期刊文献+
共找到404篇文章
< 1 2 21 >
每页显示 20 50 100
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:2
1
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing PRIVACY-PRESERVinG Verifiable aggregation Homomorphic cryptosystem
下载PDF
Establishment and validation of a predictive model for peripherally inserted central catheter-related thrombosis in patients with liver cancer 被引量:1
2
作者 Xiao-Fei Chen Hao-Jun Wu +3 位作者 Tang Li Jia-Bin Liu Wen-Jie Zhou Qiang Guo 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第7期2221-2231,共11页
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo... BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value. 展开更多
关键词 Liver cancer Peripherally inserted central catheters THROMBOSIS Model verify
下载PDF
P_(c)(4457)Interpreted as a J^(P)=1/2+State byD^(0)∧_(c)^(+)(2595)-π^(0)P_(c)(4312)Interaction
3
作者 Jin-Zi Wu Jin-Yi Pang Jia-Jun Wu 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第9期23-27,共5页
P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)... P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π. 展开更多
关键词 (0 PARITY verify
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
4
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image Sharing Verifiability
下载PDF
Study on Ship Automatic Berthing System with Mooring Lines 被引量:5
5
作者 K.U.Yang J.G.Hur +2 位作者 M.S.Choi D.J.Yeo J.H.Byun 《China Ocean Engineering》 SCIE EI CSCD 2017年第1期19-29,共11页
This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by control... This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by controlling both forward and aft breast lines. Berthing method is used through length adjustment of mooring lines connected between ship and quay by controlling the angular velocity and the torque of hydraulic motor in mooring device. The study is conducted under three changing conditions of draft, such as even-keel, rise of the gravity center and trim to stern. Variables affecting berthing stability are determined based on the control performance of each condition. Bond graphs method is used to model the system. Controller is designed as PID control method of reference-model algorithm. The control program is composed of synchronous control system based on the equations derived with the numerical analysis. The tank test is conducted to verify the usefulness of the control program. 展开更多
关键词 hydraulic maintain affecting berth torque adjustment draft attitude gravity verify
下载PDF
Model of Security Evaluation of Infrastructure as a Service Layer of Cloud Computing System 被引量:1
6
作者 李传龙 高静 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期323-327,共5页
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ... At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method. 展开更多
关键词 cloud verified judgment segmentation hierarchical evaluating partition infrastructure Encryption authentication
下载PDF
A systems biology approach identifies a regulator,BplERF1,of cold tolerance in Betula platyphylla 被引量:2
7
作者 Kaiwen Lv Wenqi Wu +1 位作者 Hairong Wei Guifeng Liu 《Forestry Research》 2021年第1期96-105,共10页
Cold is an abiotic stress that can greatly affect the growth and survival of plants.Here,we reported that an AP2/ERF family gene,BplERF1,isolated from Betula platyphylla played a contributing role in cold stress toler... Cold is an abiotic stress that can greatly affect the growth and survival of plants.Here,we reported that an AP2/ERF family gene,BplERF1,isolated from Betula platyphylla played a contributing role in cold stress tolerance.Overexpression of BplERF1 in B.platyphylla transgenic lines enhanced cold stress tolerance by increasing the scavenging capability and reducing H_(2)O_(2) and malondialdehyde(MDA)content in transgenic plants.Construction of BplERF-mediated multilayered hierarchical gene regulatory network(ML-hGRN),using Top-down GGM algorithm and the transcriptomic data of BplERF1 overexpression lines,led to the identification of five candidate target genes of BplERF1 which include MPK20,ERF9,WRKY53,WRKY70,and GIA1.All of them were then verified to be the true target genes of BplERF1 by chromatin-immunoprecipitation PCR(ChIP-PCR)assay.Our results indicate that BplERF1 is a positive regulator of cold tolerance and is capable of exerting regulation on the expression of cold signaling and regulatory genes,causing mitigation of reactive oxygen species. 展开更多
关键词 TOLERANCE platyphylla verified
下载PDF
NON-INVASIVE CARDIAC FUNCTION EVALUATION AND CARDIAC DISEASES DIAGNOSING EXPERT SYSTEM 被引量:1
8
作者 Lijuan Wang Xueyu Peng Xidian University,Xi’an 710071,China 《Chinese Journal of Biomedical Engineering(English Edition)》 1993年第3期101-101,共1页
NICFED expert system-a rule-based"non-invasive cardiac function evaluationand cardiac diseases diagnosing expert system"-is discussed in this paper.The sys-tem can be regarded as an interpretation expert sys... NICFED expert system-a rule-based"non-invasive cardiac function evaluationand cardiac diseases diagnosing expert system"-is discussed in this paper.The sys-tem can be regarded as an interpretation expert system and as a diagnostic expertsystem.When it is applied to evaluate cardiac function,it can explain more than onehundred parameters detected by"MCA-Ⅲ cardiac function device of multi-domainand multidemension".With these parameters the cardiac function in time domain,fre- 展开更多
关键词 interpretation EXPLAin diagnostic PROLOG AUTHORITY verified friendly REASONinG
下载PDF
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain 被引量:1
