期刊文献+
共找到8,512篇文章
< 1 2 250 >
每页显示 20 50 100
Research on College Network Information Security Protection in the Digital Economy Era
1
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security protection status COUNTERMEASURES
下载PDF
Multi-source coordinated stochastic restoration for SOP in distribution networks with a two-stage algorithm 被引量:1
2
作者 Xianxu Huo Pan Zhang +3 位作者 Tao Zhang Shiting Sun Zhanyi Li Lei Dong 《Global Energy Interconnection》 EI CAS CSCD 2023年第2期141-153,共13页
After suffering from a grid blackout, distributed energy resources(DERs), such as local renewable energy and controllable distributed generators and energy storage can be used to restore loads enhancing the system’s ... After suffering from a grid blackout, distributed energy resources(DERs), such as local renewable energy and controllable distributed generators and energy storage can be used to restore loads enhancing the system’s resilience. In this study, a multi-source coordinated load restoration strategy was investigated for a distribution network with soft open points(SOPs). Here, the flexible regulation ability of the SOPs is fully utilized to improve the load restoration level while mitigating voltage deviations. Owing to the uncertainty, a scenario-based stochastic optimization approach was employed,and the load restoration problem was formulated as a mixed-integer nonlinear programming model. A computationally efficient solution algorithm was developed for the model using convex relaxation and linearization methods. The algorithm is organized into a two-stage structure, in which the energy storage system is dispatched in the first stage by solving a relaxed convex problem. In the second stage, an integer programming problem is calculated to acquire the outputs of both SOPs and power resources. A numerical test was conducted on both IEEE 33-bus and IEEE 123-bus systems to validate the effectiveness of the proposed strategy. 展开更多
关键词 Load restoration Soft open points Distribution network Stochastic optimization Two-stage algorithm
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks
3
作者 Yuhang Meng Xianyi Chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 Image processing networks copyright protection model watermark
下载PDF
Operation Control Method of Relay Protection in Flexible DC Distribution Network Compatible with Distributed Power Supply
4
作者 Zihan Qi 《Energy Engineering》 EI 2023年第11期2547-2563,共17页
A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection,leading to... A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection,leading to poor performance.The method combines a fault-tolerant fault location method based on long-term and short-term memory networks to accurately locate the fault section.Then,an operation control method for relay protection based on adaptive weight and whale optimization algorithm(WOA)is used to construct an objective function considering the shortest relay protection action time and the smallest impulse current.The adaptive weight and WOA are employed to obtain the optimal strategy for relay protection operation control,reducing the action time and impulse current.Experimental results demonstrate the effectiveness of the proposed method in accurately locating faults and improving relay protection performance.The longest operation time is reduced by 4.7023 s,and the maximum impulse current is limited to 0.3 A,effectively controlling the impact of large impulse currents and enhancing control efficiency. 展开更多
关键词 Compatible distributed power supply FLEXIBILITY DC distribution network relay protection operation control
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
5
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 Vehicular Ad-Hoc networks (VANETs) Privacy and Data protection CYBERSECURITY Pseudonymization Schemes Internet of Vehicles (IoV)
下载PDF
Single Failure Routing Protection Algorithm in the Hybrid SDN Network 被引量:5
6
作者 Haijun Geng Jiangyuan Yao Yangyang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第7期665-679,共15页
Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet serv... Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet service providers have begun to deploy software defined network(SDN)technology,the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time.Therefore,this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios.First,the deployment of LFA scheme in a hybrid SDN network is described as a 0-1 integer linear programming(ILP)problem.Then,two greedy algorithms,namely,greedy algorithm for LFA based on hybrid SDN(GALFAHSDN)and improved greedy algorithm for LFA based on hybrid SDN(IGALFAHSDN),are proposed to solve the proposed problem.Finally,both algorithms are tested in the simulation environment and the real platform.Experiment results show that GALFAHSDN and IGALFAHSDN can cope with all single network component failure scenarios when only a small number of nodes are upgraded to SDN nodes.The path stretch of the two algorithms is less than 1.36. 展开更多
关键词 Multipath routing network availability routing protection algorithm network failure hybrid SDN network
下载PDF
Efficient Routing Protection Algorithm Based on Optimized Network Topology
7
作者 Haijun Geng Zikun Jin +7 位作者 Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan 《Computers, Materials & Continua》 SCIE EI 2022年第9期4525-4540,共16页
Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of mes... Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability. 展开更多
关键词 Routing protection algorithm network availability network failure shortest path backup path
下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
8
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY protection SLICE TECHNOLOGY PRIVACY HOMOMORPHISM collection tree protocol
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
9
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital WATERMARKING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Radial Basis Function Neural Network Based Super- Resolution Restoration for an Undersampled Image 被引量:1
10
作者 苏秉华 金伟其 牛丽红 《Journal of Beijing Institute of Technology》 EI CAS 2004年第2期135-138,共4页
To achieve restoration of high frequency information for an undersampled and degraded low-resolution image, a nonlinear and real-time processing method-the radial basis function (RBF) neural network based super-resolu... To achieve restoration of high frequency information for an undersampled and degraded low-resolution image, a nonlinear and real-time processing method-the radial basis function (RBF) neural network based super-resolution method of restoration is proposed. The RBF network configuration and processing method is suitable for a high resolution restoration from an undersampled low-resolution image. The soft-competition learning scheme based on the k-means algorithm is used, and can achieve higher mapping approximation accuracy without increase in the network size. Experiments showed that the proposed algorithm can achieve a super-resolution restored image from an undersampled and degraded low-resolution image, and requires a shorter training time when compared with the multiplayer perception (MLP) network. 展开更多
关键词 SUPER-RESOLUTION image restoration image processing neural networks UNDERSAMPLING
下载PDF
Cathodic Protection Remote Monitoring Based on Wireless Sensor Network 被引量:1
11
作者 Mohammed Zeki Al-Faiz Liqaa Saadi Mezher 《Wireless Sensor Network》 2012年第9期226-233,共8页
Cathodic Protection system is an efficient system used for protecting the underground metal objects from corrosion. In this paper the use of Cathodic Protection (CP) system and how they can be developed to simulate co... Cathodic Protection system is an efficient system used for protecting the underground metal objects from corrosion. In this paper the use of Cathodic Protection (CP) system and how they can be developed to simulate corrosion control solution was illustrated. The aim of developing a Cathodic Protection system is to provide control over oil pipelines and to reduce the incidence of corrosion. The proposed system integrates the technology of wireless sensor Network (WSN) in order to collect potential data and to realize remote data transmission. In this system each WSN receives the data from the environment and forwards it to a Remote Terminal Unit (RTU). Then each RTU forwards it to its base station (BS). In this work Labview 2010 program was used, due to its high potentials. In addition it contains a Tool Kit that supports the wireless sensor network. In this simulation used many cases study to test and monitoring data and get optimum results, least time delay and high speed to prevent corrosion. 展开更多
关键词 Cathodic protection System CORROSION WIRELESS SENSOR network REMOTE TERMINAL Unit
下载PDF
Protection Strategies against Cascading Failure for Power Systems of Ring Network 被引量:1
12
作者 Arun Kumar Hnin Yu Shwe Peter Han Joo Chong 《Communications and Network》 2016年第2期67-78,共12页
Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be model... Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined. 展开更多
关键词 Electric Power Grid Cascading Failure protection Schemes networkS
下载PDF
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
13
作者 周新卫 蒋东华 +4 位作者 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期418-433,共16页
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop... Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance. 展开更多
关键词 cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection
下载PDF
Closed-loop supply chain network equilibrium strategy model with environmental protection objectives
14
作者 Yang Liu Guitao Zhang 《Chinese Journal of Population,Resources and Environment》 2020年第3期251-261,共11页
With the increasing popularity of ecological civilization and sustainable development,enterprises should consider environmental protection measures in their operations in addition to pursue their economic interests.Th... With the increasing popularity of ecological civilization and sustainable development,enterprises should consider environmental protection measures in their operations in addition to pursue their economic interests.This paper establsihes a closed-loop supply chain network model composed of multiple suppliers,manufacturers,retailers,recyclers,and demand markets—regarding their dual goals of the profit maximization and the minimization of carbon emissions.The conditions necessary for establishing overall equilibrium and an equilibrium model of the entire closed-loop supply chain network are determined by applying variational inequality and dual theory.A modified projection contraction algorithm is used to design a model-solving program.Finally,using numerical examples,the paper conducts a comparative static