期刊文献+
共找到80篇文章
< 1 2 4 >
每页显示 20 50 100
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
1
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
下载PDF
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
2
作者 Yan Dong 《Journal of Computer and Communications》 2024年第3期101-106,共6页
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e... The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities. 展开更多
关键词 Intelligent Security System Higher Education Park Open Sharing
下载PDF
A Framework for Systematic Classification of Assets for Security Testing 被引量:2
3
作者 Sadeeq Jan Omer Bin Tauqeer +5 位作者 Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《Computers, Materials & Continua》 SCIE EI 2021年第1期631-645,共15页
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such... Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them. 展开更多
关键词 SECURITY security testing PRIVACY asset classification
下载PDF
<i>Inmap-t</i>: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
4
作者 Antonino Vitale Marc Dacier 《Journal of Computer and Communications》 2021年第6期174-190,共17页
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i... This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed. 展开更多
关键词 TTCN-3 Network Security Conformance Testing Deep Packet Inspection FIREWALL
下载PDF
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
5
作者 Ahmad Ababneh Yousef Sanjalawe +2 位作者 Salam Fraihat Salam Al-E’mari Hamzah Alqudah 《Computers, Materials & Continua》 SCIE EI 2024年第7期1347-1379,共33页
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies. 展开更多
关键词 Information retrieval orbit weighting scheme semantic text analysis Tf-Idf weighting scheme vector space model
下载PDF
一个证实数字签名方案的安全缺陷 被引量:18
6
作者 王贵林 卿斯汉 《软件学报》 EI CSCD 北大核心 2004年第5期752-756,共5页
与普通的数字签名不同,验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第三方的合作与帮助.但除了签名者,其他任何人(包括证实者)都不能以签名者的名义产生有效的证实签名.同时,只要参与了验证,证实者就不能欺骗验证者... 与普通的数字签名不同,验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第三方的合作与帮助.但除了签名者,其他任何人(包括证实者)都不能以签名者的名义产生有效的证实签名.同时,只要参与了验证,证实者就不能欺骗验证者.进一步地,在必要的时候,证实者还可以将证实签名转化为普通的数字签名,从而使得任何人都可以验证这些签名的有效性.王尚平等学者提出了一个基于DSA和RSA的证实数字签名方案,并认为他们的方案是安全而高效的.与现有的具体方案相比,他们的方案确实是高效的.但是,这一方案存在严重的安全缺陷,从而使得他们的尝试是不成功的. 展开更多
关键词 证实数字签名 不可否认签名 数字签名 信息安全
下载PDF
Hydraulic fracture initiation theory for a horizontal well in a coal seam 被引量:19
7
作者 Hou Bing Chen Mian +2 位作者 Wang Zheng Yuan Jianbo Liu Ming 《Petroleum Science》 SCIE CAS CSCD 2013年第2期219-225,共7页
A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experim... A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established. 展开更多
关键词 Hydraulic fracturing coal seam transversely isotropic fracture initiation CLEAT naturalfracture
下载PDF
Selenium Supplementation Alleviates Autoimmune Thyroiditis by Regulating Expression of Th1/Th2 Cytokines 被引量:10
8
作者 TAN Long SANG Zhong Na +5 位作者 SHEN Jun WU Yun Tang YAO Zhai Xiao ZHANG Jin Xiang ZHAO Na ZHANG Wan Qi 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2013年第11期920-925,共6页
Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the ... Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD). 展开更多
关键词 TH AITD Selenium Supplementation Alleviates Autoimmune Thyroiditis by Regulating Expression of Th1/Th2 Cytokines TPOAB FIGURE
下载PDF
The transformation of agriculture in China: Looking back and looking forward 被引量:20
9
作者 JIAO Xiao-qiang Nyamdavaa Mongol ZHANG Fu-suo 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2018年第4期755-764,共10页
China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly... China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries. 展开更多
关键词 food security sustainable development AGRICULTURE grain production
下载PDF
Science and Technology Backyard: A novel approach to empower smallholder farmers for sustainable intensification of agriculture in China 被引量:15
10
作者 JIAO Xiao-qiang ZHANG Hong-yan +3 位作者 MA Wen-qi WANG Chong LI Xiao-lin ZHANG Fu-suo 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2019年第8期1657-1666,共10页
Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative tec... Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries. 展开更多
关键词 SMALLHOLDER FARMERS SUSTAINABLE INTENSIFICATION TECHNOLOGY innovation TECHNOLOGY transfer Science and TECHNOLOGY BACKYARD
下载PDF
A (2, 3) quantum threshold scheme based on Greenberger-Horne-Zeilinger state 被引量:2
11
作者 李渊 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第10期2875-2879,共5页
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. T... In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing. 展开更多
关键词 quantum threshold controlled-not manipulation secret sharing GHZ state
下载PDF
Four-Party Quantum Broadcast Scheme Based on Aharonov State 被引量:1
12
作者 LI Yuan ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第8期371-374,共4页
In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes pro... In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated. 展开更多
关键词 broadcast scheme Aharonov state liar detection problem CONGRUENCE
下载PDF
Characterization of Quantitative Trait Loci for Grain Minerals in Hexaploid Wheat (Triticum aestivum L.) 被引量:2
13
作者 SHI Rong-li TONG Yi-ping +2 位作者 JING Rui-lian ZHANG Fu-suo ZOU Chun-qin 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2013年第9期1512-1521,共10页
Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait lo... Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program. 展开更多
关键词 grain minerals nitrogen QTLS winter wheat
下载PDF
The Simulation of Rumor’S Spreading and Controlling in Micro-Blog Users’ Network 被引量:3
14
作者 Peng Chen Nan Gao 《Journal of Software Engineering and Applications》 2013年第3期102-105,共4页
In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the pr... In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network. 展开更多
关键词 COMPONENT RUMOR Micro-Blog NETWORK SIMULATION
下载PDF
Responses of Aerobic Rice (Oryza sativa L.) to Iron Deficiency 被引量:1