9
作者 Zhiji Li 《Journal of Information Security》 2022年第2期43-65,共23页
Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the informatio... Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead. 展开更多
关键词 Verifiable Credential Aggregate Signatures Privacy Protection Selective Disclosure Blockchain
下载PDF
ELECTRON BEAM OPTICS CALCULATIONS FOR ROTATIONALLY SYMMETRIC SYSTEMS POSSESSING THIRD ORDER ABERRATIONS
10
作者 西门记业 刘志雄 《Journal of Electronics(China)》 1993年第4期331-343,共13页
Based on theory of electron beam optics,the beam optical calculations for animmersion lens and a unipotential lens have been performed.The computational results showthat the beam optical calculations are consistent to... Based on theory of electron beam optics,the beam optical calculations for animmersion lens and a unipotential lens have been performed.The computational results showthat the beam optical calculations are consistent to the ray tracing and that the beam emittanceis conserved,even if the third order aberrations exist. 展开更多
关键词 CONSERVED optics TRACinG BEAM Runge immersion Kutta ABERRATION verify faster
下载PDF
PHASE CONTENT AND ATOMIC STRUCTURE DETERMINATION IN TWO-PHASES SYSTEMS BY EXAFS
11
作者 LU Kunquan WAN Jun JIANG Wei 《Chinese Physics Letters》 SCIE CAS 1986年第8期341-344,共4页
A method of EXAFS analysis to determine phase content and local structure surrounding same type atoms in different phase of a mixed phases system is proposed.A general expression of c(k)function for a two phases syste... A method of EXAFS analysis to determine phase content and local structure surrounding same type atoms in different phase of a mixed phases system is proposed.A general expression of c(k)function for a two phases system is presented.To verify the method,the EXAFS of some specimens were measured and analyzed.The results agreed well with expected ones. 展开更多
关键词 EXAFS system verify
下载PDF
Systematics in the Improved N_(π)N_(v) Scheme
12
作者 ZHAO Yumin CHEN Yan 《Chinese Physics Letters》 SCIE CAS CSCD 1995年第2期68-71,共4页
Systematics of energy spectra and B(E2)with substantial improvements in the N_(π)N_(v) scheme are presented.The correlation of energy spectra over an extended region is pointed out and a simple explanation is given.A... Systematics of energy spectra and B(E2)with substantial improvements in the N_(π)N_(v) scheme are presented.The correlation of energy spectra over an extended region is pointed out and a simple explanation is given.A method for verifying the simple B(E2)systematics is also suggested. 展开更多
关键词 B(E2) SPECTRA verify
下载PDF
A Hybrid Simulation Test Platform for Verifying the Protection Settings of SPS
13
作者 Jianjian Li Luojiang Qian 《Energy and Power Engineering》 2017年第4期346-351,共6页
To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) ... To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test. 展开更多
关键词 Hybrid Simulation SHIPBOARD POWER system (SPS) PROTECTION SETTinGS Close-Loop Test verify
下载PDF
Using wavelet multi-resolution nature to accelerate the identification of fractional order system
14
作者 李远禄 孟霄 丁亚庆 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第5期21-29,共9页
Because of the fractional order derivatives, the identification of the fractional order system(FOS) is more complex than that of an integral order system(IOS). In order to avoid high time consumption in the system... Because of the fractional order derivatives, the identification of the fractional order system(FOS) is more complex than that of an integral order system(IOS). In order to avoid high time consumption in the system identification, the leastsquares method is used to find other parameters by fixing the fractional derivative order. Hereafter, the optimal parameters of a system will be found by varying the derivative order in an interval. In addition, the operational matrix of the fractional order integration combined with the multi-resolution nature of a wavelet is used to accelerate the FOS identification, which is achieved by discarding wavelet coefficients of high-frequency components of input and output signals. In the end, the identifications of some known fractional order systems and an elastic torsion system are used to verify the proposed method. 展开更多
关键词 fractional wavelet operational torsion accelerate verify derivative decomposed integer coordinates
下载PDF
Review of some of the papers in 1991 International Conference on Power System Technology
15
作者 Liu Zhaoxu Electric Power Research Institute, China 《Electricity》 1992年第2期4-6,共3页
Introduction The 1991 International Conference on Power System Tech-nology was held on September 13-17 in Beijing. About 200 technicalpapers were presented in 36 sessions in the conference and bunchedinto the conferen... Introduction The 1991 International Conference on Power System Tech-nology was held on September 13-17 in Beijing. About 200 technicalpapers were presented in 36 sessions in the conference and bunchedinto the conference publication. The paper covered wide variety ofmodern power system techniques and categorised into the followingmajor subjects: 展开更多
关键词 UNCERTAin constraint iterative Scheduling SMES aided interactive COVERED verified OVERHEAD
下载PDF
Parameters Identification of Continuous-Time Hammerstein System with Advanced Gauss Pseudo spectral Method
16
作者 何颖 戴明祥 +1 位作者 杨新民 易文俊 《Journal of Donghua University(English Edition)》 EI CAS 2016年第5期803-808,共6页
