期刊文献+
共找到1,892篇文章
< 1 2 95 >
每页显示 20 50 100
Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT 被引量:3
1
作者 Wugedele Bao Celimuge Wu +3 位作者 Siri Guleng Jiefang Zhang Kok-Lim Alvin Yau Yusheng Ji 《China Communications》 SCIE CSCD 2021年第6期39-52,共14页
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ... In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning. 展开更多
关键词 vehicular IoT federated learning client selection networking scheme
下载PDF
SEMANTIC NETWORK PRESENTATION OF MECHANICAL MOTION SCHEME AND ITS MECHANISM TYPES SELECTION METHOD 被引量:2
2
作者 Ye Zhigang Zou Huijun +1 位作者 Zhang Qing Tian Yongli School of Mechanical Engineering,Shanghai Jiaotong University,Shanghai 200030, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第2期253-256,共4页
The presentation method of the mechanical motion scheme must support the whole process of conceptual design.To meet the requirement,a semantic network method is selected to represent process level,action level,mechani... The presentation method of the mechanical motion scheme must support the whole process of conceptual design.To meet the requirement,a semantic network method is selected to represent process level,action level,mechanism level and relationships among them.Computer aided motion cycle chart exploration can be realized by the representation and revision of time coordination of mechanism actions and their effect on the design scheme.The uncertain reasoning technology based on semantic network is applied in the mechanism types selection of the needle driving mechanism of industrial sewing mechanism,and the application indicated it is correct,useful and advance. 展开更多
关键词 机构运动规划 机构选型 语义网络 机械设计 CAD
下载PDF
A sink moving scheme based on local residual energy of nodes in wireless sensor networks 被引量:4
3
作者 谭长庚 许可 +1 位作者 王建新 陈松乔 《Journal of Central South University》 SCIE EI CAS 2009年第2期265-268,共4页
In the application of periodic data-gathering in sensor networks,sensor nodes located near the sink have to forward the data received from all other nodes to the sink,which depletes their energy very quickly.A moving ... In the application of periodic data-gathering in sensor networks,sensor nodes located near the sink have to forward the data received from all other nodes to the sink,which depletes their energy very quickly.A moving scheme for the sink based on local residual energy was proposed.In the scheme,the sink periodically moves to a new location with the highest stay-value defined by the average residual energy and the number of neighbors.The scheme can balance energy consumption and prevent nodes around sink from draining their energy very quickly in the networks.The simulation results show that the scheme can prolong the network lifetime by 26%-65%compared with the earlier schemes where the sink is static or moves randomly. 展开更多
关键词 无线传感器网络 剩余能量 节点 移动 能源消耗 仿真结果 网络寿命 接收器
下载PDF
CONTROL SCHEMES FOR CMAC NEURAL NETWORK-BASED VISUAL SERVOING 被引量:1
4
作者 Wang HuamingXi WenmingZhu JianyingDepartment of Mechanical andElectrical Engineering,Nanjing University of Aeronauticsand Astronautics,Nanjing 210016, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2003年第3期256-259,共4页
In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of im... In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of image Jacobian, CMAC (cerebellar model articulation controller) neural network is inserted into visual servo control loop to implement the nonlinear mapping. Two control schemes are used. Simulation results on two schemes are provided, which show a better tracking precision and stability can be achieved using scheme 2. 展开更多
关键词 神经网络 CMAC 视觉伺服系统 控制系统 机器人
下载PDF
A Transductive Scheme Based Inference Techniques for Network Forensic Analysis 被引量:1
5
作者 TIAN Zhihong JIANG Wei LI Yang 《China Communications》 SCIE CSCD 2015年第2期167-176,共10页
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th... Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert. 展开更多
关键词 网络取证 基础设施 推式 推理 电子证据 自动提取 计算机犯罪 入侵取证
下载PDF
A Novel Resource Allocation Algorithm based on Downlink and Uplink Decouple Access Scheme in Heterogeneous Networks 被引量:4
6
作者 Laiwei Jiang Xuejun Sha +1 位作者 Xuanli Wu Naitong Zhang 《China Communications》 SCIE CSCD 2016年第6期22-31,共10页
