As the“engine”of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the pl...As the“engine”of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the planning and implementation of equipment maintenance tasks, the equipment damage measurement is an important guarantee for the effective implementation of maintenance support. Firstly,this article comprehensively analyses the influence factors to damage measurement from the enemy’s attributes, our attributes and the battlefield environment starting from the basic problem of wartime equipment damage measurement. Secondly, this article determines the key factors based on fuzzy comprehensive evaluation(FCE) and performed principal component analysis (PCA) on the key factors. Finally, the principal components representing more than 85%of the data features are taken as the input and the equipment damage quantity is taken as the output. The data are trained and tested by artificial neural network (ANN) and random forest (RF). In a word, FCE-PCA-RF can be used as a reference for the research of equipment damage estimation in wartime.展开更多
The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate ev...The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate evaluation method does not make full use of the fuzzy information and uncertain information in the equipment system-of-systems(ESoS),and the Bayesian network is an effective tool to solve the uncertain information,a new ESoSA contribution rate evaluation method based on the fuzzy Bayesian network(FBN)is proposed.Firstly,based on the operation loop theory,an ESoSA is constructed considering three aspects:reconnaissance equipment,decision equipment,and strike equipment.Next,the fuzzy set theory is introduced to construct the FBN of ESoSA to deal with fuzzy information and uncertain information.Furthermore,the fuzzy importance index of the root node of the FBN is used to calculate the contribution rate of the ESoSA,and the ESoSA contribution rate evaluation model based on the root node fuzzy importance is established.Finally,the feasibility and rationality of this method are validated via an empirical case study of aviation ESoSA.Compared with traditional methods,the evaluation method based on FBN takes various failure states of equipment into consideration,is free of acquiring accurate probability of traditional equipment failure,and models the uncertainty of the relationship between equipment.The proposed method not only supplements and improves the ESoSA contribution rate assessment method,but also broadens the application scope of the Bayesian network.展开更多
This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and o...This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and other aspects of communication cloud,compares cloud platform schemes with different decoupling modes,and proposes that railway 5GC should be implemented by software and hardware integration scheme or software and hardware two-layer decoupling scheme.At the same time,the redundancy and disaster recovery schemes and measures that can be taken by 5GC based on cloud platform are proposed.Finally,taking the products of ZTE Corporation as an example,the implementation architecture of railway 5GC cloud platform in 1+1 redundancy mode is given.It serves as a reference for the engineering construction of 5G-R core network.展开更多
To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the att...To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the attack path canbe cut off,security threats canbe effectively avoided and the stable operationof the Internet canbe ensured.The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability.This paper proposes an industrial control device identification method based on PCA-Adaboost,which integrates rule matching and machine learning.We first build a rule base from network data collection and then use single andmulti-protocol rule-matchingmethods to identify the type of industrial control devices.Finally,we utilize PCA-Adaboost to identify unlabeled data.The experimental results show that the recognition rate of this method is better than that of the traditional Nmap device recognitionmethod and the device recognition accuracy rate reaches 99%.The evaluation effect of the test data set is significantly enhanced.展开更多
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm...The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.展开更多
Aimed at the actuality of Peoplep's Liberation Army(PLA) army equipment maintenance, this paper develops equipment maintenance mode based on network,and focuses on the design of maintenance decision-making system....Aimed at the actuality of Peoplep's Liberation Army(PLA) army equipment maintenance, this paper develops equipment maintenance mode based on network,and focuses on the design of maintenance decision-making system. Analyzing maintenance weight is applied to making decision of repair level.The purpose of the research is introducing basic concept and setting up an equipment maintenance mode using military network.Maintenance mode based on network can reduce the costs,enhance the maintenance efficiency, and save the human resource and finance.展开更多
There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the litera...There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the literature. Using social network analysis and negative binomial regression methods, we graph the co-patent network of Dongying's petroleum equipment industry in China and explore its impact on enterprise innovation. The analysis is based on 17 face-to-face interviews, 31 enterprise questionnaires, and 354 co-patent records from the China State Intellectual Property Office identifying cooperative innovation for the years 1988–2013. We find that this network is closed, controlled by state-owned enterprises, and its closure has positive effects on enterprise innovation performance. This may be related to China's unique industrial development history, state system and policies, regional culture and circumstances, and enterprise characteristics. Therefore, for some industries in specific regions, the advantages usually attributed to structural holes and open innovation may not necessarily apply.展开更多
