A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ab...A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ability.The main advantage of the multi-agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent.In order to cope with frequent changes in the network operation condition and faults,an OCR agent,proposed in this paper,is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents.Through this kind of coordination and information exchanges,not only a local but also a global protective scheme is completed.Simulations in a simple distribution network show the effectiveness of the proposed protection system.展开更多
The active-fault-alarm (AFA) technologies and the dynamic protection mechanism of the optical network controlled by the multi-protocol label switching transport profile (MPLS-TP) are both studied in this article. ...The active-fault-alarm (AFA) technologies and the dynamic protection mechanism of the optical network controlled by the multi-protocol label switching transport profile (MPLS-TP) are both studied in this article. On this basis, an active dynamic pre-protection (ADPP) mechanism is proposed. This active dynamic pre-protection mechanism is allowed to establish a so called temporary protection path (TPP) for the work path before a potential fault occurs and to switch to TPP only after the fault occurs. It keeps the TPP flexibly only when it is in low- quality or fault state to realize dynamic protection even better and to achieve better resource utilization. Simulation results show that the proposed new mechanism has better performance in terms of the flexibility and the efficiency from the perspective of time.展开更多
A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the ...A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources. Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS) are two techniques that when properly combined can be used to provide improved dynamism in OTN networks. These techniques have been previously standardized in the context of Next Generation SDH/SONET networks. VCAT is used to tailor the capacity of network connections according to service requirements, while LCAS can adjust dynamically that capacity in a hitless manner. This paper presents an overview of the application of VCAT/LCAS techniques in the context of OTN. It explains in detail how these techniques can be employed to resize the connection capacity and analyses its use in network protection solutions. Furthermore, a detailed analysis of the time delays associated with different operations is provided and its application to some reference networks is undertaken. The obtained results provide an idea about the time delays of the capacity adjustment processes and define potential scenarios for implementing VCAT/LCAS techniques.展开更多
The room is in utter chaos, with chairs piling up in a comer and the cable TV not connected to the power source. But one thing is put in place: a slogan on the wall "Creating an outstanding WFQ team for the benefit ...The room is in utter chaos, with chairs piling up in a comer and the cable TV not connected to the power source. But one thing is put in place: a slogan on the wall "Creating an outstanding WFQ team for the benefit of all women and children."展开更多
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a...The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.展开更多
The broad-leaved Korean pine(Pinus koraiensis) forest is one of the most biodiverse zonal communities in the North Temperate Zone and an important habitat for many endangered species.Broad-leaved Korean pine forests(B...The broad-leaved Korean pine(Pinus koraiensis) forest is one of the most biodiverse zonal communities in the North Temperate Zone and an important habitat for many endangered species.Broad-leaved Korean pine forests(BKPFs) are shrinking quickly due to deforestation and rapid urbanization. Thus, scientific protection strategies are urgently needed to change this status. Changbai Mountains contains one of the largest BKPFs and is considered a priority biodiversity conservation area in China. Guided by systematic conservation planning(SCP) methods and procedures, we chose representative species and communities in BKPFs ecosystem as priority conservation objects, and set quantitative conservation target, which is in the light of the biodiversity characteristic of BKPFs. The watershed area is used as planning unit. We used CPlan software to calculate the irreplaceability(Ir)value of each planning unit and the contribution value(Ti) of each conservation object to(1) assess the conservation efficiency;(2) identify the conservation gap of the existing conservation network. Then wecalculated a human disturbance index(HDI) for planning units in the conservation gaps and combine this with the Ir value to design three conservation scenarios to optimize the conservation network.Results show that planning units with high conservation value 14.16% of the total area, with3084.36 km2 were covered by the existing conservation network. 79.28% of planning units with high conservation value have not been protected which were concentrated mainly in the eight gap areas.Only 25.3% of protection objects achieved their conservation target with the existing conservation network. Conservation efficiency is low. Three conservation scenarios are constituted, each prioritizing a different aim:(1) ecological value;(2)species rescue; and(3) economical avoidance. The three conservation schemes potentially enable 93%,88% and 51% of conservation objects, respectively, to achieve identified conservation targets, thereby improving conservation efficiency significantly.展开更多
