Skip to main content

标 题: 印度宣布将与中国签署1750公里高铁协议

http://gengwg.blogspot.com/发信人: brihand (brihand), 信区: Military
标  题: 印度宣布将与中国签署1750公里高铁协议
发信站: BBS 未名空间站 (Tue Nov 25 13:30:20 2014, 美东)



据路透社11月25日报道,印度铁道部发言人当天表示,印度本周将与中国签署协议,就
德里与钦奈之间修建1750公里高铁线路提供可行性报告。据悉,该可行性研究将由中国
方面出资进行。

“(铁道部)工作团队目前正在中国,我们预计他们本周签署协议,”这名发言人说。

中印于今年9月签署谅解备忘录,中国将为印度铁路的发展提供帮助。

另据媒体报道,计划中的“德里-钦奈高铁走廊”全长1754公里,连接印度城市德里与钦
奈,预计建造成本将高达2万亿卢比(约合1979.88亿元人民币),是印度新总理莫迪的“
钻石四边形”高铁网战略一部分,预计建成后将成为全球第二长、印度第一长的高铁走
廊,时速300公里。

“钻石四边形”高铁网,是“黄金四边形”公路网的铁路版本,连接了四个大城市。黄
金四边形总长度约3633英里,它把该国人口最多的城市新德里、孟买、钦奈和加尔各答
连成一体
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...