期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
与BOSS系统整合的广电宽带网管设计
1
作者 王新茂 杨晓玲 +3 位作者 衣小羽 孙传芳 刘建 王辉 《有线电视技术》 2009年第4期111-113,共3页
本文介绍了烟台广电信息网络有限公司自主开发的与BOSS整合的广电宽带网管系统。它基于Java语言实现,将用户信息、业务信息、设备信息融为一体,克服了传统网管系统只能对网络设备进行管理的缺点,大大拓展了网管系统的使用范围,提高了广... 本文介绍了烟台广电信息网络有限公司自主开发的与BOSS整合的广电宽带网管系统。它基于Java语言实现,将用户信息、业务信息、设备信息融为一体,克服了传统网管系统只能对网络设备进行管理的缺点,大大拓展了网管系统的使用范围,提高了广电运营商的网络管理能力。 展开更多
关键词 广电宽带 网管设计 络设备 络管理
下载PDF
电力通信数据网网管系统设计及数据采集功能实现 被引量:5
2
作者 任红 《信息记录材料》 2021年第7期226-227,共2页
电力通信网络是电网系统得以安全且长效运行的基础,是实现电力系统安全生产运行的第二张网。现阶段,随着电力通信网络建设规模逐渐扩大,业务需求量逐渐增加,对电力通信网络通道及业务运行的监视、管理和维护显得至关重要,电力通信数据... 电力通信网络是电网系统得以安全且长效运行的基础,是实现电力系统安全生产运行的第二张网。现阶段,随着电力通信网络建设规模逐渐扩大,业务需求量逐渐增加,对电力通信网络通道及业务运行的监视、管理和维护显得至关重要,电力通信数据网网管系统可将各级别网络设备及所携带的通信业务运行进行可视化管理,具有全面的监视功能,同时能将复杂难懂的脚本命令配置转化为直观的图框文字命令配置,让数据网的管理更加便捷易懂,为值班人员对通信故障判断、运维调度提供强有力的帮助,将电力通信网运行的稳定性做到极大程度的提升,为坚强电网提供有力的支撑保障。故本文从系统技术的现状入手,对系统需求进行深入的分析,使数据采集功能得以实现。 展开更多
关键词 电务通信数据 数据采集 网管设计 功能实现
下载PDF
无源光网络
3
作者 本刊编辑部 《光通信技术》 CSCD 北大核心 2004年第2期1-1,共1页
关键词 无源光 EPON GPON APON 物理层 带宽动态分配 加密算法 弹性保护倒换技术 网管设计
下载PDF
Web-services-based Integration Design of PDM and DNC Systems 被引量:1
4
作者 周炳海 王世进 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期30-34,共5页
In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for... In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment. 展开更多
关键词 Product data management Distributed numerical control Web services Information integration.
下载PDF
A statistical hiding algorithm based on self-similar network traffic
5
作者 沙学军 徐玉滨 强蔚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第1期100-103,共4页
Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this ... Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modern communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm. 展开更多
关键词 Self-similar traffic Hurst Parameter FGN hiding algorithm traffic padding
下载PDF
A Water Line Network Failure Application of Network Design Problems
6
作者 Hiroaki Mohri Jun-ichi Takeshita 《Journal of Mathematics and System Science》 2015年第12期493-500,共8页
This study investigated a water supply recovery problem involving municipal water service piping. The problem consisted in recovering full service after network failure, in order to rapidly satisfy all urgent citywide... This study investigated a water supply recovery problem involving municipal water service piping. The problem consisted in recovering full service after network failure, in order to rapidly satisfy all urgent citywide demands. The optimal recovery solution was achieved through the application of so-called network design problems (NDPs), which are a form of combinatorial optimization problem. However, a conventional NDP is not suitable for addressing urgent situations because (1) it does not utilize the non-failure arcs in the network, and (2) it is solely concerned with stable costs such as flow costs. Therefore, to adapt the technique to such urgent situations, the conventional NDP is here modified to deal with the specified water supply problem. In addition, a numerical illustration using the Sendai water network is presented. 展开更多
关键词 Water supply recovery problem Network design problem Network failure Recovery and reconstruction plan Combinatorial optimization Risk assessment/management
下载PDF
Design of Library Management System based on Internet of Things
7
作者 Yingpei WANG 《International Journal of Technology Management》 2015年第4期36-38,共3页
This paper briefly introduces the concept and the development of technology of the Internet of things, systematically elaborated the key technology of RFID, sensors, smart chip and wireless transmission network in pro... This paper briefly introduces the concept and the development of technology of the Internet of things, systematically elaborated the key technology of RFID, sensors, smart chip and wireless transmission network in process of construction for library management system, and put forward library management system based on the Intemet of things. The paper design architecture scheme for the system in accordance with the reader' s habit, management staff and the library functions. The purpose of the article expound the concept of intelligent library, provides the strategy guide for intelligent library development system based on the Interact of things. 展开更多
关键词 Library management Smartphones WIFI ZIGBEE Intemet of Things RFID technology
下载PDF
A Stream Pattern Matching Method for Traffic Analysis
8
作者 Zhu Hui Li Hui Mo Can 《China Communications》 SCIE CSCD 2010年第6期86-93,共8页
In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati... In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy. 展开更多
关键词 traffic analysis stream pattern match non-finite automata bit-parallel
下载PDF
Research on Enterprise Logistics Management System based on Internet of Things
9
