期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
内涝过程中超载节点水流结构及水头损失分析 被引量:1
1
作者 耿艳芬 朱保航 钟颖萌 《河海大学学报(自然科学版)》 CAS CSCD 北大核心 2023年第1期52-60,共9页
为探究处于内涝过程超载状态节点的水流结构及水头损失,基于室内管道节点模型进行了87组不同边界条件的三维构造模型模拟,完成了室内试验与数值模拟的对比验证;采用定性定量分析、数据相关性拟合和π理论研究了孔径比(节点直径Φ_(m)和... 为探究处于内涝过程超载状态节点的水流结构及水头损失,基于室内管道节点模型进行了87组不同边界条件的三维构造模型模拟,完成了室内试验与数值模拟的对比验证;采用定性定量分析、数据相关性拟合和π理论研究了孔径比(节点直径Φ_(m)和管道直径Φ_(p)的比值)、管道坡度、承压水头对节点内水流结构和水头损失的影响。研究结果表明:节点出口处的水量交互是产生水头损失的主要原因;局部水头损失系数K随孔径比的增大而增大,随超载水深、承压水头的增大而减小;通过π理论提出K=f(Re)的求解思路是可行的;两种孔径比节点的K值对坡度变化的响应不同,管道坡度的设计需要考虑节点孔径比的影响。研究成果补充了雨洪耦合模型中的节点水流结构,可为一维管网在节点处的水头损失计算提供经验数值和参考。 展开更多
关键词 管网节点 水流结构 局部水头损失 经验公式
下载PDF
EXCEL在农村饮水安全工程用水量及管网节点流量计算中的应用 被引量:1
2
作者 刘松涛 史慧玲 《内蒙古水利》 2013年第6期165-166,共2页
将常用的办公软件EXCEL表格应用到农村饮水安全工程中,直接将所需数据输入,即可自动完成数据运算。文章详细阐述了计算应用的过程。
关键词 农村饮水安全工程 EXCEL 用水量计算 管网节点流量计算
原文传递
拱桁架与空间多曲面鼓节点方管网壳的组合屋盖施工技术 被引量:6
3
作者 李海东 《建筑技术》 北大核心 2015年第1期27-30,共4页
三亚海棠湾国际购物中心的主入口钢结构采用拱桁架与空间多曲面鼓节点方管网壳的组合屋盖体系。屋盖边界支撑在混凝土基座上,中间各榀桁架支撑在倾斜分离式钢拱之上,形成无柱的空间结构。施工时,屋盖网壳采用现场按照单元节点拼装焊接... 三亚海棠湾国际购物中心的主入口钢结构采用拱桁架与空间多曲面鼓节点方管网壳的组合屋盖体系。屋盖边界支撑在混凝土基座上,中间各榀桁架支撑在倾斜分离式钢拱之上,形成无柱的空间结构。施工时,屋盖网壳采用现场按照单元节点拼装焊接成块、高空分块吊装的技术。根据MIDAS软件模拟计算、确定临时支撑点及卸载方案,解决了此类结构的施工难题。 展开更多
关键词 拱桁架 节点管网 高空分块吊装 组合屋盖 卸载
下载PDF
A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks 被引量:2
4
作者 CHEN Xi SUN Liang +1 位作者 MA Jian Feng MA Zhuo 《China Communications》 SCIE CSCD 2015年第4期117-129,共13页
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc... In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks. 展开更多
关键词 opportunistic networks trustmanagement key management forwardingprotocols verified feedback packet
下载PDF
国际购物中心主入口钢结构屋盖施工技术
5
作者 李海东 《铁道建筑技术》 2014年第S1期380-383,399,共5页
三亚海棠湾国际购物中心主入口钢结构采用"拱桁架与空间多曲面鼓节点方管网壳的组合屋盖"体系,屋盖边界支撑在混凝土基座之上,中间各榀桁架支撑在代替柱子的倾斜分离式钢拱之上,形成无柱的空间结构。施工时桁架及钢拱采用自... 三亚海棠湾国际购物中心主入口钢结构采用"拱桁架与空间多曲面鼓节点方管网壳的组合屋盖"体系,屋盖边界支撑在混凝土基座之上,中间各榀桁架支撑在代替柱子的倾斜分离式钢拱之上,形成无柱的空间结构。施工时桁架及钢拱采用自两端分段吊装,中间段合龙;屋面网壳采用高空分块吊装的技术。根据MIDAS模拟计算确定临时支撑点及卸载方案,解决了此类结构的施工难题,可为同类工程的施工提供参考。 展开更多
关键词 倾斜分离式钢拱 节点管网 高空分块吊装 合龙 卸载
下载PDF
Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network
6
作者 Xu Junfeng Wang Yongjian 《China Communications》 SCIE CSCD 2012年第5期55-63,共9页
Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil a... Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption. 展开更多
关键词 WSN sybil attack key distribution CLUSTER
下载PDF
DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks 被引量:3
7
作者 Mei-juan JIA Hui-qiang WANG +2 位作者 Jun-yu LIN Guang-sheng FENG Hai-tao YU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第4期559-569,共11页
The special characteristics of the mobile environment, such as limited bandwidth, dynamic topology, heterogeneity of peers, and limited power, pose additional challenges on mobile peer-to-peer (MP2P) networks. Trust... The special characteristics of the mobile environment, such as limited bandwidth, dynamic topology, heterogeneity of peers, and limited power, pose additional challenges on mobile peer-to-peer (MP2P) networks. Trust management becomes an essential component of MP2P networks to promote peer transactions. However, in an MP2P network, peers frequently join and leave the network, which dynamically changes the network topology. Thus, it is difficult to establish long-term and effective trust relationships among peers. In this paper, we propose a dynamic grouping based trust model (DGTM) to classify peers. A group is formed according to the peers' interests. Within a group, mobile peers share resources and tend to keep stable trust relationships. We propose three peer roles (super peers, relay peers, and ordinary peers) and two novel trust metrics (intragroup trust and intergroup trust). The two metrics are used to accurately measure the trust between two peers from the same group or from different groups. Simulations illustrate that our proposed DGTM always achieves the highest successful transaction rate and the best communication overhead under different circumstances. 展开更多
关键词 Mobile P2P networks TRUST
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部