期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
IS YOUR NETWORK SUPPORTING YOUR TERMINALS? OR IS IT THE OTHER WAY AROUND?
1
《ZTE Communications》 2006年第4期69-69,共1页
关键词 IT ZTE IS YOUR network supporting YOUR TERMINALS
下载PDF
IS YOUR NETWORK SUPPORTING YOUR TERMINALS? OR IS IT THE OTHER WAY AROUND?
2
《ZTE Communications》 2007年第2期70-70,共1页
Both,actually.That’s why ZTE provides not only network solutions,but also terminals that work as integral parts of optimised systems.
关键词 ZTE IT IS YOUR network supporting YOUR TERMINALS
下载PDF
IS YOUR NETWORK SUPPORTING YOUR TERMINALS? OR IS IT THE OTHER WAY AROUND?
3
《ZTE Communications》 2007年第4期62-62,共1页
Both, actually. That’s why ZTE provides not only network solutions, but also terminals that work as integral parts of
关键词 ZTE IS YOUR network supporting YOUR TERMINALS OR IS IT THE OTHER WAY AROUND IT
下载PDF
IS YOUR NETWORK SUPPORTING YOUR TERMINALS? OR IS IT THE OTHER WAY AROUND?
4
《ZTE Communications》 2007年第3期64-64,共1页
Both,actually.That’s why ZTE provides not only network solutions,but also terminals that work as integral parts of optimised systems.
关键词 ZTE IS YOUR network supporting YOUR TERMINALS OR IS IT THE OTHER WAY AROUND IT
下载PDF
Wireless Network Technologies Supporting M2M Applications
5
作者 Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China) 《ZTE Communications》 2005年第1期6-9,共4页
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun... When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks. 展开更多
关键词 ZIGBEE UWB Wireless network Technologies supporting M2M Applications RFID WiFi
下载PDF
One-pot synthesis of network supported catalyst using supramolecular gel as template 被引量:2
6
作者 Yong Liang Li Ming Tang Yu Xia Kai Chen Bo Tian Li Xin Jin 《Chinese Chemical Letters》 SCIE CAS CSCD 2010年第8期991-994,共4页
A simple and general strategy is described for preparing network supported catalyst through a one-pot synthetic procedure using supramolecular gel as template.This procedure directly attaches ligand to support during ... A simple and general strategy is described for preparing network supported catalyst through a one-pot synthetic procedure using supramolecular gel as template.This procedure directly attaches ligand to support during fabricating the support.Using this strategy,supported CuBr/di-(2-picolyl) amine catalyst with U-shaped fibrillar network was prepared and used in atom transfer radical polymerization of methyl methacrylate.XPS and SEM characterization of the catalyst revealed homogeneous distribution of ligand,sufficient reactive sites,adequate mechanical strength and macroporosity.The polymerization results demonstrated high activity and reusability of such catalyst.This strategy might be extended to other supported catalysts used in column reactors. 展开更多
关键词 One-pot synthesis network supported catalyst Supramolecular gel Atom transfer radical polymerization
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
7
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
XML-based Data Processing in Network Supported Collaborative Design 被引量:2
8
作者 Qi Wang Zhong-Wei Ren Zhong-Feng Guo 《International Journal of Automation and computing》 EI 2010年第3期330-335,共6页
In the course of network supported collaborative design, the data processing plays a very vital role. Much effort has been spent in this area, and many kinds of approaches have been proposed. Based on the correlative ... In the course of network supported collaborative design, the data processing plays a very vital role. Much effort has been spent in this area, and many kinds of approaches have been proposed. Based on the correlative materials, this paper presents extensible markup language (XML) based strategy for several important problems of data processing in network supported collaborative design, such as the representation of standard for the exchange of product model data (STEP) with XML in the product information expression and the management of XML documents using relational database. The paper gives a detailed exposition on how to clarify the mapping between XML structure and the relationship database structure and how XML-QL queries can be translated into structured query language (SQL) queries. Finally, the structure of data processing system based on XML is presented. 展开更多
关键词 Extensible markup language (XML) network supported collaborative design standard for the exchange of product model data (STEP) data analysis data processing relational database
下载PDF
Research and Design of IPv6 Network Management and Operations Support System
9
作者 Chen Bin Ji Wenchong Qiu Zhonghui (China Network Communications Group Corporation, Beijing 100032, China) 《ZTE Communications》 2006年第1期16-20,共5页
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a... IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition. 展开更多
关键词 work Research and Design of IPv6 network Management and Operations Support System Design RFC IETF NMS MIB RMON NGI SNMP ICMP
下载PDF
Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud
10
作者 S.Priya R.S.Ponmagal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1895-1907,共13页
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num... Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance. 展开更多