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face...The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.展开更多
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o...Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.展开更多
Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approa...Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approach is put forward to optimize the utilization of distributed equipment for networked manufacturing; Taking advantage of the shared equipment offered by equipment providers by means of lease agreement, the third party carries out production by establishing networked virtual factory. Operational mechanism of the third party based equipment sharing is discussed, and characteristics of this approach in achieving resource allocation are analyzed. Shared equipment planning is formulated as an optimization problem with the objective of maximizing profits for equipment coordinator, a mathematical model for shared equipment planning is developed. Finally a case study is discussed to show the effectiveness of the planning model.展开更多
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
According to the typical engineering samples, a neural net work model with genetic algorithm to optimize weight values is put forward to forecast the productivities and efficiencies of mining faces. By this model we c...According to the typical engineering samples, a neural net work model with genetic algorithm to optimize weight values is put forward to forecast the productivities and efficiencies of mining faces. By this model we can obtain the possible achievements of available equipment combinations under certain geological situations of fully-mechanized coal mining faces. Then theory of fuzzy selection is applied to evaluate the performance of each equipment combination. By detailed empirical analysis, this model integrates the functions of forecasting mining faces' achievements and selecting optimal equipment combination and is helpful to the decision of equipment combination for fully-mechanized coal mining.展开更多
Infrared image recognition plays an important role in the inspection of power equipment.Existing technologies dedicated to this purpose often require manually selected features,which are not transferable and interpret...Infrared image recognition plays an important role in the inspection of power equipment.Existing technologies dedicated to this purpose often require manually selected features,which are not transferable and interpretable,and have limited training data.To address these limitations,this paper proposes an automatic infrared image recognition framework,which includes an object recognition module based on a deep self-attention network and a temperature distribution identification module based on a multi-factor similarity calculation.First,the features of an input image are extracted and embedded using a multi-head attention encoding-decoding mechanism.Thereafter,the embedded features are used to predict the equipment component category and location.In the located area,preliminary segmentation is performed.Finally,similar areas are gradually merged,and the temperature distribution of the equipment is obtained to identify a fault.Our experiments indicate that the proposed method demonstrates significantly improved accuracy compared with other related methods and,hence,provides a good reference for the automation of power equipment inspection.展开更多
The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were prop...The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were proposed to use together with rapid digital protection against short-circuit regimes in transformer windings. This paper presents an application’s experience of LVI-testing, some results of the use of Frequency Response Analysis (FRA) to check the condition of transformer windings and infra-red control results of electrical equipment. The LVI method and short-circuit inductive reactance measurements are sensitive for detecting such faults as radial, axial winding deformations, a twisting of low-voltage or regulating winding, a losing of winding’s pressing and others.展开更多
In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network...In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network to steal important information, or destroy the network, the paralyzed which caused huge losses to the state and society. Find a known vulnerability rather than to find the unknown vulnerabilities much easier, which means that most of the attacker' s use is common vulnerabilities. Therefore, we adopt the advantages of the technique to finalize the methodology for the essential network equipment risk assessment which will be meaningful.展开更多
美国风河系统公司日前发布了Platform for Network Equipment (Linux版)的参考设计版本(RDR),并且获得合作伙伴厂商的广泛支持。Platform for Network Equipment是风河公司第一个完全具备Linux文件系统的平台产品,内置丰富的网络中间...美国风河系统公司日前发布了Platform for Network Equipment (Linux版)的参考设计版本(RDR),并且获得合作伙伴厂商的广泛支持。Platform for Network Equipment是风河公司第一个完全具备Linux文件系统的平台产品,内置丰富的网络中间件和应用组件。它进一步巩固了风河公司在Linux设备软件及解决方案领域的领先地位。展开更多
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A...Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.展开更多
文摘As the“engine”of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the planning and implementation of equipment maintenance tasks, the equipment damage measurement is an important guarantee for the effective implementation of maintenance support. Firstly,this article comprehensively analyses the influence factors to damage measurement from the enemy’s attributes, our attributes and the battlefield environment starting from the basic problem of wartime equipment damage measurement. Secondly, this article determines the key factors based on fuzzy comprehensive evaluation(FCE) and performed principal component analysis (PCA) on the key factors. Finally, the principal components representing more than 85%of the data features are taken as the input and the equipment damage quantity is taken as the output. The data are trained and tested by artificial neural network (ANN) and random forest (RF). In a word, FCE-PCA-RF can be used as a reference for the research of equipment damage estimation in wartime.
