期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
基于EDPF-CP系统进行风电场全量信息采集的监控系统设计 被引量:2
1
作者 刘维维 宗龙 +1 位作者 邢聪聪 刘芳兵 《可再生能源》 CAS 北大核心 2018年第8期1204-1208,共5页
文章提出了"域"的概念,从组态和功能两个方面阐述了EDPF-CP系统。EDPF-CP控制器采用PLC及DPU的双引擎结构,且能够支持多种通讯方式。风机主控程序在PLC中运行,与控制无关的信息网数据可直接上传至监控系统,为风机的后期整体... 文章提出了"域"的概念,从组态和功能两个方面阐述了EDPF-CP系统。EDPF-CP控制器采用PLC及DPU的双引擎结构,且能够支持多种通讯方式。风机主控程序在PLC中运行,与控制无关的信息网数据可直接上传至监控系统,为风机的后期整体运行分析提供大数据支撑。在保证数据正常接入的情况下,EDPF-CP系统的监控系统在组态上提供了简单方便的途径,适合于不同机型在上位机的批量操作。同时增加故障诊断功能,当发生故障时,可直接进行故障原因的查找,运维人员可以自行组态进行故障库的完善。文章结合某风电场实例,给出了风电场整体监控系统解决方案,并进行现场实施。 展开更多
关键词 EDPF-CP 风电场 双引擎 全量信息 监控系统 大数据处理
下载PDF
Novel method of enhancing the key amount for FH systems 被引量:1
2
作者 沈斐 宋铁成 +2 位作者 叶芝慧 刘彤 夏玮玮 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期412-417,共6页
Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation m... Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods were presented and the security performances were discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems were given. Then, the absolute key amount and relative key amount were analyzed for equal-interval and unequal-interval FH systems. The results indicated that the absolute key amount had become the key point in improving the security and secrecy of FH systems, especially in today's epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples showed that the absolute key amount of unequal-interval FH systems was generally over two orders larger than that of equal-interval ones when spectrum overlapping was allowable. Therefore, there was great superiority in enhancing the security and secrecy for the scheme mentioned. 展开更多
关键词 Frequency shift keying Information theory Integrated circuits Security of data
下载PDF
Quantum Secure Direct Communication Using W State 被引量:5
3
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第6期1495-1498,共4页
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicato... A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure. 展开更多
关键词 quantum information quantum secret direct communication W state
下载PDF
A Theoretical Scheme for Multiparty Multi-particle State Sharing
4
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第5期1203-1206,共4页
A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate ope... A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles. 展开更多
关键词 quantum information quantum secret sharing quantum state sharing EPR state
下载PDF
Quantum Secure Direct Communication Using Six-Particle Maximally Entangled States and Teleportation 被引量:2
5
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第3期429-432,共4页
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the re... The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel 展开更多
关键词 quantum secret direct communication quantum teleportation six-particle maximally entangled state
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
6
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
A Model-calibration Approach to Using Complete Auxiliary Information from Stratified Sampling Survey Data
7
作者 WU Chang-chun ZHANG Run-chu 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第2期309-316,共8页
In stratified survey sampling, sometimes we have complete auxiliary information. One of the fundamental questions is how to effectively use the complete auxiliary information at the estimation stage. In this paper, we... In stratified survey sampling, sometimes we have complete auxiliary information. One of the fundamental questions is how to effectively use the complete auxiliary information at the estimation stage. In this paper, we extend the model-calibration method to obtain estimators of the finite population mean by using complete auxiliary information from stratified sampling survey data. We show that the resulting estimators effectively use auxiliary information at the estimation stage and possess a number of attractive features such as asymptotically design-unbiased irrespective of the working model and approximately model-unbiased under the model. When a linear working-model is used, the resulting estimators reduce to the usual calibration estimator(or GREG). 展开更多
关键词 model-calibration pseudo empirical likelihood stratified sampling survey complete auxiliary information estimating equations generalized linear models superpopulation
下载PDF
Multiparty Quantum Secret Sharing Using Quantum Fourier Transform 被引量:3
8
作者 HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期221-226,共6页
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode... A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 展开更多
关键词 quantum secret sharing quantum Fourier transform quantum error correction code
下载PDF
Crop Diversity Measurement at Dufuya Gardens and Insukamini Irrigation Scheme in Lower Gweru Communal Lands
9
作者 Matsa Mark 《Journal of Environmental Science and Engineering(B)》 2012年第5期673-681,共9页