作者 Liqiang Tang 《International Journal of Technology Management》 2014年第8期76-78,共3页
Through the analysis of the feasibility of using network technology and network technology in supply chain management system, the paper puts forward the design framework of supply chain management system based on the ... Through the analysis of the feasibility of using network technology and network technology in supply chain management system, the paper puts forward the design framework of supply chain management system based on the lntemet of things, describes the key technology of the system. The application of Intemet of things in the supply chain management system, that will realize the effective management of the whole supply chain; enhance the competitiveness of enterprises and the whole supply chain. 展开更多
关键词 The lntemet of things enterprise logistics ERP OPTIMIZATION
下载PDF
The optimized design of duct net disposal for filter-rods based on topology structure
10
作者 Lv wei 《International Journal of Technology Management》 2013年第3期98-100,共3页
The filter-rods were supplied through compressed air conveyed to cigarette-maker by transmitter in my factory. Usually, each maker has two feed-pipes, it adopts fixed and one-to-one fashion, with the flexible manufact... The filter-rods were supplied through compressed air conveyed to cigarette-maker by transmitter in my factory. Usually, each maker has two feed-pipes, it adopts fixed and one-to-one fashion, with the flexible manufacturing system extending, and it's original fashion unable to satisfy the needs of a wide range of cigarette brands already, so it cry for a viable and reliable substitute. This paper creatively bring forward the optimized fashion of duct net about filter-rods based on topology structure, it adopts Freud's algorithm and improved-separated algorithm in order to achieve the optimized route, it has a apparent effect to improve the transport stability and reduce the transport time of filter- rods. 展开更多
关键词 the problem of time control the problem of slow convergence improved-segmentation algorithm
下载PDF
A Design of the Network Security Evaluation System
11
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 Security Evaluation Security Rules Evaluation Algorithm
下载PDF
Practice and Thinking of University File Digital Construction
12
作者 Xiaodong Jin 《International Journal of Technology Management》 2013年第4期37-38,共2页
Supported by the development of computer network technology, multi-media technology and database technology, file information digitalization as a new morphology of file emerges. This new kind of file morphology could ... Supported by the development of computer network technology, multi-media technology and database technology, file information digitalization as a new morphology of file emerges. This new kind of file morphology could exercise a long-term saving of file resources and efficiently utilize it. File management is the most important part of university information management. However, as various universities are different in their specific practice, file digital construction is different in construction manner and content. 展开更多
关键词 University file DIGITAL CONSTRUCTION Practice.
下载PDF
Algorithms for seismic topology optimization of water distribution network 被引量:1
13
作者 LIU Wei XU Liang LI Jie 《Science China(Technological Sciences)》 SCIE EI CAS 2012年第11期3047-3056,共10页
As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of wate... As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of water distribution network usually ignores the influence of earthquake,resulting in water stoppage in large area during many recent strong earthquakes.This study introduced a seismic design approach of water distribution network,i.e.,topology optimization design.With network topology as the optimization goal and seismic reliability as the constraint,a topology optimization model for designing water distribution network under earthquake is established.Meanwhile,two element investment importance indexes,a pipeline investment importance index and a diameter investment importance index,are introduced to evaluate the importance of pipelines in water distribution network.Then,four combinational optimization algorithms,a genetic algorithm,a simulated annealing genetic algorithm,an ant colony algorithm and a particle swarm algorithm,are introduced to solve this optimization model.Moreover,these optimization algorithms are used to optimize a network with 19 nodes and 27 pipelines.The optimization results of these algorithms are compared with each other. 展开更多
关键词 water distribution network seismic topology optimization genetic algorithm simulated annealing genetic algorithm ant colony algorithm particle swarm algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部