首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 812 毫秒
1.
文章从多个维度出发,对重金属污染修复技术进行全面探讨,结合过往修复工作开展的实际经验,提出调整技术应用方式,优化技术应用手段等优化措施,以期进一步提升重金属污染土壤修复质量,增强生态治理水平,推动重金属污染土壤修复的顺利进行。  相似文献   

2.
刘奇  李智 《化工管理》2016,(7):128+185
土壤修复技术作为解决土壤污染问题的主要手段,在国内外受到了广泛应用。本文介绍了当前主要的土壤修复技术:物理修复、化学修复和生物修复技术,并分析这些技术各自的适用条件和不足之处。  相似文献   

3.
本文综述了有机污染物和重金属污染土壤修复的各种技术,逐一对其优缺点进行了评述,并提出了污染土壤修复技术的发展方向。  相似文献   

4.
土壤污染修复技术的选择是土壤污染治理过程的关键环节,根据实际情况选择合适的修复技术将在很大程度上决定最终的修复效果。我国中心城区内的污染场地在进行土壤修复时普遍存在修复周期短、周边环境敏感度高、施工规模有限、治理技术环境安全性要求高等特点。文章通过在实际案例中的技术比选,发现在修复中心城区内多环芳烃污染土壤的过程中采用现场异位化学氧化技术是较为适宜的。  相似文献   

5.
阐述了重金属污染土壤修复技术的类型和应用,以及超积累植物吸收重金属的生理及分子生物学机制,为重金属污染土壤治理提供参考。  相似文献   

6.
张秋子 《化工管理》2023,(26):54-56
钢渣作为一种常见的工业废弃物,在土壤和地下水修复、道路建设、建筑场地填充等方面被广泛应用。文章从钢渣的来源和组成、物理化学特性、在土壤修复、地下水治理等方面进行了综述,并讨论了钢渣与其他材料的复合应用。研究表明,钢渣在土壤和地下水修复中具有良好的应用前景,并可通过与其他材料的复合应用进一步提高修复效果和经济效益。  相似文献   

7.
郑澜 《化工管理》2023,(27):58-61
石油资源开采、运输或储存过程中因产品泄漏等环境事故导致的碳氢化合物在土壤、沉积物、地表水和地下水中的污染对人类健康构成了巨大的威胁。针对石油污染土壤的修复处理方法和技术对污染环境的彻底清洁、遏制、清除、回收和恢复起着至关重要的作用。文章从物理、化学、生物三个方面对石油污染土壤目前主要的修复技术的研究现状及其特点进行了总结。  相似文献   

8.
邓昕睿 《化工管理》2014,(34):80-81
自然界中,微生物是十分重要的污染物分解者,而目前在土壤修复领域,微生物修复技术正日渐受到关注.在河南和江苏等地,受污染的土壤经过微生物修复,基本恢复了耕地功能.  相似文献   

9.
段佳 《化工管理》2014,(1):74-74
记者从永清环保获悉,该公司历时5年研发的“一种用于治理砷污染土壤的修复药剂及使用方法”技术顺利通过国家知识产权局发明专利授权。这项技术处于国际领先水平,可以环保、便捷地对砷污染土壤进行有效修复。  相似文献   

10.
原位热脱附技术是用于土壤中挥发/半挥发性有机物去除的原位修复技术,目前在国内处于起步阶段,工程实例鲜有报道。文章介绍了电加热原位热脱附修复技术在广西某有机污染场地中的工程应用,并结合场地特点、污染物种类、修复过程、修复效果、工程投资等进行分析。整个工程经过100 d的加热运行,场地目标污染物的修复效果良好。  相似文献   

11.
内蒙古自治区农用地整治潜力研究   总被引:1,自引:0,他引:1  
本文从数量、质量两方面对全区农用地整治增加耕地潜力进行了系统的测算和评价,就测算结果进行了分析,明确了全区农用地整治增加耕地潜力的分布状况,并从规划、组织领导、资金、政策法律、技术措施等方面提出农用地整治的保障措施.  相似文献   

12.
污染场地修复是污染场地管理的重要环节,全面了解污染场地修复技术的筛选程序,对于在中国开展污染场地的修复与管理工作具有重要意义。系统地论述了污染场地修复技术选择的基本流程,采用层次分析法建立了污染场地修复技术的筛选指标体系,成功构建了污染场地修复技术评价矩阵,为后续污染场地修复技术的筛选提供参考。  相似文献   

13.
本文以2012~2014年披露内部控制重大缺陷的沪深A股上市公司为样本,实证检验了机构投资者持股对内部控制重大缺陷整改的影响,在此基础上,进一步检验了产权性质对该治理效应的影响。研究发现:机构投资者总体持股与内部控制重大缺陷整改显著正相关;与压力敏感型机构投资者持股相比,压力抵制型机构投资者持股更能显著促进内部控制重大缺陷整改;与非国有企业相比,机构投资者的治理效应在国有企业中更显著。  相似文献   

14.
增强Linux系统安全性的措施   总被引:2,自引:0,他引:2  
L inux系统的安全取决于系统管理员如何来管理它。本文探讨了一系列可以增强安全性的技巧与策略 ,包括 :系统安装原则、BIOS安全、口令安全策略、设计帐户自动注销功能、文件系统和日志安全策略、使用 SSH及 TCP-WRAPPERS,隐藏系统信息、删除所有特殊帐户、关闭控制台程序、限制系统中的 SUID/ SGID程序等。本文最后向 L inux系统管理员提出了一些安全管理方面的建议  相似文献   