An advanced Gauss pseudospectral method(AGPM) was proposed to estimate the parameters of the continuous-time(CT)Hammerstein model.The nonlinear part of the Hammerstein system is approximated with pseudospectral approx... An advanced Gauss pseudospectral method(AGPM) was proposed to estimate the parameters of the continuous-time(CT)Hammerstein model.The nonlinear part of the Hammerstein system is approximated with pseudospectral approximation method.The linear part was written as a controllable canonical form to circumvent the high order time-derivative of the input and output(I/O) signals,which could multiply the measurement noise in the identification procession.Furthermore,an output error minimization was constructed for the CT Hammerstein model identification,which was then transcribed into a nonlinear programming(NLP) problem by AGPM.AGPM could converge to the true values of the CT Hammerstein model with few interpolated Legendre-Gauss(LG) nodes.Lastly,two illustrative examples were proposed to verify the accuracy and efficiency of the method. 展开更多
关键词 minimization Legendre controllable converge canonical verify transcribed interpolation derivative affine
下载PDF
A digital wide range neutron flux measuring system for HL-2A
17
作者 袁晨 吴军 阴泽杰 《Plasma Science and Technology》 SCIE EI CAS CSCD 2017年第8期43-48,共6页
To achieve wide-range, high-integration, and real-time performance on the neutron flux measurement on the HL-2A tokamak, a digital neutron flux measuring(DNFM) system based on the peripheral component interconnectio... To achieve wide-range, high-integration, and real-time performance on the neutron flux measurement on the HL-2A tokamak, a digital neutron flux measuring(DNFM) system based on the peripheral component interconnection(PCI) e Xtension for Instrumentation express(PXIe) bus was designed.This system comprises a charge-sensitive preamplifier and a field programmable gate array(FPGA)-based main electronics plug-in. The DNFM totally covers source-range and intermediate-range neutron flux measurements, and increases system integration by a large margin through joining the pulse-counting mode and Campbell mode. Meanwhile, the neutron flux estimation method based on pulse piling proportions is able to choose and switch measuring modes in accordance with current flux, and this ensures the accuracy of measurements when the neutron flux changes suddenly. It has been demonstrated by simulated signals that the DNFM enhances the full-scale measuring range up to 1.9×10^8cm^-2s^-1, with relative error below 6.1%. The DNFM has been verified to provide a high temporal sensitivity at 10 ms time intervals on a single fission chamber on HL-2A. 展开更多
关键词 neutron programmable switch verified electronics suddenly fission proportions accordance discrimination
下载PDF
Monitoring of PON System Using Compound Surveillance Technique
18
作者 Sun-Chien Ko Hsiu-Jung Chuang +2 位作者 Si-Chong Chen Chih-Yih Wang Sheng-Fwu Lin 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期169-173,共5页
A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency swe... A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency sweep are used to investigate any fault in the link. The field test is performed with 4 PONs. Each PON is monitored at 4 ports, one is the splitter port and the other three are arbitrary chosen multiple optical units(ONUs). All the tested PONs are monitored in turns once per hour. Faults at the feeder and branch fiber have been observed in this field test and have been analyzed with the monitoring system. 展开更多
关键词 verified arbitrary monitored splitter branch chosen reflective turns restoration realistic
下载PDF
Training Sequence Design for Coordination on Multiple Point System
19
作者 贾国庆 陈善继 +1 位作者 纪小红 陈超 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期337-340,共4页
Although the Cramer-Rao Bound(CRB) can be used as the benchmark of estimation algorithm performance,it's too complicated for joint training sequence(TS) design for multiple input multiple output(MIMO) orthogonal f... Although the Cramer-Rao Bound(CRB) can be used as the benchmark of estimation algorithm performance,it's too complicated for joint training sequence(TS) design for multiple input multiple output(MIMO) orthogonal frequency division multiplexing(OFDM) coordination on multiple point(CoMP) systems.So a minimum mean square error(MSE) based sub-optimal sequence design criterion was proposed,including ideal sequence correlation property and sequence length constraint.The simulation results verify the theory analysis. 展开更多
关键词 multiplexing benchmark transmit criterion constraint Training Cramer verify fading antenna
下载PDF
Practicality of power load management system in Chongqing City verified
20
《Electricity》 1996年第3期45-45,共1页
Began from early 1992, Chongqing Power Supply Bureau had spent 3 and half years to build up a power load management system consisting of I master station, 6 relay stations, 1280 terminals and the distributed monitorin... Began from early 1992, Chongqing Power Supply Bureau had spent 3 and half years to build up a power load management system consisting of I master station, 6 relay stations, 1280 terminals and the distributed monitoring device. This system distributes in the hilly and mountainous areas where geographically complicated and the load widely scatters, it can supervise about 72% load and curtail more than 15% load 展开更多
关键词 LOAD Practicality of power load management system in Chongqing City verified
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部