analysis on important parameters such as the weight coefficients of environmental protection objectives and consumers'awareness of low-carbon environmental protection and attains some beneficial enlightenment on management.The results indicate that when the environmental protection objectives of a certain type of enterprise increases,both the economic benefits and environmental protection performance will improve;when the environmental protection objectives of all enterprises increases simultaneously,environmental protection performance improves significantly,but the changes in economic benefits of different enterprises are inconsistent and profit coordination is more complex.Although consumers’awareness of low-carbon preference could improve environmental performance,it reduces the overall profits of network members and the entire closed-loop supply chain network as a whole.The above conclusions can be used as a reference for the government in designing low-carbon environmental protection policy and in closed-loop supply chain research. 展开更多
关键词 Closed-loop supply chain network Environmental protection objectives Nash equilibrium Multi-objective decision-making Environmental protection awareness of consumers
下载PDF
Optimal Piling Network Corrosion Protection System for Al-Zubair Harbor
15
作者 Mohammed H. Hafiz Wisam K. Hamdan Ruaa Kaream Salman 《Journal of Surface Engineered Materials and Advanced Technology》 2012年第4期249-257,共9页
Cathodic protection is an effective electrochemical technique for preventing corrosion of metallic structures, for large structures like piles network impressed current cathodic protection (ICCP) system is usually pre... Cathodic protection is an effective electrochemical technique for preventing corrosion of metallic structures, for large structures like piles network impressed current cathodic protection (ICCP) system is usually preferred. The main aim of this study is to obtain the optimum protection potential that would provide a full cathodic protection for steel piles net-work immersed in sea water at Al-Zubair harbor. The effect of one immeasurable factor (path of anode (χ1)) and two measurable factors (position of anode (χ2) and voltage of power supply (χ3)) on protection potential are studied. Each factor has three different levels (high, medium, and low). Twenty-seven experiments were conducted based on a full factorial design of experiments. The results show that, a sufficient protection for three cathodes can be provided through the electrical circuit connecting them within the appropriate geometric shape.The protection potential is icreased with increasing the voltage of power supply and decreasing of distance between the anode and cathodes (piles network). 展开更多
关键词 Impressed Current Cathodic protection PILES network Path of ANODE Position of ANODE OPTIMAL Combination
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
16
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the protection of the Right of Communication through Information network
下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
17
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 INTRUSION DETECTION SYSTEM (IDS) network-based INTRUSION DETECTION system(NIDS) SELF-protection AGENT IP filter
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
18
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the protection of Privacy in the Information network Age
下载PDF
Autonomous Optimal Coordination Scheme in Protection System of Power Distribution Network by Using Multi-Agent Concept 被引量:1
19
作者 LEE Seung-Jae KIM Tae-Wan LEE Gi-Young 《Transactions of Tianjin University》 EI CAS 2008年第2期106-111,共6页
A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ab... A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ability.The main advantage of the multi-agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent.In order to cope with frequent changes in the network operation condition and faults,an OCR agent,proposed in this paper,is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents.Through this kind of coordination and information exchanges,not only a local but also a global protective scheme is completed.Simulations in a simple distribution network show the effectiveness of the proposed protection system. 展开更多
关键词 保护系统 配电网 分配模式 协调计划
下载PDF
A Subsection Shared Restoration Method for Long-Haul WDM Networks
20
作者 贺辉 范戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第1期44-47,共4页
A novel restoration scheme, Parted Path Shared Restoration (PPSR), was proposed. The major idea of PPSR is the strategy of ‘parted disposal’. PPSR keeps the advantage of Path Based Shared Restoration (PBSR) in utili... A novel restoration scheme, Parted Path Shared Restoration (PPSR), was proposed. The major idea of PPSR is the strategy of ‘parted disposal’. PPSR keeps the advantage of Path Based Shared Restoration (PBSR) in utilization of capacity. In addition, the restoration time of PPSR is much less than that of PBSR. Furthermore, a satisfaction function was proposed to estimate the performance of PPSR. This function takes the utilization of capacity and restoration time into a harmonious and uniform frame. Through theoretical analysis and computer simulation, the performance of PPSR was demonstrated. 展开更多
关键词 WDM 共享复原 恢复时间 预备容量 PPSR
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部