Traditional cellular network requires that a user equipment(UE) should associate to the same base station(BS) in both the downlink(DL) and the uplink(UL). Based on dual connectivity(DC) introduced in LTE-Advanced R12,... Traditional cellular network requires that a user equipment(UE) should associate to the same base station(BS) in both the downlink(DL) and the uplink(UL). Based on dual connectivity(DC) introduced in LTE-Advanced R12, DL/UL decouple access scheme has been proposed, which is especially suitable for heterogeneous networks(Het Nets). This paper is the pioneer to take the DL/UL decouple access scheme into consideration and develop a novel resource allocation algorithm in a two-tier Het Net to improve the total system throughput in the UL and ease the load imbalance between macro base stations(MBSs) and pico base stations(PBSs). A model is formulated as a nonlinear integer programming, and the proposed algorithm is a sub-optimal algorithm based on the graph theory. First, an undirected and weighted interference graph is obtained. Next, the users are grouped to let users with large mutual interferences to be assigned to different clusters. Then, the users in different clusters are allocated to different resource blocks(RBs) by using the Hungarian algorithm. Simulation results show that the proposed algorithm can provide great promotions for both the total system throughput and the average cell edge user throughput and successfully ease the load imbalance between MBSs and PBSs. 展开更多
关键词 资源分配算法 接入方案 异构网络 上行链路 下行链路 解耦 非线性整数规划 负载不平衡
下载PDF
Control schemes for synchronizing two subnetworks with weak couplings
7
作者 张建宝 马忠军 张刚 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期148-153,共6页
In this paper, we propose a well-designed network model with a parameter and study full and partial synchronization of the network model based on the stability analysis. The network model is composed of a star-coupled... In this paper, we propose a well-designed network model with a parameter and study full and partial synchronization of the network model based on the stability analysis. The network model is composed of a star-coupled subnetwork and a globally coupled subnetwork. By analyzing the special coupling configuration, three control schemes are obtained for synchronizing the network model. Further analysis indicates that even if the inner couplings in each subnetwork are very weak, two of the control schemes are still valid. In particular, if the outer coupling weight parameter θ is larger than (n2 2n)/4, or the subnetwork size n is larger than θ2, the two subnetworks with weak inner couplings can achieve synchronization. In addition, the synchronizability is independent of the network size in case of 0 < θ < n/(n + 1). Finally, we carry out some numerical simulations to confirm the validity of the obtained control schemes. It is worth noting that the main idea of this paper also applies to any network consisting of a dense subnetwork and a sparse network. 展开更多
关键词 SYNCHRONIZATION WEAK COUPLING star-global network control scheme
下载PDF
Neural Network Based Multi-level Fuzzy Evaluation Model for Mechanical Kinematic Scheme
8
作者 BO Ruifeng,LI Ruiqin (Department of Mechanical Engineering,North University of China,Taiyuan 030051,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期301-306,共6页
To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure ... To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure of evaluation model is constructed according to evaluation indicator system. Then evaluation samples are generated and provided to train this model. Thus it can reflect the relation between attributive value and evaluation result,as well as the weight of evaluation indicator. Once evaluation indicators of each candidate are fuzzily quantified and fed into the trained network model,the corresponding evaluation result is outputted and the best alternative can be selected. Under this model,expert knowledge can be effectively acquired and expressed,and the quantificational evaluation can be implemented for kinematic scheme with multi-level evaluation indicator system. Several key problems on this model are discussed and an illustration has demonstrated that this model is feasible and can be regarded as a new idea for solving kinematic scheme evaluation. 展开更多
关键词 NEURAL network mechanical KINEMATIC scheme MULTI-LEVEL evaluation model FUZZY
下载PDF
Development of Virtual Reference Station in Kinematic Schemes of Geodetic GPS Network Using the Method of Maximum Informative Zone
9