This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a sp...This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a specially designed protection relay is installed at each substation of a network and responsible for the protection of every line sections connected to the substation busbar The conventional directional overcurrent and the new adaptive accelerated protection algorithms with multiple settings are implemented into the relay to cover all the protected line sections. The paper includes studies of a typical multi section distribution network to demonstrate the principle of the scheme. Studies show that the new scheme not only offer the new protection features for individual power line section, but also provide the characteristics of integrated protection.展开更多
Resource use efficiency analyses of village ecosystem are necessary for effective and efficient planning of resource utilization. This paper deals with economic and energy input-output analyses of different components...Resource use efficiency analyses of village ecosystem are necessary for effective and efficient planning of resource utilization. This paper deals with economic and energy input-output analyses of different components of village ecosystem in representative buffer zone villages, which are practicing transhumance and settled way of lifestyles in Nanda Devi Biosphere Reserve (NDBR) of Garhwal Himalaya. While the villages practicing transhumance used various natural resources spatially segregated,the villages practicing settled way of lifestyle have to manage resources from a limited spatial area through rotation and varied extraction intensities. Forests subsidized the production activity in both type of villages and the per capita resource extractions were found to be greater in tran^humance village than settled village. Though crops provided maximum energy, in terms of economic criteria, animal husbandry played important role in both settled and transhumance villages. As villages representing both the situations showed different ways of adjustments to the conservation oriented land use changes, management authority needs to address the eco-development plans fulfilling the aspirations of all people traditionally using the resources of the Reserve to reduce the conflicts and encourage their participation in the conservation of the area.展开更多
In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of d...In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of deep learning,watermarking has seen significant advancements.Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces,resilient to various attacks.These methods,characterized by a streamlined encoder-decoder architecture,have shown enhanced performance through the incorporation of novel training modules.This article offers an in-depth analysis of deep watermarking’s core technologies,current status,and prospective trajectories,evaluating recent scholarly contributions across diverse frameworks.It concludes with an overview of the technical hurdles and prospects,providing essential insights for ongoing and future research endeavors in digital image watermarking.展开更多
In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy an...In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time.展开更多
Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. ...Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges.展开更多
文摘A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ability.The main advantage of the multi-agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent.In order to cope with frequent changes in the network operation condition and faults,an OCR agent,proposed in this paper,is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents.Through this kind of coordination and information exchanges,not only a local but also a global protective scheme is completed.Simulations in a simple distribution network show the effectiveness of the proposed protection system.
基金Supported by the National High Technology Research and Development Program of China(No. 2009AA01Z255, 2009AA01A345), the National Basic Research Program of China(No. 2007CB310705 ) and the National Natural Science Foundation of China(No. 60932004).
文摘The active-fault-alarm (AFA) technologies and the dynamic protection mechanism of the optical network controlled by the multi-protocol label switching transport profile (MPLS-TP) are both studied in this article. On this basis, an active dynamic pre-protection (ADPP) mechanism is proposed. This active dynamic pre-protection mechanism is allowed to establish a so called temporary protection path (TPP) for the work path before a potential fault occurs and to switch to TPP only after the fault occurs. It keeps the TPP flexibly only when it is in low- quality or fault state to realize dynamic protection even better and to achieve better resource utilization. Simulation results show that the proposed new mechanism has better performance in terms of the flexibility and the efficiency from the perspective of time.
文摘A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources. Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS) are two techniques that when properly combined can be used to provide improved dynamism in OTN networks. These techniques have been previously standardized in the context of Next Generation SDH/SONET networks. VCAT is used to tailor the capacity of network connections according to service requirements, while LCAS can adjust dynamically that capacity in a hitless manner. This paper presents an overview of the application of VCAT/LCAS techniques in the context of OTN. It explains in detail how these techniques can be employed to resize the connection capacity and analyses its use in network protection solutions. Furthermore, a detailed analysis of the time delays associated with different operations is provided and its application to some reference networks is undertaken. The obtained results provide an idea about the time delays of the capacity adjustment processes and define potential scenarios for implementing VCAT/LCAS techniques.
文摘The room is in utter chaos, with chairs piling up in a comer and the cable TV not connected to the power source. But one thing is put in place: a slogan on the wall "Creating an outstanding WFQ team for the benefit of all women and children."