15
作者 SHI Rong-li HAO Hong-mei +3 位作者 FAN Xiao-yun Md Rezaul Karim ZHANG Fu-SUO ZOU Chun-qin 《Journal of Integrative Agriculture》 SCIE CSCD 2012年第6期938-945,共8页
Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the pro... Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw. 展开更多
关键词 aerobic rice Fe(III)-reduction iron nutrition phytosiderophore release root tip swelling
下载PDF
Quantum quasi-cyclic low-density parity-check error-correcting codes 被引量:1
16
作者 李渊 曾贵华 Moon Ho Leeb 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4154-4160,共7页
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne... In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated. 展开更多
关键词 quantum LDPC code quasi-cycliC circulant permutation matrix CSS code
下载PDF
A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning 被引量:1
17
作者 Jin Yang Tao Li +2 位作者 Gang Liang Wenbo He Yue Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第7期1-23,共23页
Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion Detection.In this paper,as enlightene... Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion Detection.In this paper,as enlightened by the theory of Deep Learning Neural Networks,Hierarchy Distributed-Agents Model for Network Risk Evaluation,a newly developed model,is proposed.The architecture taken on by the distributed-agents model are given,as well as the approach of analyzing network intrusion detection using Deep Learning,the mechanism of sharing hyper-parameters to improve the efficiency of learning is presented,and the hierarchical evaluative framework for Network Risk Evaluation of the proposed model is built.Furthermore,to examine the proposed model,a series of experiments were conducted in terms of NSLKDD datasets.The proposed model was able to differentiate between normal and abnormal network activities with an accuracy of 97.60%on NSL-KDD datasets.As the results acquired from the experiment indicate,the model developed in this paper is characterized by high-speed and high-accuracy processing which shall offer a preferable solution with regard to the Risk Evaluation in Network. 展开更多
关键词 Network security deep learning(DL) INTRUSION detection system(IDS) DISTRIBUTED AGENTS
下载PDF
Output feedback robust model predictive control with unmeasurable model parameters and bounded disturbance 被引量:2
18
作者 Baocang Ding Hongguang Pan 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2016年第10期1431-1441,共11页
The output feedback model predictive control(MPC),for a linear parameter varying(LPV) process system including unmeasurable model parameters and disturbance(all lying in known polytopes),is considered.Some previously ... The output feedback model predictive control(MPC),for a linear parameter varying(LPV) process system including unmeasurable model parameters and disturbance(all lying in known polytopes),is considered.Some previously developed tools,including the norm-bounding technique for relaxing the disturbance-related constraint handling,the dynamic output feedback law,the notion of quadratic boundedness for specifying the closed-loop stability,and the ellipsoidal state estimation error bound for guaranteeing the recursive feasibility,are merged in the control design.Some previous approaches are shown to be the special cases.An example of continuous stirred tank reactor(CSTR) is given to show the effectiveness of the proposed approaches. 展开更多
关键词 Model predictive control Process systems Stability Recursive feasibility Uncertainty Norm-bounding technique
下载PDF
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption 被引量:1
19
作者 Zhiwei Wang Liping Qian +1 位作者 Danwei Chen Guozi sun 《China Communications》 SCIE CSCD 2022年第5期164-177,共14页
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu... To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms. 展开更多
关键词 identity-based proxy reencryption time stamp renting houses system blockchain
下载PDF
Optimization method of urban rail train operational plan based on O-D time-varying demand 被引量:1
20
作者 Feng Shi Xian Tu Shuo Zhao 《Railway Sciences》 2022年第1期148-166,共19页
Purpose–Under the constraints of given passenger service level and coupling travel demand with train departure time,this study optimizes the train operational plan in an urban rail corridor to minimize the numbers of... Purpose–Under the constraints of given passenger service level and coupling travel demand with train departure time,this study optimizes the train operational plan in an urban rail corridor to minimize the numbers of train trips and rolling stocks considering the time-varying demand of urban rail passenger flow.Design/methodology/approach–The authors optimize the train operational plan in a special network layout,i.e.an urban rail corridor with dead-end terminal yard,by decomposing it into two sub-problems:train timetable optimization and rolling stock circulation optimization.As for train timetable optimization,the authors propose a schedule-based passenger flow assignment method,construct the corresponding timetabling optimization model and design the bi-directional coordinated sequential optimization algorithm.For the optimization of rolling stock circulation,the authors construct the corresponding optimization assignment model and adopt the Hungary algorithm for solving the model.Findings–The case study shows that the train operational plan developed by the study’s approach meets requirements on the passenger service quality and reduces the operational cost to the maximum by minimizing the numbers of train trips and rolling stocks.Originality/value–The example verifies the efficiency of the model and algorithm. 展开更多
关键词 Urban rail transit Train operational plan Time-varying passenger demand Passenger assignment Passenger service quality
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部