期刊文献+
共找到3,333篇文章
< 1 2 167 >
每页显示 20 50 100
Equipment damage measurement method of wartime based on FCE-PCA-RF
1
作者 LI Mingyu GAO Lu +2 位作者 XU Hongwei LI Kai HUANG Yisong 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期707-719,共13页
As the“engine”of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the pl... As the“engine”of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the planning and implementation of equipment maintenance tasks, the equipment damage measurement is an important guarantee for the effective implementation of maintenance support. Firstly,this article comprehensively analyses the influence factors to damage measurement from the enemy’s attributes, our attributes and the battlefield environment starting from the basic problem of wartime equipment damage measurement. Secondly, this article determines the key factors based on fuzzy comprehensive evaluation(FCE) and performed principal component analysis (PCA) on the key factors. Finally, the principal components representing more than 85%of the data features are taken as the input and the equipment damage quantity is taken as the output. The data are trained and tested by artificial neural network (ANN) and random forest (RF). In a word, FCE-PCA-RF can be used as a reference for the research of equipment damage estimation in wartime. 展开更多
关键词 WARTIME equipment damage fuzzy comprehensive evaluation(FCE) principal component analysis(PCA) artificial neural network(ANN) random forest(RF)
下载PDF
An evaluation method of contribution rate based on fuzzy Bayesian networks for equipment system-of-systems architecture
2
作者 XU Renjie LIU Xin +2 位作者 CUI Donghao XIE Jian GONG Lin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第3期574-587,共14页
The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate ev... The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate evaluation method does not make full use of the fuzzy information and uncertain information in the equipment system-of-systems(ESoS),and the Bayesian network is an effective tool to solve the uncertain information,a new ESoSA contribution rate evaluation method based on the fuzzy Bayesian network(FBN)is proposed.Firstly,based on the operation loop theory,an ESoSA is constructed considering three aspects:reconnaissance equipment,decision equipment,and strike equipment.Next,the fuzzy set theory is introduced to construct the FBN of ESoSA to deal with fuzzy information and uncertain information.Furthermore,the fuzzy importance index of the root node of the FBN is used to calculate the contribution rate of the ESoSA,and the ESoSA contribution rate evaluation model based on the root node fuzzy importance is established.Finally,the feasibility and rationality of this method are validated via an empirical case study of aviation ESoSA.Compared with traditional methods,the evaluation method based on FBN takes various failure states of equipment into consideration,is free of acquiring accurate probability of traditional equipment failure,and models the uncertainty of the relationship between equipment.The proposed method not only supplements and improves the ESoSA contribution rate assessment method,but also broadens the application scope of the Bayesian network. 展开更多
关键词 equipment system-of-systems architecture(ESoSA) contribution rate evaluation fuzzy Bayesian network(FBN) fuzzy set theory
下载PDF
Research on Construction Scheme of Cloud Platform for Core Network Equipment of Railway 5G Private Network
3
作者 LIU Lihai XI Min +1 位作者 DING Jianwen QIAN Jun 《Chinese Railways》 2023年第1期54-61,共8页
This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and o... This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and other aspects of communication cloud,compares cloud platform schemes with different decoupling modes,and proposes that railway 5GC should be implemented by software and hardware integration scheme or software and hardware two-layer decoupling scheme.At the same time,the redundancy and disaster recovery schemes and measures that can be taken by 5GC based on cloud platform are proposed.Finally,taking the products of ZTE Corporation as an example,the implementation architecture of railway 5GC cloud platform in 1+1 redundancy mode is given.It serves as a reference for the engineering construction of 5G-R core network. 展开更多
关键词 5GC 5G-R core network equipment DECOUPLING network function virtualization cloud platform
下载PDF
Identifying Industrial Control Equipment Based on Rule Matching and Machine Learning
4
作者 Yuhao Wang Yuying Li +1 位作者 Yanbin Sun Yu Jiang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期577-605,共29页
To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the att... To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the attack path canbe cut off,security threats canbe effectively avoided and the stable operationof the Internet canbe ensured.The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability.This paper proposes an industrial control device identification method based on PCA-Adaboost,which integrates rule matching and machine learning.We first build a rule base from network data collection and then use single andmulti-protocol rule-matchingmethods to identify the type of industrial control devices.Finally,we utilize PCA-Adaboost to identify unlabeled data.The experimental results show that the recognition rate of this method is better than that of the traditional Nmap device recognitionmethod and the device recognition accuracy rate reaches 99%.The evaluation effect of the test data set is significantly enhanced. 展开更多
关键词 network mapping network resource industrial control equipment IDENTIFICATION
下载PDF