作者 Arif Shafayat Mehdiyev Ramiz Ahmed Eminov Hikmat Hamid Asadov 《Positioning》 2013年第4期267-270,共4页
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s... The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given. 展开更多
关键词 GPS Receiver Virtual Reference STATION KINEMATIC schemeS POSITIONING GEODETIC network
下载PDF
Defending Against Link Failure in Virtual Network Embedding Using a Hybrid Scheme 被引量:1
10
作者 Jianjian Ai Hongchang Chen +1 位作者 Zehua Guo Guozhen Cheng 《China Communications》 SCIE CSCD 2019年第1期129-138,共10页
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data l... Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data loss and are helpless to such attacks like data tampering.To offer high security level,in this paper,we first propose a multipath and decision-making(MD) scheme which applies multipath simultaneously delivery and decision-making for protecting the virtual network.Considering different security requirement for virtual link,we devise a hybrid scheme to protect the virtual links.For the critical links,MD scheme is adopted.For the other links,we adopt the Shared Backup Scheme.Our simulation results indicate the proposed scheme can significantly increase the security level of the critical link high in the loss of less acceptance ratio. 展开更多
关键词 network VIRTUALIZATION VIRTUAL LINK security MULTIPATH and DECISION-MAKING hybrid scheme
下载PDF
Evaluation of Linear Precoding Schemes for Cooperative Multi-Cell MU MIMO in Future Mobile Communication Systems
11
作者 Juma Said Ally 《Journal of Computer and Communications》 2023年第6期28-42,共15页
In Mobile Communication Systems, inter-cell interference becomes one of the challenges that degrade the system’s performance, especially in the region with massive mobile users. The linear precoding schemes were prop... In Mobile Communication Systems, inter-cell interference becomes one of the challenges that degrade the system’s performance, especially in the region with massive mobile users. The linear precoding schemes were proposed to mitigate interferences between the base stations (inter-cell). These schemes are categorized into linear and non-linear;this study focused on linear precoding schemes, which are grounded into three types, namely Zero Forcing (ZF), Block Diagonalization (BD), and Signal Leakage Noise Ratio (SLNR). The study included the Cooperative Multi-cell Multi Input Multi Output (MIMO) System, whereby each Base Station serves more than one mobile station and all Base Stations on the system are assisted by each other by shared the Channel State Information (CSI). Based on the Multi-Cell Multiuser MIMO system, each Base Station on the cell is intended to maximize the data transmission rate by its mobile users by increasing the Signal Interference to Noise Ratio after the interference has been mitigated due to the usefully of linear precoding schemes on the transmitter. Moreover, these schemes used different approaches to mitigate interference. This study mainly concentrates on evaluating the performance of these schemes through the channel distribution models such as Ray-leigh and Rician included in the presence of noise errors. The results show that the SLNR scheme outperforms ZF and BD schemes overall scenario. This implied that when the value of SNR increased the performance of SLNR increased by 21.4% and 45.7% for ZF and BD respectively. 展开更多
关键词 Precoding schemes Cooperative networks Interference Multi-Input Multi-Output (MIMO) Multi-Cell and Multiuser
下载PDF
Performance Analysis of an Enhanced Load Balancing Scheme for Wireless Sensor Networks
12
作者 Adeniran Oluwaranti Dauda Ayanda 《Wireless Sensor Network》 2011年第8期275-282,共8页
Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, rou... Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into protocols for WSNs is very important. Hence, we propose an improved scalable clustering-based load balancing scheme (SCLB) in this paper. In SCLB scheme, scalability is achieved by dividing the network into overlapping multihop clusters each with its own cluster head node. Simulation results show that the proposed scheme achieves longer network lifetime with desirable reliability at the initial state compare with the existing multihop load balancing approach. 展开更多
关键词 Wireless Sensor networks Energy CONSUMPTION SCALABLE Clustering-Based Load Balancing scheme Reliability
下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
13