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
文摘The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.
基金supported by the 12th fiveyear National Science and Technology plan of China (2012BAC01B03)
文摘The broad-leaved Korean pine(Pinus koraiensis) forest is one of the most biodiverse zonal communities in the North Temperate Zone and an important habitat for many endangered species.Broad-leaved Korean pine forests(BKPFs) are shrinking quickly due to deforestation and rapid urbanization. Thus, scientific protection strategies are urgently needed to change this status. Changbai Mountains contains one of the largest BKPFs and is considered a priority biodiversity conservation area in China. Guided by systematic conservation planning(SCP) methods and procedures, we chose representative species and communities in BKPFs ecosystem as priority conservation objects, and set quantitative conservation target, which is in the light of the biodiversity characteristic of BKPFs. The watershed area is used as planning unit. We used CPlan software to calculate the irreplaceability(Ir)value of each planning unit and the contribution value(Ti) of each conservation object to(1) assess the conservation efficiency;(2) identify the conservation gap of the existing conservation network. Then wecalculated a human disturbance index(HDI) for planning units in the conservation gaps and combine this with the Ir value to design three conservation scenarios to optimize the conservation network.Results show that planning units with high conservation value 14.16% of the total area, with3084.36 km2 were covered by the existing conservation network. 79.28% of planning units with high conservation value have not been protected which were concentrated mainly in the eight gap areas.Only 25.3% of protection objects achieved their conservation target with the existing conservation network. Conservation efficiency is low. Three conservation scenarios are constituted, each prioritizing a different aim:(1) ecological value;(2)species rescue; and(3) economical avoidance. The three conservation schemes potentially enable 93%,88% and 51% of conservation objects, respectively, to achieve identified conservation targets, thereby improving conservation efficiency significantly.
文摘This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a specially designed protection relay is installed at each substation of a network and responsible for the protection of every line sections connected to the substation busbar The conventional directional overcurrent and the new adaptive accelerated protection algorithms with multiple settings are implemented into the relay to cover all the protected line sections. The paper includes studies of a typical multi section distribution network to demonstrate the principle of the scheme. Studies show that the new scheme not only offer the new protection features for individual power line section, but also provide the characteristics of integrated protection.
文摘Resource use efficiency analyses of village ecosystem are necessary for effective and efficient planning of resource utilization. This paper deals with economic and energy input-output analyses of different components of village ecosystem in representative buffer zone villages, which are practicing transhumance and settled way of lifestyles in Nanda Devi Biosphere Reserve (NDBR) of Garhwal Himalaya. While the villages practicing transhumance used various natural resources spatially segregated,the villages practicing settled way of lifestyle have to manage resources from a limited spatial area through rotation and varied extraction intensities. Forests subsidized the production activity in both type of villages and the per capita resource extractions were found to be greater in tran^humance village than settled village. Though crops provided maximum energy, in terms of economic criteria, animal husbandry played important role in both settled and transhumance villages. As villages representing both the situations showed different ways of adjustments to the conservation oriented land use changes, management authority needs to address the eco-development plans fulfilling the aspirations of all people traditionally using the resources of the Reserve to reduce the conflicts and encourage their participation in the conservation of the area.
基金supported by the National Natural Science Foundation of China(Nos.62072465,62102425)the Science and Technology Innovation Program of Hunan Province(Nos.2022RC3061,2023RC3027).
文摘In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of deep learning,watermarking has seen significant advancements.Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces,resilient to various attacks.These methods,characterized by a streamlined encoder-decoder architecture,have shown enhanced performance through the incorporation of novel training modules.This article offers an in-depth analysis of deep watermarking’s core technologies,current status,and prospective trajectories,evaluating recent scholarly contributions across diverse frameworks.It concludes with an overview of the technical hurdles and prospects,providing essential insights for ongoing and future research endeavors in digital image watermarking.
文摘In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time.
基金supported by the National Natural Science Foundation of China (No.61402529)the Natural Science Basic Research Plan in Shanxi Province of China (No.2020JM-361)+1 种基金the Young and Middle-aged Scientific Research Backbone Projects of Engineering University of PAP (No.KYGG201905)the Basic Researchof Engineering University of PAP (Nos.WJY201920 and WJY202019)。
文摘Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges.