期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
环网-辐射形船舶混合配电网络的Levy风驱动故障定位 被引量:3
1
作者 陶珩 魏海峰 +2 位作者 张懿 李垣江 周啸伟 《江苏科技大学学报(自然科学版)》 CAS 2020年第1期54-61,共8页
为了使船舶混合配电网络在发生故障时能更为准确、迅速地定位故障状态及元件,在分析配电网结构特点的基础上,提出一种基于改进风驱动算法的故障定位方法.采用Levy飞行策略改进传统风驱动算法的更新过程兼顾了收敛性,提升了算法的全局寻... 为了使船舶混合配电网络在发生故障时能更为准确、迅速地定位故障状态及元件,在分析配电网结构特点的基础上,提出一种基于改进风驱动算法的故障定位方法.采用Levy飞行策略改进传统风驱动算法的更新过程兼顾了收敛性,提升了算法的全局寻优能力;同时,引入权重系数以抑制Levy飞行路径过长而引发越过最优解范围的缺陷.通过构建环网-辐射形船舶电网模型,在考虑继电器、断路器拒动/误动条件下,模拟配电网络发生的多点故障.利用基于Levy飞行策略的改进风驱动算法对故障模型进行优化求解,仿真结果说明:Levy风驱动算法具有更高的收敛精度和更快的收敛速度,能有效地定位故障元件. 展开更多
关键词 -辐射形混合配电网络 Levy风驱动算法 故障定位 收敛精度 收敛速度
下载PDF
一次网络环网故障导致辅网PLC瘫痪的原因分析和处理 被引量:3
2
作者 牛百芳 张洪星 《自动化博览》 2013年第4期95-97,共3页
随着大型发电机组配置人员越来越少,新厂将化学、除灰、脱硫、燃料等外围PLC系统采用辅网系统设计的越来越多,外围控制系统辅网的网络安全越来越重要,针对由于网络设计存在环网,在消缺过程中形成网络风暴,导致辅网所有PLC瘫痪,控制系统... 随着大型发电机组配置人员越来越少,新厂将化学、除灰、脱硫、燃料等外围PLC系统采用辅网系统设计的越来越多,外围控制系统辅网的网络安全越来越重要,针对由于网络设计存在环网,在消缺过程中形成网络风暴,导致辅网所有PLC瘫痪,控制系统大面积失灵的故障现象进行原因分析,并制定后续处理方案,以达到真正网络安全,控制系统可靠的目的。原因分析和后续处理方案针对性强,为辅网系统的出现多个CPU停止,PLC系统瘫痪提供了参考和很好的借鉴。 展开更多
关键词 网络 网络风暴 PLC瘫痪
下载PDF
工业以太网环网冗余技术在南防铁路沿线小站的应用 被引量:1
3
作者 玉晴庆 《信息通信》 2012年第2期67-68,共2页
主要从工业以太网交换机的功能特点、冗余拓扑结构及环网冗余网络来阐述在广西南防铁路的实际应用。
关键词 工业以太交换机 功能特点 冗余拓扑结构 冗余网络 实际应用
下载PDF
垂直升降式立体车库智能管理系统分析 被引量:1
4
作者 苏相岗 苟立平 +2 位作者 赖世民 陈振林 胡帅 《智能建筑与智慧城市》 2023年第4期129-131,共3页
本文依托深圳市南山中心区立体钢结构公交车库试点项目,以垂直升降式立体车库智能管理系统设计为出发点,指出通过智能控制系统、信息化运营系统、远程智能安全巡检系统、存取车系统的合理设计,能有效提升智能管理系统的应用效果,确保垂... 本文依托深圳市南山中心区立体钢结构公交车库试点项目,以垂直升降式立体车库智能管理系统设计为出发点,指出通过智能控制系统、信息化运营系统、远程智能安全巡检系统、存取车系统的合理设计,能有效提升智能管理系统的应用效果,确保垂直升降式立体车库的高效运行,满足用户的个性化需求。同时,在智能管理系统的应用下,能为智慧车库及智慧城市的建设提供支持,促进城市的可持续发展。 展开更多
关键词 立体车库 垂直升降 冗余环网网络 智能管理系统
下载PDF
一种有价值的大用户接入解决方案
5
作者 李建存 《移动通信》 2003年第6期97-98,共2页
本文通过分析当前市场需求情况,分析了SDH环网作为大用户接入主导方式可能遇到的困难,进而阐明环网与星形网络相结合将成为大用户光纤接入主导方式的发展趋势,最后介绍了格林威尔公司的星网解决方案。
关键词 星形网络 环网网络 大用户光纤接入 发展趋势 格林威尔公司 解决方案 网络拓扑
下载PDF
Online Internet Traffic Identification Algorithm Based on Multistage Classifier 被引量:3
6
作者 杜敏 陈兴蜀 谭骏 《China Communications》 SCIE CSCD 2013年第2期89-97,共9页
Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c... Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion. 展开更多
关键词 traffic identification multistageclassifier SELECTION statistical characteristic featuresupport vector machine
下载PDF
Web Page Watermarking for Tamper-Proof 被引量:2
7
作者 赵启军 卢宏涛 蒋晓华 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期280-284,共5页
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e... This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages. 展开更多
关键词 web page WATERMARKING hypertext markup language(HTML) tamper-proof
下载PDF
Joint Grid System Used in Embedding Technique
8
作者 李孝伟 范绪箕 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第1期54-57,共4页
The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, was used in the embedding technique to solve the problem of finding interpolating cells of the internal and externa... The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, was used in the embedding technique to solve the problem of finding interpolating cells of the internal and external boundary points near the joint regions. With different boundary plane generated along different fixed surface, the collar grid obtained using hyperbolic partial equations can ensure to generate high quality grids and to provide real interpolating cells for the boundary points in the blanking regions. The virtual grid was used to convert solid wall boundary conditions into an interface condition, however, no fluid flow computations were conducted within the virtual grid. The computational result of body strake wing shows that the current developed embedding technique with joint grid system can effectively treat the geometry and can more accurately predict the flow over complexconfiguration with intersecting surfaces. 展开更多
关键词 virtual grid collar grid chimera grid
下载PDF
Reliability Prediction for Internetware Applications:A Research Framework and Its Practical Use 被引量:1
9
作者 ZHENG Zibin MENG Jingke +1 位作者 TAO Guanhong Michael R.Lyu 《China Communications》 SCIE CSCD 2015年第12期13-20,共8页
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T... The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated. 展开更多
关键词 Prediction prototype challenging perceived artifacts factorization executed runtime details similarity
下载PDF
Study on the network delay of periodic information in the NCS based on EPA
10
作者 刘宁 《High Technology Letters》 EI CAS 2009年第4期349-355,共7页
The network delay of the periodic messages transmission in the network control system (NCS) based on Ethemet for plant automation (EPA) is analyzed from the theoretical and experimental perspective in this paper. ... The network delay of the periodic messages transmission in the network control system (NCS) based on Ethemet for plant automation (EPA) is analyzed from the theoretical and experimental perspective in this paper. The composition and the characteristics of the network delay of EPA periodic messages transmission in a subnet is studied through analyzing the information transmission regularity and EPA deterministic scheduling mechanism. On this basis, the queuing delay at communication schedule management entity (EPA _ CSME) that is the most important component of network delay is analyzed, during which the formulas for the queuing delay of periodic messages and other real time parameters are proposed. Furthermore, an experiment is developed to test each component of network delay of periodic messages transmission in a EPA subnet. According to the experimental and the theoretical analysis, the conclusion is drawn that the delay during which the periodic messages wait for the periodic messages transmission time slice is the main factor that causes considerable network delay, and improvement method is presented. 展开更多
关键词 Ethernet for plant automation (EPA) network control system (NCS) periodic rues- sages network delay
下载PDF
Policy Optimization Study Based on Evolutionary Learning
11
作者 刘素平 丁永生 《Journal of Donghua University(English Edition)》 EI CAS 2009年第6期621-624,共4页
In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment ch... In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment changes,the certain policy does not suit any more.Thereby,the policy-based management should also have similar "natural selection" process.Useful policy will be retained,and policies which have lost their effectiveness are eliminated.A policy optimization method based on evolutionary learning was proposed.For different shooting times,the priority of policy with high shooting times is improved,while policy with a low rate has lower priority,and long-term no shooting policy will be dormant.Thus the strategy for the survival of the fittest is realized,and the degree of self-learning in policy management is improved. 展开更多
关键词 policy-based management evolution learning policy optimization
下载PDF
Ether net Ring Protection for ITU-T G.8032
12
作者 Wang Bin Wang Wennai 《China Communications》 SCIE CSCD 2012年第11期87-97,共11页
Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Datab... Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches. 展开更多
关键词 carrier ethernet ERP FDB flush markov chain
下载PDF
Construction of Three-dimensional power security Defense System Based on T-S Model Fuzzy Neural Network
13
作者 Zeyu SUN 《International Journal of Technology Management》 2015年第5期105-108,共4页
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex... With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment. 展开更多
关键词 Information network power security Neural network Network environment Data FEATURE Threat information
下载PDF
Design and Implementation of Computer Network Traffic Monitoring
14
作者 Shuang DU 《International Journal of Technology Management》 2015年第2期56-59,共4页
This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss ... This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss and bypass interference control technology, and the reasonable combination of two kinds of technology to design straight bypass joint deployment. On basis of it, we design a new P2P traffic monitoring system. Through the design and implementation of computer network traffic monitoring system based on C/S mode to achieve automatic control, maintenance, and monitor network traffic, which is suitable for the current engineering software to monitor a network application environment. From the network users and network operator' s perspective, monitoring of network traffic is scientific, reasonable that improve network management and it has important research value. 展开更多
关键词 Monitoring system Network traffic ASP.NET Web technology
下载PDF
Effectiveness Analysis of Flipped Classroom on Business English Teaching under Multimedia Network Environment
15
作者 Ling ZHANG 《International Journal of Technology Management》 2015年第5期16-18,共3页
In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business En... In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business English teaching.This paper starts from the feasibility and necessity of multimedia network teaching in Business English to discuss the advantages of multimedia network Teaching Business English. Finally, it is to put forward multimedia network teaching mode, to provide practical recommendations for the majority of business English teacher during the multimedia network teaching. 展开更多
关键词 Multimedia Network Business English Teaching Practice
下载PDF
Traffic Allocation Scheme with Cooperation of Multiple RANs in Universal Wireless Environments 被引量:1
16
作者 Lv Zhaobiao Sun Lei +2 位作者 Wang Jianquan Ran Hui Zhao Tingting 《China Communications》 SCIE CSCD 2012年第4期26-34,共9页
This paper introduces an adaptive traffic allocation scheme with cooperation of multiple Radio Access Networks (RANs) in universal wireless environments.The different cooperation scenarios are studied,and based on the... This paper introduces an adaptive traffic allocation scheme with cooperation of multiple Radio Access Networks (RANs) in universal wireless environments.The different cooperation scenarios are studied,and based on the scenario of cooperation in both network layer and terminal layer,an open queuing system model,which is aiming to depict the characteristics of packet loss rate of wireless communication networks,is proposed to optimize the traffic allocation results.The analysis and numerical simulations indicate that the proposed scheme achieves inter-networking load balance tominimize the whole transmission delay and expands the communication ability of single-mode terminals to support high data rate traffics. 展开更多
关键词 heterogeneous networks network cooperation terminal subsystem traffic allocation open queuing system packet loss rate
下载PDF
Seismic-inversion method for nonlinear mapping multilevel well–seismic matching based on bidirectional long short-term memory networks
17
作者 Yue You-Xi Wu Jia-Wei Chen Yi-Du 《Applied Geophysics》 SCIE CSCD 2022年第2期244-257,308,共15页
In this paper,the recurrent neural network structure of a bidirectional long shortterm memory network(Bi-LSTM)with special memory cells that store information is used to characterize the deep features of the variation... In this paper,the recurrent neural network structure of a bidirectional long shortterm memory network(Bi-LSTM)with special memory cells that store information is used to characterize the deep features of the variation pattern between logging and seismic data.A mapping relationship model between high-frequency logging data and low-frequency seismic data is established via nonlinear mapping.The seismic waveform is infinitely approximated using the logging curve in the low-frequency band to obtain a nonlinear mapping model of this scale,which then stepwise approach the logging curve in the high-frequency band.Finally,a seismic-inversion method of nonlinear mapping multilevel well–seismic matching based on the Bi-LSTM network is developed.The characteristic of this method is that by applying the multilevel well–seismic matching process,the seismic data are stepwise matched to the scale range that is consistent with the logging curve.Further,the matching operator at each level can be stably obtained to effectively overcome the problems that occur in the well–seismic matching process,such as the inconsistency in the scale of two types of data,accuracy in extracting the seismic wavelet of the well-side seismic traces,and multiplicity of solutions.Model test and practical application demonstrate that this method improves the vertical resolution of inversion results,and at the same time,the boundary and the lateral characteristics of the sand body are well maintained to improve the accuracy of thin-layer sand body prediction and achieve an improved practical application effect. 展开更多
