期刊文献+
共找到76篇文章
< 1 2 4 >
每页显示 20 50 100
建设具有河北特色不停电检修的智能互联配电网
1
作者 邢亮 《科技风》 2022年第24期76-78,共3页
本文是在国家电网公司提出建设具有中国特色的国际领先能源互联网企业战略目标的大背景下,针对河北省石家庄市配电网的结构、检修、运维方式特点以及问题和薄弱点,提出了到2035年两个阶段的建设内容,所要实现的预期目标以及实施的举措... 本文是在国家电网公司提出建设具有中国特色的国际领先能源互联网企业战略目标的大背景下,针对河北省石家庄市配电网的结构、检修、运维方式特点以及问题和薄弱点,提出了到2035年两个阶段的建设内容,所要实现的预期目标以及实施的举措。实施后能够大幅提升石家庄配电网的城市供电可靠性水平和服务民生的需求,实践了国家电网公司的战略目标要求。 展开更多
关键词 河北特色 不停电检修模式 不停电作业 网网互联 智能配电网
下载PDF
B/S架构下动态报表的一种实现方式 被引量:6
2
作者 张亚平 贺占庄 《计算机技术与发展》 2007年第4期93-95,103,共4页
介绍了B/S架构下动态报表的一种实现方式。详细叙述了其实现过程。同时,对于实现中的关键部分——报表解析程序(Reports Parser)进行了细致的说明,并给出了使用Java语言实现的一种实例。通过比较说明了该报表实现方式的优点。报表解析... 介绍了B/S架构下动态报表的一种实现方式。详细叙述了其实现过程。同时,对于实现中的关键部分——报表解析程序(Reports Parser)进行了细致的说明,并给出了使用Java语言实现的一种实例。通过比较说明了该报表实现方式的优点。报表解析程序可重用性的特点对于大型的数据库应用程序来说会有很大的帮助。在实践应用,该报表实现方式的实用性得到了证明。 展开更多
关键词 浏览器/服务器架构 互联网网/企业内部网 报表 JAVA 打印
下载PDF
Anomaly detection for network traffic flow 被引量:2
3
作者 单蓉胜 李建华 王明政 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期16-20,共5页
This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-att... This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-attacks. The SYN-flooding, as an instance of flooding-attack, is used to illustrate the anomaly detection mechanism. The mechanism applies an exponentially weighted moving average (EWMA) method to detect the abrupt net flow and applies a symmetry analysis method to detect the anomaly activity of the network flow. Experiment shows that the mechanism has high detection accuracy and low detection latency. 展开更多
关键词 INTERNET
下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
4
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks Internet connectivity gateway discovery unidirectional link broadcast storm
下载PDF
Specific Problems in the Planning and Development of Power Network in China
5
作者 张运洲 《Electricity》 2003年第4期23-26,共4页
In light of the situation that the nationwide interconnection of power networks in China in the coming years will take shape, it is imperative to emphasize the importance of setting up rational power network configura... In light of the situation that the nationwide interconnection of power networks in China in the coming years will take shape, it is imperative to emphasize the importance of setting up rational power network configuration. Combined with the characteristics of regional power networks in China, problems in network planning that need to be solved are put forward in this paper, such as, the access of power plants to grid by layers and zones, the share of external power in the load of local network, the power network configuration study in-depth in planning and design stage, and enforcement of receiving-end power network trunk etc. The background of these problems and their countermeasures are also analyzed in the paper. 展开更多
关键词 power network planning power network configuration INTERCONNECTION
下载PDF
A survey of the Internet application in the AEC industry
6
作者 周琦 罗伯特J.克罗切克 《Journal of Southeast University(English Edition)》 EI CAS 2003年第3期225-230,共6页
The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of... The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects. 展开更多
关键词 internet aided design web services web vendors in the AEC industry
下载PDF
Integrated and Intelligent Manufacturing: Perspectives and Enablers 被引量:32
7
作者 Yubao Chen 《Engineering》 SCIE EI 2017年第5期588-595,共8页
With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry ... With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry 4.0 strategy in 2013. The US government launched the Advanced Manufacturing Partnership (AMP) in 2011 and the National Network for Manufacturing Innovation (NNMI) in 2014. Most recently, the Manufacturing USA initiative was officially rolled out to further "leverage existing resources... to nurture manufacturing innovation and accelerate commercialization" by fostering close collaboration between industry, academia, and government partners. In 2015, the Chinese government officially published a 10- year plan and roadmap toward manufacturing: Made in China 2025. In all these national initiatives, the core technology development and implementation is in the area of advanced manufacturing systems. A new manufacturing paradigm is emerging, which can be characterized by two unique features: integrated manufacturing and intelligent manufacturing. This trend is in line with the progress of industrial revolutions, in which higher efficiency in production systems is being continuously pursued. To this end, 10 major technologies can be identified for the new manufacturing paradigm. This paper describes the rationales and needs for integrated and intelligent manufacturing (i2M) systems. Related technologies from different fields are also described. In particular, key technological enablers, such as the Intemet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed. Challenges are addressed with applica- tions that are based on commercially available platforms such as General Electric (GE)'s Predix and PTC's ThingWorx. 展开更多