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks Ad HOC security
下载PDF
HHR:Hierarchical Hybrid Routing Scheme for Information-Centric Network
14
作者 DUAN Jie WANG Xiong +1 位作者 WANG Sheng XU Shizhong 《China Communications》 SCIE CSCD 2015年第6期141-153,共13页
Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN ... Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN is no exception.ICN network would be divided into core domain and many edge domains as today's internet does.HHR(Hierarchy Hybrid Routing scheme) is presented for ICN:A Chord-like routing scheme is used in core domain,while edge domains routing structure can be classified into three categories,Local Routing(LR),Delivery of Local Publication to Core domain(DLPC),and Remote Publication Routing into edge domain(RPR).LR can be decided by each edge domain,which determined by many factors,such as locality characteristic for pub/sub information and local policies.A hierarchical routing algorithm is proposed to solve DLPC and RPR simultaneously.Simulation results demonstrate that HHR can be fast deployed,and can be applied in large scale network or dynamic subscription environment. 展开更多
关键词 路由方案 网络分层 信息 发布/订阅 边缘区域 ICN 通信模型 路由结构
下载PDF
数据安全防护体系在高校校园网中的应用
15
作者 闫实 金松根 《办公自动化》 2024年第6期16-18,共3页
在高校网络的基本组成结构中,校园网具有保障高校数据信息得以安全稳定传输的重要作用,校园网目前已成为高校师生赖以实现沟通联系的基础设施支撑。目前在网络技术的快速转型以及发展趋势作用下,高校校园网日益存在更加突出的网络数据... 在高校网络的基本组成结构中,校园网具有保障高校数据信息得以安全稳定传输的重要作用,校园网目前已成为高校师生赖以实现沟通联系的基础设施支撑。目前在网络技术的快速转型以及发展趋势作用下,高校校园网日益存在更加突出的网络数据安全威胁,进而体现全面防范以及科学预测校园网数据安全隐患的必要性。文章主要探讨高校校园网构建数据安全防护体系的实践价值,合理改进校园网现有的数据传输安全保障机制。 展开更多
关键词 数据安全防护体系 高校校园网 应用技术方案
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
16
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems (INCSs),transport performance of different protocols and security breach from Internet side,are investigated. First,for improving the performance of d... Two significant issues in Internet-based networked control systems (INCSs),transport performance of different protocols and security breach from Internet side,are investigated. First,for improving the performance of data transmission,user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second,a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed,in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further,a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed,and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China,Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-freedom robot arm,an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS,which may cause more than 91% network throughput deduction,the new DCSTS protocol may yield results ten times better,being just 5.67%. 展开更多
关键词 Internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
17
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 Vehicular Ad-Hoc networks (VANETs) Privacy and Data Protection CYBERSECURITY Pseudonymization schemes Internet of Vehicles (IoV)
下载PDF
基于自组织特征映射模型(SOFM)网络的中国自然资源生态安全区划
18
作者 邹易 蒙吉军 +3 位作者 吴英迪 魏婵娟 程浩然 马宇翔 《生态学报》 CAS CSCD 北大核心 2024年第1期171-182,共12页
自然资源生态安全是国家安全的重要组成部分,自然资源生态安全区划对保障区域可持续发展提供了重要途径。基于自然资源数据、生态环境数据和相关区划资料,从生态敏感性与生态服务重要性角度构建了自然资源生态安全评价指标体系,进而揭... 自然资源生态安全是国家安全的重要组成部分,自然资源生态安全区划对保障区域可持续发展提供了重要途径。基于自然资源数据、生态环境数据和相关区划资料,从生态敏感性与生态服务重要性角度构建了自然资源生态安全评价指标体系,进而揭示了中国自然资源生态安全的空间格局;通过建立区划的原则和指标,按照一级区主要反映自然资源空间分布格局,二级区主要揭示自然资源生态安全水平的差异,采用SOFM网络制订了中国自然资源生态安全区划方案。结果显示:(1)中国自然资源生态安全水平整体偏低,以中警与重警状态区域为主,安全和较安全状态的区域仅占24.22%,其中低安全等级区多分布于400mm等降水量线以西的干旱、半干旱区,高安全等级区则集中分布于水热资源与生物资源较为丰富的东南部地区;(2)中国自然资源生态安全区划方案包括8个一级区与27个二级区,总结归纳各大区自然资源的特征和威胁生态安全的问题,并针对二级区自然资源生态安全状况提出了对策建议。研究结果可为分区、分类推进全国自然资源可持续利用和国土空间优化提供理论支持与决策依据。 展开更多
关键词 自然资源生态安全 自组织特征映射模型(SOFM)网络 区划方案
下载PDF
阳新高速公路黄河特大桥跨大堤桥式设计与布置
19
作者 孟全 徐珂 +1 位作者 郭建光 王超 《黑龙江交通科技》 2024年第2期94-98,103,共6页
阳新高速公路黄河特大型桥梁跨大堤桥水文地质特征独特、条件复杂,抗震设防烈度高,而且冲刷大、主河槽摆动大,对桥梁稳定性和耐用性要求较高。桥式和桥跨的设计需要充分考虑黄河综合治理、开发利用、防洪规划、通航标准等因素。同时,选... 阳新高速公路黄河特大型桥梁跨大堤桥水文地质特征独特、条件复杂,抗震设防烈度高,而且冲刷大、主河槽摆动大,对桥梁稳定性和耐用性要求较高。桥式和桥跨的设计需要充分考虑黄河综合治理、开发利用、防洪规划、通航标准等因素。同时,选择合理布跨、确定桥型方案时,不仅要满足桥位处黄河Ⅳ级航道的要求,还要综合考虑沿线地形、水文、环保等多方面因素,使之与其他干线公路互联,并实现公路与境内铁路对接联通,形成现代综合交通运输体系。鉴于该黄河特大桥实际长度达2240 m,设计时应重视桥型方案选择,降低桥梁施工难度,减少工程造价,便于桥梁建设施工。通过对比分析黄河特大型桥梁桥式设计与跨大堤桥布置方案后,选择结构受力合理、施工经验成熟、造价低及后期维护量小的预应力混凝土连续梁桥作为优选设计方案。 展开更多
关键词 特大型桥梁 设计 跨大堤桥 路网衔接 方案比选
下载PDF
5G定制网在卫生健康行业的应用实践
20
作者 谢亚丽 《软件》 2024年第3期152-154,共3页
5G定制网技术的引入为卫生健康领域带来了前所未有的机遇,将成为卫生健康行业数字化和智能化发展的推动力量。在这一大背景下,本论文将深入探讨5G定制网在卫生健康行业中的需求、典型应用场景以及发展机遇与挑战。
关键词 5G定制网 智慧医疗 行业应用 组网方案
下载PDF
上一页 1 2 95 下一页 到第
使用帮助 返回顶部