基金supported by the National Key Research and Development Project(2018YFB1700802)the National Natural Science Foundation of China(72071206)the Science and Technology Innovation Plan of Hunan Province(2020RC4046).
文摘The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate evaluation method does not make full use of the fuzzy information and uncertain information in the equipment system-of-systems(ESoS),and the Bayesian network is an effective tool to solve the uncertain information,a new ESoSA contribution rate evaluation method based on the fuzzy Bayesian network(FBN)is proposed.Firstly,based on the operation loop theory,an ESoSA is constructed considering three aspects:reconnaissance equipment,decision equipment,and strike equipment.Next,the fuzzy set theory is introduced to construct the FBN of ESoSA to deal with fuzzy information and uncertain information.Furthermore,the fuzzy importance index of the root node of the FBN is used to calculate the contribution rate of the ESoSA,and the ESoSA contribution rate evaluation model based on the root node fuzzy importance is established.Finally,the feasibility and rationality of this method are validated via an empirical case study of aviation ESoSA.Compared with traditional methods,the evaluation method based on FBN takes various failure states of equipment into consideration,is free of acquiring accurate probability of traditional equipment failure,and models the uncertainty of the relationship between equipment.The proposed method not only supplements and improves the ESoSA contribution rate assessment method,but also broadens the application scope of the Bayesian network.
文摘This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and other aspects of communication cloud,compares cloud platform schemes with different decoupling modes,and proposes that railway 5GC should be implemented by software and hardware integration scheme or software and hardware two-layer decoupling scheme.At the same time,the redundancy and disaster recovery schemes and measures that can be taken by 5GC based on cloud platform are proposed.Finally,taking the products of ZTE Corporation as an example,the implementation architecture of railway 5GC cloud platform in 1+1 redundancy mode is given.It serves as a reference for the engineering construction of 5G-R core network.
基金funded in part by the National Key R&D Program of China(Grant No.2022YFB3102901)the National Natural Science Foundation of China(Grant Nos.61976064,61871140,62272119,62072130)the Guangdong Province Key Research and Development Plan(Grant No.2019B010137004).
文摘To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the attack path canbe cut off,security threats canbe effectively avoided and the stable operationof the Internet canbe ensured.The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability.This paper proposes an industrial control device identification method based on PCA-Adaboost,which integrates rule matching and machine learning.We first build a rule base from network data collection and then use single andmulti-protocol rule-matchingmethods to identify the type of industrial control devices.Finally,we utilize PCA-Adaboost to identify unlabeled data.The experimental results show that the recognition rate of this method is better than that of the traditional Nmap device recognitionmethod and the device recognition accuracy rate reaches 99%.The evaluation effect of the test data set is significantly enhanced.
文摘The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.
文摘Aimed at the actuality of Peoplep's Liberation Army(PLA) army equipment maintenance, this paper develops equipment maintenance mode based on network,and focuses on the design of maintenance decision-making system. Analyzing maintenance weight is applied to making decision of repair level.The purpose of the research is introducing basic concept and setting up an equipment maintenance mode using military network.Maintenance mode based on network can reduce the costs,enhance the maintenance efficiency, and save the human resource and finance.
基金Under the auspices of National Natural Science Foundation of China(No.41771143)Philosophy and Social Sciences Planning Project of Shanghai(No.2018EJL002)
文摘There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the literature. Using social network analysis and negative binomial regression methods, we graph the co-patent network of Dongying's petroleum equipment industry in China and explore its impact on enterprise innovation. The analysis is based on 17 face-to-face interviews, 31 enterprise questionnaires, and 354 co-patent records from the China State Intellectual Property Office identifying cooperative innovation for the years 1988–2013. We find that this network is closed, controlled by state-owned enterprises, and its closure has positive effects on enterprise innovation performance. This may be related to China's unique industrial development history, state system and policies, regional culture and circumstances, and enterprise characteristics. Therefore, for some industries in specific regions, the advantages usually attributed to structural holes and open innovation may not necessarily apply.
