重点介绍校园网资源信息管理需要注意的内容和实现方式,以IP地址管理、网络设备管理、通信链路管理和网管人员管理为例介绍了软件系统的解决方案。采用B/S模式、Oracle数据库和Sun One Directory Server实现了提供这几部分管理功能的...重点介绍校园网资源信息管理需要注意的内容和实现方式,以IP地址管理、网络设备管理、通信链路管理和网管人员管理为例介绍了软件系统的解决方案。采用B/S模式、Oracle数据库和Sun One Directory Server实现了提供这几部分管理功能的原型系统,验证了方案的可行性。该系统目前正试用在北京大学校园网上。展开更多
Congestion management in an electricity market is introduced in this paper and a new method of allocating congestion cost to transactions is proposed. The proposed method is a two-step process, in which the total cong...Congestion management in an electricity market is introduced in this paper and a new method of allocating congestion cost to transactions is proposed. The proposed method is a two-step process, in which the total congestion cost is firstly allocated to congested facilities and then to each transaction involved. The cost of relieving a congested facility allocated to each transaction is proportional to the power flow change on the congested facility caused by the transaction. The more the power flow change is on the congested facility caused by the transaction, the deeper the degree of involvement by the transaction. Therefore, cutting down the magnitudes of such transactions contributes to relieving congestion. Test results on a 5-bus system indicate that the proposed method can reflect reasonably the degree of involvement by each transaction in the congestion and provide correct price signals contributing to relieving congestion.展开更多
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat...The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security展开更多
文摘重点介绍校园网资源信息管理需要注意的内容和实现方式,以IP地址管理、网络设备管理、通信链路管理和网管人员管理为例介绍了软件系统的解决方案。采用B/S模式、Oracle数据库和Sun One Directory Server实现了提供这几部分管理功能的原型系统,验证了方案的可行性。该系统目前正试用在北京大学校园网上。
文摘Congestion management in an electricity market is introduced in this paper and a new method of allocating congestion cost to transactions is proposed. The proposed method is a two-step process, in which the total congestion cost is firstly allocated to congested facilities and then to each transaction involved. The cost of relieving a congested facility allocated to each transaction is proportional to the power flow change on the congested facility caused by the transaction. The more the power flow change is on the congested facility caused by the transaction, the deeper the degree of involvement by the transaction. Therefore, cutting down the magnitudes of such transactions contributes to relieving congestion. Test results on a 5-bus system indicate that the proposed method can reflect reasonably the degree of involvement by each transaction in the congestion and provide correct price signals contributing to relieving congestion.
文摘The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security