期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
通信机房电源“防掉电”的8项注意 被引量:1
1
作者 彭伟 唐祥龙 丁涛 《电信技术》 2006年第6期13-16,共4页
如何在通信电源专业的日常维护管理工作中实现通信机房电源“防掉电”?我们通过实践总结了8项注意。
关键词 电源割接 防中断 供电安全
下载PDF
Single-machine scheduling with preventive periodic maintenance and resumable jobs in remanufacturing system 被引量:2
2
作者 刘碧玉 陈伟达 《Journal of Southeast University(English Edition)》 EI CAS 2012年第3期349-353,共5页
A single-machine scheduling with preventive periodic maintenance activities in a remanufacturing system including resumable and non-resumable jobs is studied.The objective is to find a schedule to minimize the makespa... A single-machine scheduling with preventive periodic maintenance activities in a remanufacturing system including resumable and non-resumable jobs is studied.The objective is to find a schedule to minimize the makespan and an LPT-LS algorithm is proposed.Non-resumable jobs are first scheduled in a machine by the longest processing time(LPT) rule,and then resumable jobs are scheduled by the list scheduling(LS) rule.And the worst-case ratios of this algorithm in three different cases in terms of the value of the total processing time of the resumable jobs(denoted as S2) are discussed.When S2 is longer than the spare time of the machine after the non-resumable jobs are assigned by the LPT rule,it is equal to 1.When S2 falls in between the spare time of the machine by the LPT rule and the optimal schedule rule,it is less than 2.When S2 is less than the spare time of the machine by the optimal schedule rule,it is less than 2.Finally,numerical examples are presented for verification. 展开更多
关键词 single-machine scheduling preventive periodic maintenance resumable jobs LPT-LS algorithm
下载PDF
索尼:支持MP3/CD刻录D-NE1升级
3
《电子科技》 2003年第6期8-8,共1页
关键词 索尼公司 D-NE1 低音增强 防中断保护 MP3 CD 随身听
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
4
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
下载PDF
从被测单位的视角论述网络安全等级保护制度的重要性 被引量:2
5
作者 何金军 《网络安全技术与应用》 2020年第5期6-7,共2页
本文从被测评单位的角度,以事件驱动安全,从网页篡改、数据泄漏、业务中断及勒索病毒四类常见的安全事件考虑,结合网络安全等级保护2.0的基本要求,概述标准中的哪些要求可在很大程度上降低常见安全事件发生的可能性,体现出实施等级保护... 本文从被测评单位的角度,以事件驱动安全,从网页篡改、数据泄漏、业务中断及勒索病毒四类常见的安全事件考虑,结合网络安全等级保护2.0的基本要求,概述标准中的哪些要求可在很大程度上降低常见安全事件发生的可能性,体现出实施等级保护制度、等级保护测评的重要性及必要性。 展开更多
关键词 网页篡改 数据泄漏 业务防中断 系统勒索 等级保护2.0
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部