15.
《Telecommunications Policy》2014,38(5-6):415-425
There is an ongoing discussion in the market which Next Generation Access (NGA) architecture best suits future needs and which investment and cost differences exist. The discussion can be subsumed as P2P vs. GPON, which is somewhat misleading as this article reveals. The discussion is driven by the fact that the high capital cost and the long asset life time of fibre mean that the technology choices made today will dominate the opportunities for telecommunication business of all market players, incumbents, competitors, content providers and business and residential users for many years in the future.The paper analyzes the cost and other differences between Fibre-to-the-Home (FTTH) access network architectures and their related different wholesale approaches by using the well-known and understood steady state approach applied in other NGA analyses in the past. In addition to the steady state analysis a dynamic cost evaluation is included taking into account the different investment behaviour of the FTTH architectures over time. The results describe investment and cost differences between architectures, incumbents and wholesale based competitive operators. The analysis has been performed for different geotypes (clusters) of decreasing population density in a representative European settlement structure.  相似文献   

16.
概括性介绍了 CIS(Corporate Identity System)的三大基本组成,并阐述了它与现代企业管理密不可分的相互联系及所处的举足轻重的地位,指出导入CIS是现代企业谋求发展的重要手段。  相似文献   

17.
《Telecommunications Policy》2014,38(10):914-932
This article analyzes the engagement of Japanese, Korean and Chinese participants in the development of Internet standards at IETF on the basis of four quantitative metrics: attendance, patenting, authorship and leadership. The results are strikingly divergent. Japanese involvement in Internet standardization began early and Japan was, for many years, second only to the U.S. in terms of IETF participation. Though Japanese participation has declined since the early 2000s, Japan remains a major contributor to IETF standardization. Korean involvement in IETF has always been significant, but below the levels of Japan and major European countries. Korean participation in IETF has also declined over the past decade, and has been dominated by one firm, Samsung. Though meaningful Chinese involvement in IETF did not begin until the mid-2000s, it has rapidly expanded in recent years. Today, China is a major player in numerous areas of Internet standardization in terms of three metrics (participation, patenting and leadership), and is rapidly gaining in terms of document authorship as well. Most of China׳s recent IETF involvement can be attributed to Huawei, though other Chinese firms have recently begun to increase their participation in the organization. Thus, contrary to some views that China׳s engagement with standardization is primarily one of indigenous innovation and “catching up”, China׳s experience with IETF demonstrates deliberate and effective engagement with a major Western standards-development organization on its own terms.  相似文献   

18.
This paper explores the idea that a sense of school subject image is a necessary feature of curriculum management and a potent force for change. The discussion centres on the view that all school subjects have an image and that if those intimately involved with the subject do not control the image then someone else does! In such circumstances the image is the product of past encounters and old euphemisms and is unlikely to hold the changed realities.The UK developments in Design and Technology education (the term Design and Technology is used to denote the school subject defined under this heading by the UK National Curriculum, 1995) have created something of an image problem which has interesting international parallels. Some of these problems are due to clearly discernible internal tensions and an ambiguous relationship with other subject areas.Through greater attention to subject image internal controversies might be acknowledged and resolved, relationships with other subject areas can be more meaningfully understood and practitioners can be helped to make sense of curriculum change.  相似文献   

19.
In indigenous communities the nutrition transition characterized by a rapid westernization of diet and lifestyle is associated with rising prevalence of chronic disease. Field work and literature reviews from two different policy environments, Argentina (Jujuy) and Canada (Nunavut), identified factors that add to indigenous peoples’ disease risk. The analytical framework was the emerging human right to adequate food approach to policies and programmes. Indigenous peoples’ chronic disease risk tends to increase as a result of government policies that infringe on indigenous peoples’ livelihoods and territories, undermining their economic system, values and solidarity networks. Policies intended to increase food security, including food aid, may also fuel the nutrition transition. There is a need to explore further the connection between well-intended policies towards indigenous peoples and the development of chronic diseases, and to broaden the understanding of the role that different forms of discrimination play in the westernization of their lifestyles, values and food habits. Food policies that take due account of indigenous peoples’ human rights, including their right to enjoy their culture, may counteract the growth of chronic disease in these communities.  相似文献   

20.
《Telecommunications Policy》2014,38(5-6):496-513
We analyze the state of the art of indicators on e-government, e-health, e-procurement and e-participation. We survey the main methodological properties of these indicators, and highlight their heuristic potential. Further, we address empirically the issue of the explanation of the availability scores, i.e. how the supply of the various e-services in each country is affected by political, institutional and socio-economic differences, and is followed by actual usage. The econometric analysis uncovers the importance of broadband penetration and higher education as drivers for most of the types of e-services and users (citizens and businesses). Moreover, a corruption-free and agile public sector proves to be an important pre-condition for more effective supply and usage. Despite data limitations and the complexity of the underlying diffusion phenomena, our study is the first truly longitudinal contribution aimed at disentangling the common drivers of such an important phenomenon – the e-services availability and usage across European countries. As such, this work appears useful to inform the policy debate and practice, in a phase characterized by a prospective reorientation of the public e-services provision and policy agenda.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号