关键词 Integrated manufacturing Intelligent manufacturing Cloud computing Cyber-physical system Internet of Things Industrial Internet Predictive analytics Manufacturing platform
下载PDF
Modeling and Characterizing Internet Backbone Traffic 被引量:2
8
作者 Yang Jie He Yang +1 位作者 Lin Ping Cheng Gang 《China Communications》 SCIE CSCD 2010年第5期49-56,共8页
With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in... With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail. 展开更多
关键词 traffic characterization MEASUREMENT traffic pattern BEHAVIOR flow statistical characteristics
下载PDF
Smart Grids with Intelligent Periphery:An Architecture for the Energy Internet 被引量:24
9
作者 Felix F.Wu Pravin P.Varaiya Ron S.Y.Hui 《Engineering》 SCIE EI 2015年第4期436-446,共11页
A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric veh... A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed. 展开更多
关键词 smart grid future grid Energy Internet energy- management system integrating renewables power system operation power system control distribution automation systems demand-side management
下载PDF
Keyword Extraction for Contextual Advertising 被引量:6
10
作者 LIU Jianyi WANG Cong YAO Wenbin 《China Communications》 SCIE CSCD 2010年第4期51-57,共7页
Contextual advertising is a major revenue source for today's companies. Keyword extraction is a key step in this kind of advertising, through which appropriate advertising keywords are extracted from Web pages so tha... Contextual advertising is a major revenue source for today's companies. Keyword extraction is a key step in this kind of advertising, through which appropriate advertising keywords are extracted from Web pages so that corresponding ads can be triggered. This paper describes a system that learns how to extract keywords from web pages for advertisement targeting. Firstly a text network for a single webpage is build, then PageRank is applied in the network to decide on the importance of a word, finally top-ranked words are selected as keywords of the webpage. The algorithm is tested on the corpus ofblog pages, and the experimental results prove practical and effective. 展开更多
关键词 EXTRACTION Contextual Advertising PAGERANK
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
11
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 Peer-to-peer (P2P) Keyword-set search (KSS) Keyword relationship
下载PDF
A P2P Reference Model 被引量:1
12
作者 YANG Dengqi CHEN Xingshu WANG Jian 《China Communications》 SCIE CSCD 2010年第4期96-102,共7页
P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b... P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational. 展开更多
关键词 Peer to Peer Reference Model Shared Group Dynamic Modeling Uniform Scheduling STANDARDIZATION
下载PDF
An new representation for interconnection network structures 被引量:1
13
作者 刘丽华 陈建二 +1 位作者 陈松乔 贾维嘉 《Journal of Central South University of Technology》 2002年第1期47-53,共7页
An important theoretic interest is to study the relations between different interconnection networks, and to compare the capability and performance of the network structures. The most popular way to do the investigati... An important theoretic interest is to study the relations between different interconnection networks, and to compare the capability and performance of the network structures. The most popular way to do the investigation is network emulation. Based on the classical voltage graph theory, the authors develop a new representation scheme for interconnection network structures. The new approach is a combination of algebraic methods and combinatorial methods. The results demonstrate that the voltage graph theory is a powerful tool for representing well known interconnection networks and in implementing optimal network emulation algorithms, and in particular, show that all popular interconnection networks have very simple and intuitive representations under the new scheme. The new representation scheme also offers powerful tools for the study of network routings and emulations. For example, we present very simple constructions for optimal network emulations from the cube connected cycles networks to the butterfly networks, and from the butterfly networks to the hypercube networks. Compared with the most popular way of network emulation, this new scheme is intuitive and easy to realize, and easy to apply to other network structures. 展开更多
关键词 interconnection network network emulation parallel computation
下载PDF
Internet Plus and Networks Convergence 被引量:6
14
作者 ZENG Jianqiu YANG Mengke 《China Communications》 SCIE CSCD 2015年第4期42-49,共8页
This paper discusses the relationship between Internet plus and networks convergence and highlights the development of ICT industry and the process of networks convergence. Based on lnternet plus and the theory of net... This paper discusses the relationship between Internet plus and networks convergence and highlights the development of ICT industry and the process of networks convergence. Based on lnternet plus and the theory of networks convergence, this paper suggests to implement Internet plus action plan as a strategy to accelerate the construction of networks and application of Internet, promote the traditional industry reform with ICT, increase competitive efficiency, standardize the market competition, and then realize the Internet plus strategy and networks convergence. 展开更多