基金supported in part by the Office of Research and Sponsored Programs,Kean University,the RIF Activity Code 23009 of Zayed University,UAE,and the National Natural Science Foundation of China under Grant 62172366.
文摘The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.
基金supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.RS-2022-00155885, Artificial Intelligence Convergence Innovation Human Resources Development (Hanyang University ERICA))supported by the National Natural Science Foundation of China under Grant No. 61971264the National Natural Science Foundation of China/Research Grants Council Collaborative Research Scheme under Grant No. 62261160390
文摘Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.
基金This project is supported by National Hi-tech Research and Development Program of China (863 Program, No. 2005AA411040)Chongqing University Graduate Innovation Foundation, China (No. 200506Z1B0270134)
文摘Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approach is put forward to optimize the utilization of distributed equipment for networked manufacturing; Taking advantage of the shared equipment offered by equipment providers by means of lease agreement, the third party carries out production by establishing networked virtual factory. Operational mechanism of the third party based equipment sharing is discussed, and characteristics of this approach in achieving resource allocation are analyzed. Shared equipment planning is formulated as an optimization problem with the objective of maximizing profits for equipment coordinator, a mathematical model for shared equipment planning is developed. Finally a case study is discussed to show the effectiveness of the planning model.
文摘Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
文摘According to the typical engineering samples, a neural net work model with genetic algorithm to optimize weight values is put forward to forecast the productivities and efficiencies of mining faces. By this model we can obtain the possible achievements of available equipment combinations under certain geological situations of fully-mechanized coal mining faces. Then theory of fuzzy selection is applied to evaluate the performance of each equipment combination. By detailed empirical analysis, this model integrates the functions of forecasting mining faces' achievements and selecting optimal equipment combination and is helpful to the decision of equipment combination for fully-mechanized coal mining.
基金This work was supported by National Key R&D Program of China(2019YFE0102900).
文摘Infrared image recognition plays an important role in the inspection of power equipment.Existing technologies dedicated to this purpose often require manually selected features,which are not transferable and interpretable,and have limited training data.To address these limitations,this paper proposes an automatic infrared image recognition framework,which includes an object recognition module based on a deep self-attention network and a temperature distribution identification module based on a multi-factor similarity calculation.First,the features of an input image are extracted and embedded using a multi-head attention encoding-decoding mechanism.Thereafter,the embedded features are used to predict the equipment component category and location.In the located area,preliminary segmentation is performed.Finally,similar areas are gradually merged,and the temperature distribution of the equipment is obtained to identify a fault.Our experiments indicate that the proposed method demonstrates significantly improved accuracy compared with other related methods and,hence,provides a good reference for the automation of power equipment inspection.
文摘The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were proposed to use together with rapid digital protection against short-circuit regimes in transformer windings. This paper presents an application’s experience of LVI-testing, some results of the use of Frequency Response Analysis (FRA) to check the condition of transformer windings and infra-red control results of electrical equipment. The LVI method and short-circuit inductive reactance measurements are sensitive for detecting such faults as radial, axial winding deformations, a twisting of low-voltage or regulating winding, a losing of winding’s pressing and others.
文摘In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network to steal important information, or destroy the network, the paralyzed which caused huge losses to the state and society. Find a known vulnerability rather than to find the unknown vulnerabilities much easier, which means that most of the attacker' s use is common vulnerabilities. Therefore, we adopt the advantages of the technique to finalize the methodology for the essential network equipment risk assessment which will be meaningful.
文摘美国风河系统公司日前发布了Platform for Network Equipment (Linux版)的参考设计版本(RDR),并且获得合作伙伴厂商的广泛支持。Platform for Network Equipment是风河公司第一个完全具备Linux文件系统的平台产品,内置丰富的网络中间件和应用组件。它进一步巩固了风河公司在Linux设备软件及解决方案领域的领先地位。
基金The Research of Key Technology and Application of Information Security Certification Project(No.2016YFF0204001)
文摘Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.