期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
利用“展点仪”展绘邻带方里网的数学方法和BASIC程序设计 被引量:1
1
作者 杨启和 《测绘学报》 EI CSCD 北大核心 1989年第2期108-114,共7页
本文探讨了利用“展点仪”展绘邻带方里网的基本原理和进行邻带方里线坐标变换的数学方法,讨论了BASIC程序设计,并给出了利用PC-1500袖珍计算机进行邻带坐标变换的算例。本文在理论和实际结合上较好地解决了利用坐标展点仪展绘邻带方... 本文探讨了利用“展点仪”展绘邻带方里网的基本原理和进行邻带方里线坐标变换的数学方法,讨论了BASIC程序设计,并给出了利用PC-1500袖珍计算机进行邻带坐标变换的算例。本文在理论和实际结合上较好地解决了利用坐标展点仪展绘邻带方里网的数据准备问题。 展开更多
关键词 展点仪 带方里 BASIC程序
下载PDF
谈华北电网与相邻电网的互联
2
作者 李儒魁 《电网技术》 EI CSCD 北大核心 1994年第6期49-52,共4页
本文概述了华北500kV电网结构及其特点。并从华北能源送出、调峰需要、联网电力交换等方面分析了华北电网和邻区电网的关系,提出了与相邻电网联网地点和联网方式的设想。同时还分析了三峡电站向北京送电的不合理性。
关键词 邻网 互联 华北地区
全文增补中
浅议地形图邻带坐标网
3
作者 李秀江 《中南林业调查规划》 1991年第3期43-44,共2页
大中比例尺地形图,较详细地反映了地表面的物体和现象。它在国民经济各个方面的广泛应用已是鲜为人知。对地形图内的自然地理要素、整饰要素、社会经济要素、以及数学要素都是熟悉的。例如,数学要素中的经纬网(地理坐标网)、方里网(直... 大中比例尺地形图,较详细地反映了地表面的物体和现象。它在国民经济各个方面的广泛应用已是鲜为人知。对地形图内的自然地理要素、整饰要素、社会经济要素、以及数学要素都是熟悉的。例如,数学要素中的经纬网(地理坐标网)、方里网(直角坐标网),它为在地形图上迅速而准确地测定距离、方向、面积等元素提供了便利条件。在生产实践和教学中。 展开更多
关键词 地形图 带坐标 坐标
下载PDF
一种基于记录度数的空三区域网接边优化算法
4
作者 任常青 《测绘标准化》 2011年第3期24-26,共3页
在航空摄影测量内业加密中,经常会分解为多个区域网分别平差,再进行接边处理。分析空三区域网接边时常规方法和计算机辅助方法中的不足,总结多区域网同时接边时的难点,提出一种基于记录度数的接边方法。该方法能够有效减少计算时的内存... 在航空摄影测量内业加密中,经常会分解为多个区域网分别平差,再进行接边处理。分析空三区域网接边时常规方法和计算机辅助方法中的不足,总结多区域网同时接边时的难点,提出一种基于记录度数的接边方法。该方法能够有效减少计算时的内存消耗、降低逻辑复杂度、提高程序可靠性,有利于不规则、大数据量区域网或其他点云数据文件的接边融合处理。 展开更多
关键词 空中三角测量 区域接边 邻网检测 记录度数
下载PDF
拓扑邻域空间及其性质
5
作者 赵树魁 周景新 《青岛科技大学学报(自然科学版)》 CAS 2006年第6期553-556,共4页
指出了文献[1,2]对邻域空间等的定义存在的问题并进行了修正,给出了无限空间、盖邻空间、网盖空间的定义,并且讨论了它们的一些性质。
关键词 无限 无限空间 空间 空间
下载PDF
On Point countable Sequential Neighborhood Networks
6
作者 李克典 任学军 菅典兵 《Chinese Quarterly Journal of Mathematics》 CSCD 1999年第3期88-91, ,共4页
In this paper we prove that a space X with point countable sequential neighborhood network if and only if it is α 4 space with point countable cs network.
关键词 sequential neighborhood sequential neighborhood network cs network α 1 space α 4 space
下载PDF
A Layered Zone Routing Algorithm in Ad Hoc Network Based on Matrix of Adjacency Connection
7
作者 徐光伟 李峰 +1 位作者 石秀金 霍佳震 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期43-45,共3页
The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-la... The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems.A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others. 展开更多
关键词 Ad Hoc Network adjacency connection masternode routing protocol.
