care institutions to seek various cost-cutting measures in order to remain competitive. One avenue being explored lies in the technological advancements that can make hospital working environments much more efficient. Various communication technologies, mobile computing devices, micro-embedded devices and sensors have the ability to support medical staff efficiency and improve health-care systems. In particular, one promising application of these technologies is towards deducing medical staff activities. Having this continuous knowledge about health-care staff activities can provide medical staff with crucial information of particular patients, interconnect with other supporting applications in a seamless manner (e.g. a doctor diagnosing a patient can automatically be sent the patient's lab report from the pathologist), a clear picture of the time utilisation of doctors and nurses and also enable remote virtual collaboration between activities, thus creating a strong base for establishment of an efficient collaborative environment. In this paper, we describe our activity recognition system that in conjunction with our efficiency mechanism has the potential to cut down health-care costs by making the working environments more efficient. Initially, we outline the activity recognition process that has the ability to infer user activities based on the self-organisation of surrounding objects that user may manipulate. We then use the activity recognition information to enhance virtual collaboration in order to improve overall efficiency of tasks within a hospital environment. We have analysed a number of medical staff activities to guide our simulation setup. Our results show an accurate activity recognition process for individual users with respect to their behaviour. At the same time we support remote virtual collaboration through tasks allocation process between doctors and nurses with results showing maximum efficiency within the resource constraints.  相似文献   

19.
《Computer Networks》2007,51(12):3632-3649
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolerant computing and communication. Since such groups do not require any pre-deployed infrastructure or any trusted centralized authority they have many valuable applications in military and commercial as well as in emergency and rescue operations. However, due to lack of centralized control, ad hoc groups are inherently insecure and vulnerable to attacks from both within and outside the group.Decentralized access control is the fundamental security service for ad hoc groups. It is needed not only to prevent unauthorized nodes from becoming members but also to bootstrap other security services such as key management and secure routing. In this paper, we construct several distributed access control mechanisms for ad hoc groups. We investigate, in particular, the applicability and the utility of threshold cryptography (more specifically, various flavors of existing threshold signatures) towards this goal.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号