Decentralized content sharing in mobile ad-hoc networks:A survey
5
作者 Shahriar Kaisar Joarder Kamruzzaman +1 位作者 Gour Karmakar Md Mamunur Rashid 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1363-1398,共36页
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm... The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration. 展开更多
关键词 Decentralized content sharing Mobile ad-hoc networks Delay-tolerant networks Flying ad hoc networks Message forwarding Content caching INCENTIVE Group formation Misbehavior detection
下载PDF
Equipment Maintenance Mode Based on Network Environment 被引量:2
6
作者 庞升 贾云献 +1 位作者 李欣玥 邓雅冲 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期171-174,共4页
Aimed at the actuality of Peoplep's Liberation Army(PLA) army equipment maintenance, this paper develops equipment maintenance mode based on network,and focuses on the design of maintenance decision-making system.... Aimed at the actuality of Peoplep's Liberation Army(PLA) army equipment maintenance, this paper develops equipment maintenance mode based on network,and focuses on the design of maintenance decision-making system. Analyzing maintenance weight is applied to making decision of repair level.The purpose of the research is introducing basic concept and setting up an equipment maintenance mode using military network.Maintenance mode based on network can reduce the costs,enhance the maintenance efficiency, and save the human resource and finance. 展开更多
关键词 equipment maintenance failure diagnose maintenance decision-making network
下载PDF
Effects of Network Closure on Cooperative Innovation: Evidence from Dongying's Petroleum Equipment Industry in China 被引量:1
7
作者 MA Shuang ZENG Gang 《Chinese Geographical Science》 SCIE CSCD 2019年第3期517-527,共11页
There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the litera... There are two opposing viewpoints on which kind of network configuration provides a more competitive advantage, namely,network closure or structural holes, with the latter occupying the dominant position in the literature. Using social network analysis and negative binomial regression methods, we graph the co-patent network of Dongying's petroleum equipment industry in China and explore its impact on enterprise innovation. The analysis is based on 17 face-to-face interviews, 31 enterprise questionnaires, and 354 co-patent records from the China State Intellectual Property Office identifying cooperative innovation for the years 1988–2013. We find that this network is closed, controlled by state-owned enterprises, and its closure has positive effects on enterprise innovation performance. This may be related to China's unique industrial development history, state system and policies, regional culture and circumstances, and enterprise characteristics. Therefore, for some industries in specific regions, the advantages usually attributed to structural holes and open innovation may not necessarily apply. 展开更多
关键词 network CLOSURE structural HOLES ENTERPRISE innovation PETROLEUM equipment industry Dongying
下载PDF
LSTDA: Link Stability and Transmission Delay Aware Routing Mechanism for Flying Ad-Hoc Network (FANET)
8
作者 Farman Ali Khalid Zaman +4 位作者 Babar Shah Tariq Hussain Habib Ullah Altaf Hussain Daehan Kwak 《Computers, Materials & Continua》 SCIE EI 2023年第10期963-981,共19页
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face... The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL. 展开更多
关键词 LSTDA routing protocol Flying ad-hoc network link stability unmanned aerial vehicles maxim priority channel
下载PDF
Multi-Agent Deep Reinforcement Learning for Cross-Layer Scheduling in Mobile Ad-Hoc Networks
9
作者 Xinxing Zheng Yu Zhao +1 位作者 Joohyun Lee Wei Chen 《China Communications》 SCIE CSCD 2023年第8期78-88,共11页
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o... Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies. 展开更多
关键词 ad-hoc network cross-layer scheduling multi agent deep reinforcement learning interference elimination power control queue scheduling actorcritic methods markov decision process
下载PDF
SHARING AND PLANNING OF DISTRIBUTED EQUIPMENT FOR NETWORKED MANUFACTURING 被引量:2
10
作者 CAO Le LIU Fei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第1期73-76,共4页
Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approa... Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approach is put forward to optimize the utilization of distributed equipment for networked manufacturing; Taking advantage of the shared equipment offered by equipment providers by means of lease agreement, the third party carries out production by establishing networked virtual factory. Operational mechanism of the third party based equipment sharing is discussed, and characteristics of this approach in achieving resource allocation are analyzed. Shared equipment planning is formulated as an optimization problem with the objective of maximizing profits for equipment coordinator, a mathematical model for shared equipment planning is developed. Finally a case study is discussed to show the effectiveness of the planning model. 展开更多
关键词 networked manufacturing equipment sharing equipment planning
下载PDF
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
11
作者 W.Gracy Theresa A.Gayathri P.Rama 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1337-1351,共15页
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th... Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods. 展开更多
关键词 Mobile ad-hoc network(MANET) intrusion detection system secure energy routing(SER) elliptical curve cryptography(ECC) security
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
12
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