关键词 bidirectional recurrent neural networks long short-term memory nonlinear mapping well–seismic matching seismic inversion
下载PDF
Research on Collaborative Learning in Network Learning Environment
18
作者 Changqing DU Jijian LU 《International Journal of Technology Management》 2015年第6期107-109,共3页
This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters ... This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters in the design collaboration mode of network course. Based on this, other researchers and practitioners can conveniently and effectively design network course based on the cooperation mode. Through the analysis of the network curriculum development and the actual case, verify advantage of collaborative online learning mode. 展开更多
关键词 Learning environment Collaboration learning activities Online Training Online Course
下载PDF
Analysis on the Development Trend of Garment Entity Retail Industry under the Background of Internet
19
作者 LI Zhen 《International English Education Research》 2016年第12期43-46,共4页
Under the background of rapid development of the Intemet, the traditional garment industry in China has undergone changes in marketing, payment and logistics and warehousing. The development trend of the,apparel indus... Under the background of rapid development of the Intemet, the traditional garment industry in China has undergone changes in marketing, payment and logistics and warehousing. The development trend of the,apparel industry is becoming more and more obvious. However, faced with the strong Internet impact, the retailing of apparel is confronted with both development constraints and new challenges. The individualized consumption demand is becoming more and more prominent.How to achieve the successful transformation of the entity retailing in the competitive environment, To meet the diverse needs of consumers.Therefore, based on the theory and practice, this paper analyzes the present situation and trend of the development of garment retailing in the Internet environment, and aims at providing theoretical analysis basis for the change of China's garment retailing industry.Application of reference to promote the network environment of China's traditional garment industry restructuring and healthy and sustainable development. 展开更多
关键词 INTERNET Clothing retail Transformation Development trend
下载PDF
CACTSE:Cloudlet Aided Cooperative Terminals Service Environment for Mobile Proximity Content Delivery
20
作者 王庆 胡铮 +1 位作者 王明 刘海峰 《China Communications》 SCIE CSCD 2013年第6期47-59,共13页
Along with the rapid development of communications,the Internet,and smart terminals,mobile Internet has become a hot topic with both opportunities and challenges.In this article,a new perspective on edge content deliv... Along with the rapid development of communications,the Internet,and smart terminals,mobile Internet has become a hot topic with both opportunities and challenges.In this article,a new perspective on edge content delivery service for mobile Internet is described,based on cooperating terminals.A mobile cloud architecture named Cloudlet Aided Cooperative Terminals Service Environment(CACTSE) is proposed as an edge network service environment.The Service Manager(SM),a cloudlet like module,is introduced into the local service domain in order to manage the in-domain terminals and help coordinate the content delivery requests for better bandwidth efficiency as well as user experience.The reference model is presented in this article with architecture and mechanism design.Moreover,the research progress and potential technology trends of CACTSE are analysed based on the related R&D directions. 展开更多
关键词 mobile Intemet edge service mobile content delivery mobile cloud architecture
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部