期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
浅析女子柔道联络技术动作的应用及方法 被引量:3
1
作者 谭朝芳 杨有泽 《四川体育科学》 2010年第4期109-110,118,共3页
采用观察统计和文献资料等方法,对2010年全国女子柔道锦标赛中的八个不同级别选手,在比赛中技术动作连络技术运用取得很大优势,进而浅析技术动作之间的连络运用。
关键词 柔道 联络技术 应用方法
下载PDF
浅谈常见煤矿通信联络技术 被引量:3
2
作者 赵彩霞 《山东煤炭科技》 2014年第5期134-135,共2页
煤矿通信联络技术分为井上通信系统及井下通信系统两大块,其中对外公务通信和内部生产调度通信统称为井上通信系统,煤矿通信系统同时还是煤矿六大系统之一,它直接关系到生产中煤矿工人的生命安全以及企业的安全生产问题,企业与政府都应... 煤矿通信联络技术分为井上通信系统及井下通信系统两大块,其中对外公务通信和内部生产调度通信统称为井上通信系统,煤矿通信系统同时还是煤矿六大系统之一,它直接关系到生产中煤矿工人的生命安全以及企业的安全生产问题,企业与政府都应当在这个问题上给予高度重视和关注。我国现有的煤矿通信系统形式单一且相对独立,在紧急情况发生的时候相互间难以取得联系,在统一调度指挥上亟待加强。 展开更多
关键词 煤矿 通信联络技术 系统
下载PDF
集束化排尿管理方案联合技术联络服务应用于髋部骨折患者的护理效果 被引量:1
3
作者 陆燕轲 兰伟红 +1 位作者 张燕 张利阳 《菏泽医学专科学校学报》 2023年第4期52-54,96,共4页
目的 探讨集束化排尿管理方案联合技术联络服务模式应用于髋部骨折患者的护理效果。方法选取我院收治的髋部骨折患者125例,按照随机分组法分为两组,对照组62例,给予常规护理;观察组63例,给予集束化排尿管理方案联合技术联络服务模式。... 目的 探讨集束化排尿管理方案联合技术联络服务模式应用于髋部骨折患者的护理效果。方法选取我院收治的髋部骨折患者125例,按照随机分组法分为两组,对照组62例,给予常规护理;观察组63例,给予集束化排尿管理方案联合技术联络服务模式。观察两组术后恢复情况、排尿量、髋关节Harris评分、泌尿系统并发症发生情况。结果 两组尿管留置时间、首次下床活动时间及住院时间比较,P<0.05;两组最大排尿量、残余尿量、排尿频次比较,P<0.05;两组髋关节Harris评分各维度得分比较,P<0.05;两组尿潴留、尿路感染发生率比较,P<0.05。结论 对髋部骨折患者实施集束化排尿管理方案联合技术联络服务模式,不仅能够改善患者术后排尿情况,降低尿潴留、尿路感染发生率,促进术后恢复,还能够改善患者髋关节功能。 展开更多
关键词 集束化 排尿管理方案 技术联络服务模式 髋部 骨折 髋关节功能
下载PDF
关于柔道联络技术在比赛中作用的探讨 被引量:2
4
作者 刘龙田 《山西体育科技》 2004年第1期6-7,共2页
本人通过多年的训练比赛及执教实践,认为使用柔道技术在比赛中靠单调的技术动运作成功率不高,取得不了优异的成绩。只有靠联络技术逐步苦练,培养成有效的得意技(绝招),才能取得更好的成绩并夺取冠军。
关键词 柔道 联络技术 技术训练 运动素质 心理素质 “得意技”
原文传递
顾桥煤矿井下高压联络开关反送电技术改进践行研究
5
作者 姬瑞东 《科技促进发展》 2010年第4期167-167,共1页
本文基于顾桥煤矿井下高压联络开关反送电技术改进实践,探讨对正在运行的高压断路器手力操动机构操作更换实践,以确保操作人员的人身安全,保证安全生产。
关键词 顾桥煤矿 高压联络开关反送电技术 安全生产
下载PDF
2005中国动物保健品暨兽医技术展览会联络员联席会会议纪要
6
《中国动物保健》 2004年第12期7-7,共1页
关键词 “2005中国动物保健品暨兽医技术展览会联络员会议” 2005杭州展览会 展会内容 技术交流
下载PDF
尼尔谈孵化
7
作者 韩枫 《山东家禽》 2004年第12期14-15,共2页
关键词 英国安伟捷育种公司 技术联络 尼尔 人工孵化 巷道式孵化器 脱水问题
下载PDF
A P2P Reference Model 被引量:1
8
作者 YANG Dengqi CHEN Xingshu WANG Jian 《China Communications》 SCIE CSCD 2010年第4期96-102,共7页
P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b... P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational. 展开更多
关键词 Peer to Peer Reference Model Shared Group Dynamic Modeling Uniform Scheduling STANDARDIZATION
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
9
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 Peer-to-peer (P2P) Keyword-set search (KSS) Keyword relationship
下载PDF
An Overview of Internet of Vehicles 被引量:56
10
作者 YANGFangchun WANG Shangguang LI Jinglin LIU Zhihan SUN Qibo 《China Communications》 SCIE CSCD 2014年第10期1-15,共15页
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l... The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV. 展开更多
关键词 internet of vehicles VANET vehicle telematics network model
下载PDF
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM 被引量:2
11
作者 ZHAO Guangyao ZOU Peng HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期126-131,共6页
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici... Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 展开更多
关键词 Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION
下载PDF
轨道交通工程工艺设备的前期质量管理工作方法研究 被引量:3
12
作者 夏福明 黄健龙 +1 位作者 高兵兵 王健 《建设监理》 2017年第2期18-21,共4页
在城市轨道交通车辆段工程建设中,监理工程师在工艺设备选型、技术联络、合同谈判及出厂验收等多个环节,做好事前、事中和事后质量控制管理工作,对后期工艺设备安装、调试和工程验收质量控制,起到了相当重要的作用。通过工程实例,探讨... 在城市轨道交通车辆段工程建设中,监理工程师在工艺设备选型、技术联络、合同谈判及出厂验收等多个环节,做好事前、事中和事后质量控制管理工作,对后期工艺设备安装、调试和工程验收质量控制,起到了相当重要的作用。通过工程实例,探讨轨道交通工程建设中车辆段工艺设备前期质量管理的工作方法。 展开更多
关键词 轨道交通工程 工艺设备 技术联络 质量控制 监理
下载PDF
The Design of Internet of Things Smart Home System based on S3C2440 and Zigbee 被引量:2
13
作者 Wenjing Zhang 《International Journal of Technology Management》 2013年第7期81-83,共3页
In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network ... In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network technology based on samsung's $3C2440 chip and some related peripheral devices to form into home gateway of the system control platform, and the home control network using the internal ZigBee wireless network technologies. Practice has proved that the system is stable, is worth promoting. 展开更多