Applying Neural Network withGenetic Algorithm and FuzzySelection Models to Select Equipmentsfor Fully-Mechanized Coal Mining
13
作者 王新宇 吴瑞明 冯春花 《Journal of China University of Mining and Technology》 2004年第2期147-151,共5页
According to the typical engineering samples, a neural net work model with genetic algorithm to optimize weight values is put forward to forecast the productivities and efficiencies of mining faces. By this model we c... According to the typical engineering samples, a neural net work model with genetic algorithm to optimize weight values is put forward to forecast the productivities and efficiencies of mining faces. By this model we can obtain the possible achievements of available equipment combinations under certain geological situations of fully-mechanized coal mining faces. Then theory of fuzzy selection is applied to evaluate the performance of each equipment combination. By detailed empirical analysis, this model integrates the functions of forecasting mining faces' achievements and selecting optimal equipment combination and is helpful to the decision of equipment combination for fully-mechanized coal mining. 展开更多
关键词 GENETIC algorithm artificial NEURAL network FUZZY SELECTION SELECTION of equipment combination
下载PDF
Automatic infrared image recognition method for substation equipment based on a deep self-attention network and multi-factor similarity calculation
14
作者 Yaocheng Li Yongpeng Xu +4 位作者 Mingkai Xu Siyuan Wang Zhicheng Xie Zhe Li Xiuchen Jiang 《Global Energy Interconnection》 EI CAS CSCD 2022年第4期397-408,共12页
Infrared image recognition plays an important role in the inspection of power equipment.Existing technologies dedicated to this purpose often require manually selected features,which are not transferable and interpret... Infrared image recognition plays an important role in the inspection of power equipment.Existing technologies dedicated to this purpose often require manually selected features,which are not transferable and interpretable,and have limited training data.To address these limitations,this paper proposes an automatic infrared image recognition framework,which includes an object recognition module based on a deep self-attention network and a temperature distribution identification module based on a multi-factor similarity calculation.First,the features of an input image are extracted and embedded using a multi-head attention encoding-decoding mechanism.Thereafter,the embedded features are used to predict the equipment component category and location.In the located area,preliminary segmentation is performed.Finally,similar areas are gradually merged,and the temperature distribution of the equipment is obtained to identify a fault.Our experiments indicate that the proposed method demonstrates significantly improved accuracy compared with other related methods and,hence,provides a good reference for the automation of power equipment inspection. 展开更多
关键词 Substation equipment Infrared image intelligent recognition Deep self-attention network Multi-factor similarity calculation
下载PDF
ZTE' s Softswitch-Based Equipment for 3G Core Networks
15
作者 Hong Jun, Xu Xiaokun, Yang Peilin (Network Division of ZTE Corporation, Nanjing 201203, China) 《ZTE Communications》 2005年第1期42-44,共3页
关键词 Core LMSD MGW s Softswitch-Based equipment for 3G Core networks Gateway Server WCDMA ZTE SCDMA
下载PDF
ZTE Network Equipment Destined for World’s Highest Railway
16
《ZTE Communications》 2006年第3期67-67,共1页
关键词 ZTE network equipment Destined for World s Highest Railway World
下载PDF
New “Intellectual Networks” (Smart Grid) for Detecting Electrical Equipment Faults, Defects and Weaknesses
17
作者 Alexander Yu. Khrennikov 《Smart Grid and Renewable Energy》 2012年第3期159-164,共6页
The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were prop... The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were proposed to use together with rapid digital protection against short-circuit regimes in transformer windings. This paper presents an application’s experience of LVI-testing, some results of the use of Frequency Response Analysis (FRA) to check the condition of transformer windings and infra-red control results of electrical equipment. The LVI method and short-circuit inductive reactance measurements are sensitive for detecting such faults as radial, axial winding deformations, a twisting of low-voltage or regulating winding, a losing of winding’s pressing and others. 展开更多
关键词 INTELLECTUAL networkS Smart Grid Monitoring SYSTEM Electrical equipment Information-Measuring SYSTEM Frequency Response Analysis Transformer WINDING Fault Diagnostic Low Voltage Impulse Method SHORT-CIRCUIT Inductive REACTANCE Measurement
下载PDF
风河发布Platform for Network Equipment
18
《开放系统世界》 2005年第3期124-124,共1页
美国风河系统公司日前发布了Platform for Network Equipment (Linux版)的参考设计版本(RDR),并且获得合作伙伴厂商的广泛支持。Platform for Network Equipment是风河公司第一个完全具备Linux文件系统的平台产品,内置丰富的网络中间... 美国风河系统公司日前发布了Platform for Network Equipment (Linux版)的参考设计版本(RDR),并且获得合作伙伴厂商的广泛支持。Platform for Network Equipment是风河公司第一个完全具备Linux文件系统的平台产品,内置丰富的网络中间件和应用组件。它进一步巩固了风河公司在Linux设备软件及解决方案领域的领先地位。 展开更多
关键词 LINUX 操作系统 文件系统 应用组件 PLATFORM for network equipment 美国风河系统公司
下载PDF
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
19
作者 Xiaoqin Song 《International Journal of Technology Management》 2015年第10期50-52,共3页
关键词 风险评估方法 漏洞扫描技术 网络设备 计算机 攻击者 入侵 黑客 信息
下载PDF
Network security equipment evaluation based on attack tree with risk fusion
20
作者 CHENG Ran LU Yue-ming 《网络与信息安全学报》 2017年第7期70-77,共8页
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A... Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation. 展开更多
关键词 网络安全 信息安全 网络技术 安全管理
下载PDF
上一页 1 2 167 下一页 到第
使用帮助 返回顶部