下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
8
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
下载PDF
Shear-wave Splitting in the Crust beneath Shandong and Its Adjacent Area
9
作者 Miao Qingjie Liu Xiqiang +3 位作者 Shi Yuyan Qu Junhao Zheng Jianchang Tian Fengdong 《Earthquake Research in China》 CSCD 2016年第4期556-565,共10页
Based on the seismic data of near-field source from the Shandong Digital Seismic Network,this study obtained the shear-wave splitting parameters from multiple stations. The results show that dominant directions of pol... Based on the seismic data of near-field source from the Shandong Digital Seismic Network,this study obtained the shear-wave splitting parameters from multiple stations. The results show that dominant directions of polarizations of fast shear-waves reflect the spatial distribution characteristics of tectonic stress in this area,CHD and LIS stations show 2 dominant directions,and reveals that the crustal seismic anisotropy in the Shandong area is constrained by the regional stress background,local failure and structure. 展开更多
关键词 Shandong area Shear-wave splitting POLARIZATION Seismic anisotropy Tectonic stress
下载PDF
Research on the Q-value, Site Response and Seismic Source Parameters in Jiangsu and Its Adjacent Areas
10
作者 Kang Qingqing Gu Qinping +4 位作者 Miao Fajun Zhang Jinchuan Zhou Kangya Yang Chi Li Zhengkai 《Earthquake Research in China》 CSCD 2017年第2期213-224,共12页
Based on 49 digital seismograms recorded by 73 seismic stations in the Jiangsu Telemetered Seismic Network,the paper uses Atkinson's method to calculate the inelastic attenuation coefficient of the Jiangsu area. W... Based on 49 digital seismograms recorded by 73 seismic stations in the Jiangsu Telemetered Seismic Network,the paper uses Atkinson's method to calculate the inelastic attenuation coefficient of the Jiangsu area. We find that the frequency-dependent Q in the Jiangsu region is Q( f) = 272. 1·f^(0. 5575). We also use Moya's method to invert the 63 stations' site responses. The results show that the site responses of the 25 stations in Jiangsu are approximately 1 at a range between 1Hz and 20 Hz, which is consistent with their basements on rocks. The response curves of the site responses of the 14 underground stations are similar to each other. Their site responses show an amplification at low frequencies and minimization at high frequencies. The calculation of the Brune model on the waveform data of M_L≥2. 5 earthquakes from Jiangsu Digital Seismic Network between October 2010 and May 2015 in terms of seismic source parameters of 58 seismic waves shows that there are good correlations between seismic magnitude and other source parameters such as seismic moment, source radius and corner frequency, while the correlations between seismic magnitude and stress drop,and stress drop and source radius are not so good. 展开更多
关键词 Jiangsu and its adjacent areas Q-value Site response Source parameters
下载PDF
Cross-Layer and One-Hop Neighbour-Assisted Video Sharing Solution in Mobile Ad Hoc Networks
11
作者 贾世杰 许长桥 +2 位作者 Gabriel-Miro Muntean 关建峰 张宏科 《China Communications》 SCIE CSCD 2013年第6期111-126,共16页
Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Shar... Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution. 展开更多
关键词 CROSS-LAYER video sharing CLUSTERING assist
下载PDF
Neighbour Peer Selection Scheme Based on Effective Capacity for Mobile Peer-to-Peer Streaming
12
作者 夏海轮 王宁 曾志民 《China Communications》 SCIE CSCD 2013年第5期89-98,共10页
For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This pa... For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service. 展开更多
关键词 P2P mobile P2P streaming peer selection effective capacity MADM QoS
下载PDF
SNS招聘:坦途还是陷阱
13
作者 程亮 《浦东开发》 2008年第2期56-57,共2页
目前,一种简称SNS的招聘形式广受企业和求职者青睐,QQ、MSN、博客、论坛等人们常用的网络软件都成为它招聘的工具。然而,SNS招聘,是坦途还是陷阱呢?求职者张乾林和记者分别踏上SNS招聘之旅,为读者揭开其神秘面纱。
关键词 招聘 求职者 用人单位 络软件 记者 博客 陷阱 邻网 成功率 公告
原文传递
ON SPECTRUM OF NETWORKS BASED ON MATRIX OF LINK-STATE AND ITS SYMMETRY
14
作者 Liuqing XIAO Shipeng ZHOU 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2009年第2期243-251,共9页
This paper constructs a new spectrum of networks by means of the matrix of link-state ofthe network,which can reveal the characteristics of the correlation between the degrees of the network.Also,the computation of th... This paper constructs a new spectrum of networks by means of the matrix of link-state ofthe network,which can reveal the characteristics of the correlation between the degrees of the network.Also,the computation of this spectrum of networks is usually more feasible and more efficient due tothe much lower order of its matrix of link-state than its adjacent matrix in practice.Some estimatesfor the bounds of the key eigenvalues in the spectrum are obtained,the corresponding inequalities arepresented and proved.For the sake of its application,the authors define spectrum of networks in twoways,and all theorems are given in parallel for both kinds of definition.In addition,the authors finda symmetry in the spectrum,which is relative to the characteristic of structure of its network to someextent. 展开更多
关键词 Complex network Laplacian matrix matrix of link-state spectrum of networks SYMMETRY
原文传递
Anonymous-address-resolution model
15
作者 Guang-jia SONG Zhen-zhou JI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第10期1044-1055,共12页
Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditio... Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery. 展开更多
关键词 Network security Address resolution Neighbor discovery ANONYMOUS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部