关键词 Internet plus triple play networksconvergence
下载PDF
An Overview of Internet of Vehicles 被引量:58
15
作者 YANGFangchun WANG Shangguang LI Jinglin LIU Zhihan SUN Qibo 《China Communications》 SCIE CSCD 2014年第10期1-15,共15页
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l... The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV. 展开更多
关键词 internet of vehicles VANET vehicle telematics network model
下载PDF
From the Far Side of the Moon: Delay/DisruptionTolerant Networking Communications via Lunar Satellites 被引量:2
16
作者 Pietrofrancesco Apollonio Carlo Caini Vincenzo Fiore 《China Communications》 SCIE CSCD 2013年第10期12-25,共14页
Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates ... Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates DTN communications between the Earth and the far side of the Moon, by means of a lunar orbiter acting as relay. After an introductory part, the paper presents a comprehensive analysis of the DTN performance that can be achieved on the identified communication scenario. The focus is on the evaluation of the stateof-the-art ability of Interplanetary Overlay Network(ION), the NASA DTN implementation of Bundle Protocol(BP) and Contact Graph Routing(CGR), to meet the many challenges of the space communication scenario investigated(and more generally of a future interplaynetary Internet): intermittent links, network partitioning, scarce bandwidth, long delays, dynamic routing, handling of high priority and emergency traffic, interoperability issues. A study of security threats and Bundle Security Protocol(BSP) countermeasures complete the work.The many results provided, confirm the essential role of DTN in future space communications. 展开更多
关键词 DTN Earth to Moon communications interplanetary Interact satellite communications space communications
下载PDF
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM 被引量:2
17
作者 ZHAO Guangyao ZOU Peng HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期126-131,共6页
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici... Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 展开更多
关键词 Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION
下载PDF
Characterizing Internet Backbone Traffic Based on Deep Packets Inpection and Deep Flows Inspection 被引量:4
18
作者 杨洁 袁仑 +3 位作者 林平 丛蓉 程钢 尼万-安瑟瑞 《China Communications》 SCIE CSCD 2012年第5期42-54,共13页
Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic ... Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources. 展开更多
关键词 network traffic traffic characterization traffic monitoring PACKET flow
下载PDF
Extended Overlapping Community Detection Algorithm by Label Propagation for Internet Application Identification 被引量:1
19
作者 Yu Ke Zhang Xinyu +2 位作者 Di Jiaxi Wu Xiaofei Su Sixi 《China Communications》 SCIE CSCD 2012年第12期22-35,共14页
The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, bas... The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, based on detailed flow data collected from the public networks of Intemet Service Providers, we construct a flow graph to model the interactions among users. Considering traffic from different applications, we analyze the community structure of the flow graph in terms of cormmunity size, degree distribution of the community, community overlap, and overlap modularity. The near linear time community detection algorithm in complex networks, the Label Propagation Algorithm (LPA), is extended to the flow graph for application identification. We propose a new initialization and label propagation and update scheme. Experimental results show that the proposed algorithm has high accuracy and efficiency. 展开更多
关键词 application identification communitydetection label propagation complex network Intemet traffic flow
下载PDF
A novel internet traffic identification approach using wavelet packet decomposition and neural network 被引量:6
20
作者 谭骏 陈兴蜀 +1 位作者 杜敏 朱锴 《Journal of Central South University》 SCIE EI CAS 2012年第8期2218-2230,共13页
Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network... Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network applications by optimized back-propagation (BP) neural network. Particle swarm optimization (PSO) algorithm was used to optimize the BP neural network. And in order to increase the identification performance, wavelet packet decomposition (WPD) was used to extract several hidden features from the time-frequency information of network traffic. The experimental results show that the average classification accuracy of various network applications can reach 97%. Moreover, this approach optimized by BP neural network takes 50% of the training time compared with the traditional neural network. 展开更多
关键词 neural network particle swarm optimization statistical characteristic traffic identification wavelet packet decomposition
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部