Dufuya wetland gardens and Insukamini irrigation scheme in Lower Gweru communal areas of Gweru district are two examples of how rural communities can be self-reliant if they are capacitated. This study sought to compa... Dufuya wetland gardens and Insukamini irrigation scheme in Lower Gweru communal areas of Gweru district are two examples of how rural communities can be self-reliant if they are capacitated. This study sought to compare crop diversity between these two vegetable producing schemes. The location of the two areas and the selected plots were determined using the GPS (global positioning system) hand receiver. Maps of the quadrants were produced in a GIS (geographic information system) on a computer. Simpson's index D = sum (pi2) was used to measure crop diversity while the Shannon-Weiner index (/4) was used to measure crop evenness. Results show that although both schemes are viable, Dufuya Gardens have higher crop diversity than Insukamini irrigation scheme. The study recommends that AGRITEX officers at Insukamini must advise farmers to diversify their crops in order for their produce to be more competitive on the market and also to cushion farmers against the effects of natural hazards. Given the success of the two schemes, the government must seriously consider sustainable utilization of the many small-scale dams and wetlands lying idle across the country for crop production in order to empower poor rural communities as well as alleviate poverty. 展开更多
关键词 Crop diversity EVENNESS Sirnpson's index Shannon-Weiner index.
下载PDF
A novel and efficient multiparty quantum secret sharing scheme using entangled states 被引量:4
10
作者 MASSOUD Hadian Dehkordi ELHAM Fattahi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第10期1828-1831,共4页
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ... We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes. 展开更多
关键词 quantum secret sharing entangled state MULTIPARTY quantum cryptography
原文传递
Entanglement Concentration with Different Measurement in a 3-Mode Optomechanical System
11
作者 Zhe Li 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第7期57-63,共7页
In this work, we perform a series of phonon counting measurement with different methods in a 3-mode optomechanical system, and we compare the difference of the entanglement after measurement. In this article we focus ... In this work, we perform a series of phonon counting measurement with different methods in a 3-mode optomechanical system, and we compare the difference of the entanglement after measurement. In this article we focus on the three eases: prefect measurement, imperfect measurement and on-off measurement. We find that whatever measurement you take, the entanglement will increase. The size of entanglement enhancement is the largest in the perfect measurement, second in the imperfect measurement, and it is not obvious in the on-off measurement. We are sure that the more precise measurement information, the larger entanglement concentration. 展开更多
关键词 entanglement concentration quantum measurement optomechanical system
原文传递
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information 被引量:2
12
作者 GAO Cong MA JianFeng +1 位作者 LIU ZhiQuan MA XinDi 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期71-84,共14页
Since web services intended for the same application environment tend to be functionally homogeneous, researchers have turned to their non-functional aspects in order to constructively compare web services and choose ... Since web services intended for the same application environment tend to be functionally homogeneous, researchers have turned to their non-functional aspects in order to constructively compare web services and choose an appropriate one. In general, quality of service is very important to users. Many schemes that consider quality assessment have been proposed for web service selection. With the increasing number of qualityrelated attributes, an effective quality assessment method needs satisfactory scalability. Schemes based on the analytic hierarchy process(AHP) meet this requirement. However, prevalent methods in this vein overlook the fact that the traditional AHP needs a complete judgment matrix. In practice, all the information needed to construct a judgment matrix is often unavailable for a variety of reasons, due to which certain judgments cannot be made. In this paper, for an incomplete judgment matrix, we propose an improved AHP approach to consistency verification and the subsequent ordering. Our method can deal with situations where information is insufficient,and inherits all the merits of the traditional AHP approach. A case study establishes the effectiveness of our proposed method. 展开更多
关键词 incomplete information quality assessment analytic hierarchy process (AHP) web services qual-ity of service SELECTION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部