首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
概要介绍建筑性能防火设计的原理和方法,结合会展类建筑的特殊性,指出会展类建筑在常规防火设计中遇到的问题,并对性能化防火设计方法在会展类建筑中的运用进行了探讨。  相似文献   

2.
通过设定火灾场景、设定火灾、火灾烟气数值模拟分析和人员疏散数值模拟分析等几个方面,从“性能化”设计的角度进行探讨,并通过一个实例对大空间建筑进行了“性能化”防火设计。与“处方式”防火设计相比,性能化防火设计在大空间建筑防火设计上具有更多优越性。  相似文献   

3.
论性能化防火设计中安全疏散设计的检验   总被引:3,自引:0,他引:3  
以超高层商住楼为例 ,对“性能化”防火设计中安全疏散设计的检验原理、方法进行了较为深入的探讨 ,目的在于为我国的“性能化”防火设计提供一种切实可行的设计方法  相似文献   

4.
分析了目前大型室内市场建筑现状,总结出其防火设计的难点,提出了防火设计的基本原则,并从总平面布局、防火分区、防排烟、消防设施以及内部装修等方面提出了具体的对策。  相似文献   

5.
运用CBA方法对防火设计方案进行分析对提高决策的经济性非常重要。针对防火设计的特点,研究出了一种改进的CBA模型,同时具体量化了CBA方法中涉及到的成本、效益,确定了用于防火决策的最终原则,最后结合某国外具体工程实例对该模型进行验证,证明了其经济性、科学性。为CBA法今后在防火设计决策中的发展和应用指明了方向。  相似文献   

6.
电气线路火灾危险性较大,而在工程实际应用中对电气配电线路的敷设防火设计和管理往往被忽略,根据相关规范标准的规定和不同提法,结合工作经验,提出电气配电线路敷的设防火设计的合理化实施意见。  相似文献   

7.
从焦化工程的工艺流程出发,分析了其火灾危险性,提出了基本消防设计对策,为我国编制出台《煤化工防火设计规范》,从根本上解决煤化工工程在防火设计、建设施工、消防审核和验收中遇到的难题,提供理论依据。  相似文献   

8.
根据我国白酒行业白酒库的建设和使用现状,分析白酒库和白酒成品库的实际火灾危险性,针对防火设计方面存在的疑难,对总平面布置、储存、建筑构件、消防设施等设计要求进行了分析研究,并提出防火设计措施.  相似文献   

9.
近年来我国国民经济和城市化建设飞速发展,大型商场、大型体育场馆或会展中心等大型公共建筑的数量也日益增多,普遍存在防火分区面积大、疏散距离过长等防火设计问题。目前性能化防火设计已经成为建筑防火设计领域一个全球性的发展趋势,得到了越来越多的关注和应用,大型公共建筑即为应用领域之一。本案例采用性能化防火设计方法,应用"亚安全区"的设计思路,设计了4个中庭作为亚安全区,通过性能化设计分析设计方案的可行性,并提出优化设计建议。  相似文献   

10.
根据我国有顶步行商业街建筑或建筑群的建设和使用现状,研究有顶步行商业街的实际火灾危险性,针对防火设计方面存在的难点,对平面布置、顶棚构件、防火分隔、消防设施等设计要求进行了分析研究,并提出了防火设计措施。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   

13.
A range of theories have sought to explain and predict secession with varying degrees of success. Arguing that a disproportionate focus upon the seceding group as the unit of analysis has frustrated the development of a comprehensive theoretical framework that is universally valid, this article highlights the role of predecessor institutions of governance and the failure of states to successfully incorporate these as an important, but neglected, causal factor in the study of secession. The inclusion of pre-state institutions of governance and processes of state formation not only results in a more complete, and therefore accurate, explanatory account of secession, but also explains why some regions have been more prone to secession than others.  相似文献   

14.
针对目前网络在人们的日常生活中的应用越来越广泛这种实际情况,介绍一些与网络数据安全有关的知识,对数据加密模型、对称(私用密钥)加密体制、非对称(公开密钥)加密体制等概念及常用算法进行了介绍。通过列举的方法介绍了加密应用中常用的几种技术,得出了XML加密技术在网络加密技术应用中有不可比拟的优势的结论。  相似文献   

15.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

16.
破片速度的测量是导弹实弹飞行试验中一项难度较高的课题,准确的测量结果对于科学评价武器毁伤效能等技术指标具有十分重要的意义.立足国内技术现状,综述了导弹破片速度测量评定的一般方法,分析了各方法的基本原理,针对每种方法探讨了测量评定破片速度所存在的误差源.结合导弹实弹飞行试验特点及靶场试验实际情况,重点对采用靶网法测量单枚破片速度的误差及误差源进行了分析,给出了误差修正模型及提高测速精度的技术措施,并指出了靶场现有破片测速方案的不足和改进方向.论文成果在靶场实践中得到了部分应用.  相似文献   

17.
运用当前国际上最流行的MATLAB软件及SIMULINK软件包,对8-300柴油机带水力测功器系统进行了PID控制器的设计及仿真,并分析了仿真结果,最后得出了对实现该系统控制有重要价值的PID控制器.  相似文献   

18.
《Arms and Armour》2013,10(2):103-123
The Royal Armouries of Leeds preserves a rare example of an early fifteenth-century German tournament high saddle that is also one of the earliest complete western medieval saddles preserved. It bears witness to an extreme form of tournament which stood very far from the real practice of war: the Hohenzeuggestech. Impact marks of lances and swords, visible on the saddle, reveal the violence of the blows exchanged during these meetings, a violence often hard to observe in the contemporary but conventional representations of jousters and tourneyers. Thus, by the means of its excellent state of preservation, the Leeds high saddle sheds some light on the jousts and tourneys on high saddles, once so popular and plentiful in what remains of the civilian iconography of the late fourteenth- and the fifteenth-century Germanic world.  相似文献   

19.
中国式建筑的困境在于附加意识形态性的起源和前因后果的关系倒置.近现代建筑进入中国后,曾经保持着与世界的同步发展,直至20世纪50年代初.中国式建筑是伴随着中西古今之争而产生的命题,建筑被赋予了意识形态的内容.在全球化背景下,重新认识中国式建筑产生和发展的局限性,其实质在于混淆了现代化与西方化之区别,将现代化等同于西方化...  相似文献   

20.
In September 2011, the Commander of the International Security Assistance Force (ISAF) in Afghanistan directed the Afghan Assessment Group to redesign the way in which ISAF was assessing the status of the war, and to be ‘revolutionary’ in so doing. The resulting assessment paradigm was novel, non-doctrinal, and effectively addressed the unique complexities of the counterinsurgency in Afghanistan and the needs of the ISAF Commander. It had a two-tier structure consisting of both strategic and campaign assessments. The former focused on answering a set of strategic questions in narrative, analytic form to address the strategic environment, while the latter used a set of standards and accompanying narrative responses to gauge accomplishment of campaign tasks. Both tiers captured the current state of the war while maintaining an eye on future challenges and opportunities. The two assessments and their associated processes were designed to stimulate discussions leading directly to decisions by senior leaders on actions they could take, direct, or request. While any assessment paradigm will have advantages and disadvantages, an examination of the pros and cons of this assessment paradigm makes clear that it should be considered a ‘best practice’ in the field of counterinsurgency assessment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号