关键词 NETWORK embedded system intelligent home furnishing ZIGBEE SC2440
下载PDF
An Efficient Algorithm for Processing Partialmax/min Queries in OLAP
14
作者 YIN Hong YANG Shuqiang HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期65-70,共6页
In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical proce... In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical processing which use the Data-cube as a data source directly,calculated all or part of the Data-cube in advance,and it can reduce the query response time significantly.This paper considers a class of queries,called the Partial-MAX/MIN query.We introduce Rank Decision Tree(RD-Tree) and it’s searching algorithm for efficient processing of the partial-max/min queries.Through experiments,we show our approach has an efficient processing capability for partial-max/min queries. 展开更多
关键词 Situational Awareness OLAP Rank Index RBS RD-Tree
下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
15
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service Security Protocol Analysis Formal Theory Strand Space Model Internet Key Exchange
下载PDF
Smart Grids with Intelligent Periphery:An Architecture for the Energy Internet 被引量:24
16
作者 Felix F.Wu Pravin P.Varaiya Ron S.Y.Hui 《Engineering》 SCIE EI 2015年第4期436-446,共11页
A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric veh... A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed. 展开更多
关键词 smart grid future grid Energy Internet energy- management system integrating renewables power system operation power system control distribution automation systems demand-side management
下载PDF
Two-stage evolutionary algorithm for dynamic multicast routing in mesh network
17
作者 Li ZHU Zhi-shu LI +1 位作者 Liang-yin CHEN Yan-hong CHENG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期791-798,共8页
In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicas... In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicast path composition, for dynamic multicast routing. The TEA uses a novel link-duplicate-degree encoding, which can encode a multicast path in the link-duplicate-degree and decode the path as a link vector easily. A dynamic algorithm for adding nodes to or removing nodes from a multicast group and a repairing algorithm are also covered in this paper. As the TEA is based on global evaluation, the quality of the multicast path remains stabilized without degradation when multicast members change over time. Therefore, it is not necessary to rearrange the multicast path during the life cycle of the multicast sessions. Simulation results show that the TEA is efficient and convergent. 展开更多
关键词 Dynamic multicast ROUTING ENCODING Quality of Service (QoS) Evolution Genetic algorithm (GA)
下载PDF
Smart Service System(SSS):A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things 被引量:6
18
作者 yongan guo hongbo zhu longxiang yang 《China Communications》 SCIE CSCD 2017年第3期130-144,共15页
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the col... In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture. 展开更多
关键词 Internet of Things network architecture clean slate evolutionary approach network heterogeneity reconfiguration
下载PDF
基于无线传感器网络定位技术的图书馆智能管理创新 被引量:3
19
作者 罗桦 陈勇 +2 位作者 张清 赵滟 黄猛 《大学图书情报学刊》 2016年第2期50-52,57,共4页
"互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆... "互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆智能系统建设和智能化发展。 展开更多
关键词 图书馆 智能管理 无线传感器网络 定位技术 互联网+
下载PDF
Reliability Prediction for Internetware Applications:A Research Framework and Its Practical Use 被引量:1
20
作者 ZHENG Zibin MENG Jingke +1 位作者 TAO Guanhong Michael R.Lyu 《China Communications》 SCIE CSCD 2015年第12期13-20,共8页
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T... The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated. 展开更多
关键词 Prediction prototype challenging perceived artifacts factorization executed runtime details similarity
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部