关键词 Intrusion detection cloud systems trusted service support trusted network support trust user score trusted QoS support
下载PDF
An Ophthalmic Evaluation of Central Serous Chorioretinopathy
11
作者 L.K.Shoba P.Mohan Kumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期613-628,共16页
Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal diseases.In this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for vari... Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal diseases.In this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stages and then compares the difference between CSCR before as well as after treatment using different application methods.Thefirst approach,which was focused on image quality,improves medical image accuracy.An enhancement algorithm was implemented to improve the OCT image contrast and denoise purpose called Boosted Anisotropic Diffusion with an Unsharp Masking Filter(BADWUMF).The classifier used here is tofigure out whether the OCT image is a CSCR case or not.150 images are checked for this research work(75 abnormal from Optical Coherence Tomography Image Retinal Database,in-house clinical database,and 75 normal images).This article explicitly decides that the approaches suggested aid the ophthalmologist with the precise retinal analysis and hence the risk factors to be minimized.The total precision is 90 percent obtained from the Two Class Support Vector Machine(TCSVM)classifier and 93.3 percent is obtained from Shallow Neural Network with the Powell-Beale(SNNWPB)classifier using the MATLAB 2019a program. 展开更多
关键词 OCT CSCR MACULA segmentation boosted anisotropic diffusion with unsharp maskingfilter two class support vector machine classifier and shallow neural network with powell-beale classifier
下载PDF
Research on Occurrence Mechanism of Public Security Emergency from the perspective of the Structure Box
12
作者 Jian Lin Bo Kang 《International Journal of Technology Management》 2016年第9期1-6,共6页
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis... Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency. 展开更多
关键词 Public security emergency Structure box Emotional resonance Resonance effect supporting network
下载PDF
Support vector machine-based multi-model predictive control 被引量:3
13
作者 Zhejing BAO Youxian SUN 《控制理论与应用(英文版)》 EI 2008年第3期305-310,共6页
In this paper, a support vector machine-based multi-model predictive control is proposed, in which SVM classification combines well with SVM regression. At first, each working environment is modeled by SVM regression ... In this paper, a support vector machine-based multi-model predictive control is proposed, in which SVM classification combines well with SVM regression. At first, each working environment is modeled by SVM regression and the support vector machine network-based model predictive control (SVMN-MPC) algorithm corresponding to each environment is developed, and then a multi-class SVM model is established to recognize multiple operating conditions. As for control, the current environment is identified by the multi-class SVM model and then the corresponding SVMN-MPC controller is activated at each sampling instant. The proposed modeling, switching and controller design is demonstrated in simulation results. 展开更多
关键词 Multi-model predictive control Support vector machine network Multi-class support vector machine Multi-model switching
下载PDF
A novel differentiated services supporting scheme for optical burst switched networks 被引量:2
14
作者 王建新 曾庆济 +1 位作者 张治中 池灏 《Chinese Optics Letters》 SCIE EI CAS CSCD 2003年第7期392-394,共3页
In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drop... In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability. 展开更多
关键词 NODE IT for A novel differentiated services supporting scheme for optical burst switched networks been THAN OBS of that in
原文传递
A new burst assembly technique for supporting QoS in optical burst switching networks 被引量:2
15
作者 阳小龙 党明瑞 +1 位作者 毛幼菊 李乐民 《Chinese Optics Letters》 SCIE EI CAS CSCD 2003年第5期266-268,共3页
This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme.... This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP). 展开更多
关键词 QOS IT as A new burst assembly technique for supporting QoS in optical burst switching networks PLP in for
原文传递
Priority-Based Mixed Assembly Supporting Differentiated Service for Optical Burst Switched Networks 被引量:1
16
作者 Jianxin Wang, Qingji Zeng, Hao chi, Shenghua Wang, Shilin Xiao, Zhizhong Zhang CBONT of Shanghai Jiaotong University, China 200030 2 Beijing Lyang Technology Co. Ltd. China 100085 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期707-708,共2页
In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the prior... In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability. 展开更多
关键词 for WDM IP Priority-Based Mixed Assembly supporting Differentiated Service for Optical Burst Switched networks into node OBS THAN PBMA been of QoS that length
原文传递
Nonlinear model predictive control based on support vector machine and genetic algorithm 被引量:5
17
作者 冯凯 卢建刚 陈金水 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2015年第12期2048-2052,共5页
This paper presents a nonlinear model predictive control(NMPC) approach based on support vector machine(SVM) and genetic algorithm(GA) for multiple-input multiple-output(MIMO) nonlinear systems.Individual SVM is used ... This paper presents a nonlinear model predictive control(NMPC) approach based on support vector machine(SVM) and genetic algorithm(GA) for multiple-input multiple-output(MIMO) nonlinear systems.Individual SVM is used to approximate each output of the controlled plant Then the model is used in MPC control scheme to predict the outputs of the controlled plant.The optimal control sequence is calculated using GA with elite preserve strategy.Simulation results of a typical MIMO nonlinear system show that this method has a good ability of set points tracking and disturbance rejection. 展开更多
关键词 Support vector machine Genetic algorithm Nonlinear model predictive control Neural network Modeling
下载PDF
Solving DCLAP-MSN based on hybrid genetic algorithm
18
作者 Hongtao Lei Bo Guo Tao Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期806-811,共6页
The dynamic capacitated location allocation problem in the military supportive network(DCLAP-MSN) is a representative of combinative optimization problems,and its optimization process is complicated.For this reason,... The dynamic capacitated location allocation problem in the military supportive network(DCLAP-MSN) is a representative of combinative optimization problems,and its optimization process is complicated.For this reason,a dynamic capacitated location allocation model is provided firstly.Then,a hybrid heuristic algorithm which combines genetic algorithm,repair algorithm of solutions and greedy search,is proposed as the solving method.The optimization performance is improved by effectively integrating the repair algorithm of solutions and greedy search with genetic optimization.The experiment results indicate that the proposed algorithm is a feasible and effective method for the problem. 展开更多
关键词 dynamic location allocation military supportive network genetic algorithm repair algorithm greedy search.
下载PDF
Forecasting and optimal probabilistic scheduling of surplus gas systems in iron and steel industry 被引量:5
19
作者 李磊 李红娟 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1437-1447,共11页
To make full use of the gas resource, stabilize the pipe network pressure, and obtain higher economic benefits in the iron and steel industry, the surplus gas prediction and scheduling models were proposed. Before app... To make full use of the gas resource, stabilize the pipe network pressure, and obtain higher economic benefits in the iron and steel industry, the surplus gas prediction and scheduling models were proposed. Before applying the forecasting techniques, a support vector classifier was first used to classify the data, and then the filtering was used to create separate trend and volatility sequences. After forecasting, the Markov chain transition probability matrix was introduced to adjust the residual. Simulation results using surplus gas data from an iron and steel enterprise demonstrate that the constructed SVC-HP-ENN-LSSVM-MC prediction model prediction is accurate, and that the classification accuracy is high under different conditions. Based on this, the scheduling model was constructed for surplus gas operating, and it has been used to investigate the comprehensive measures for managing the operational probabilistic risk and optimize the economic benefit at various working conditions and implementations. It has extended the concepts of traditional surplus gas dispatching systems, and provides a method for enterprises to determine optimal schedules. 展开更多
关键词 surplus gas prediction probabilistic scheduling iron and steel enterprise HP filter Elman neural network(ENN) least squares support vector machine(LSSVM) Markov chain
下载PDF
TYRE DYNAMICS MODELLING OF VEHICLE BASED ON SUPPORT VECTOR MACHINES 被引量:2
20
作者 ZHENG Shuibo TANG Houjun +1 位作者 HAN Zhengzhi ZHANG Yong 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2006年第4期558-565,共8页
Various methods of tyre modelling are implemented from pure theoretical to empirical or semi-empirical models based on experimental results. A new way of representing tyre data obtained from measurements is presented ... Various methods of tyre modelling are implemented from pure theoretical to empirical or semi-empirical models based on experimental results. A new way of representing tyre data obtained from measurements is presented via support vector machines (SVMs). The feasibility of applying SVMs to steady-state tyre modelling is investigated by comparison with three-layer backpropagation (BP) neural network at pure slip and combined slip. The results indicate SVMs outperform the BP neural network in modelling the tyre characteristics with better generalization performance. The SVMsqyre is implemented in 8-DOF vehicle model for vehicle dynamics simulation by means of the PAC 2002 Magic Formula as reference. The SVMs-tyre can be a competitive and accurate method to model a tyre for vehicle dynamics simuLation. 展开更多
关键词 Support vector machines(SVMs) Backpropagation(BP) neural network Tyre model Regression estimation Magic formula
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部