期刊文献+
共找到7,318篇文章
< 1 2 250 >
每页显示 20 50 100
Multimedia Engineering Database Management Systems
1
作者 梁允荣 郭贵锁 +3 位作者 宋瀚涛 冯希 高春雷 郭胜 《Journal of Beijing Institute of Technology》 EI CAS 1996年第1期68-73,共6页
In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide... In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency. 展开更多
关键词 database management systems multimedia technology engineering CAD
下载PDF
A Web-Based Approach for the Efficient Management of Massive Multi-source 3D Models
2
作者 ZHAO Qiansheng TANG Ruibing +1 位作者 PENG Mingjun GUO Mingwu 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第3期24-41,共18页
Effectively managing extensive,multi-source,and multi-level real-scene 3D models for responsive retrieval scheduling and rapid visualization in the Web environment is a significant challenge in the current development... Effectively managing extensive,multi-source,and multi-level real-scene 3D models for responsive retrieval scheduling and rapid visualization in the Web environment is a significant challenge in the current development of real-scene 3D applications in China.In this paper,we address this challenge by reorganizing spatial and temporal information into a 3D geospatial grid.It introduces the Global 3D Geocoding System(G_(3)DGS),leveraging neighborhood similarity and uniqueness for efficient storage,retrieval,updating,and scheduling of these models.A combination of G_(3)DGS and non-relational databases is implemented,enhancing data storage scalability and flexibility.Additionally,a model detail management scheduling strategy(TLOD)based on G_(3)DGS and an importance factor T is designed.Compared with mainstream commercial and open-source platforms,this method significantly enhances the loadable capacity of massive multi-source real-scene 3D models in the Web environment by 33%,improves browsing efficiency by 48%,and accelerates invocation speed by 40%. 展开更多
关键词 massive multi-source real-scene 3D model non-relational database global 3D geocoding system importance factor massive model management
下载PDF
Fortifying the Digital Bastion: Pioneering Cybersecurity with Dynamic Secrets Management and CMDB Fusion in the Enterprise
3
作者 Gyani Pillala 《Journal of Information Security》 2024年第4期411-418,共8页
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus... In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity. 展开更多
关键词 Dynamic Secrets management Logical Environments Configuration management database (CMDB) Secrets Orchestration M2M (Machine to Machine) Authentication/Authorization Developer Productivity
下载PDF
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
4
作者 Smith Patel Vijay K. Madisetti 《Journal of Information Security》 2024年第4期474-493,共20页
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac... In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates. 展开更多
关键词 Phishing Attacks Password management Phishing Detection AI BERT Algorithm real-time Protection CYBERSECURITY URL Authentication
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
5
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience real-time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Spatial Database Management System of China Geological Survey Extent 被引量:4
6
作者 ChenJianguo ChenZhijun +1 位作者 WangQuanming FangYiping 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期250-256,共7页
The spatial database management system of China geological survey extent is a social service system. Its aim is to help the government and the whole social public to expediently use the spatial database, such as query... The spatial database management system of China geological survey extent is a social service system. Its aim is to help the government and the whole social public to expediently use the spatial database, such as querying, indexing, mapping and product outputting. The management system has been developed based on MAPGIS6.x SDK and Visual C++, considering the spatial database contents and structure and the requirements of users. This paper introduces the software structure, the data flow chart and some key techniques of software development. 展开更多
关键词 management system geological survey extent spatial database MAPGIS
下载PDF
An Efficient Crash Recovery Technique for Real-Time Main Memory Database 被引量:3
7
作者 XIAOYing-yuan LIUYun-sheng LIAOGuo-qiong LIANGPing 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期61-64,共4页
This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on t... This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on transaction types. Similarly, a main memory database isdivided into four partitions based data types. When the using ratio of log store area exceeds thethreshold value, checkpoint procedure is triggered. During executing checkpoint procedure, someuseless log records are deleted. During restart recovery after a crash, partition reloading policyis adopted to assure that critical data are reloaded and restored in advance, so that the databasesystem can be brought up before the entire database is reloaded into main memory. Therefore downtime is obvionsly reduced. Simulation experiments show our recovery scheme obviously improves thesystem performance, and does a favor to meet the dtadlints of real-time transactions. 展开更多
关键词 real-time main memory database crash recovery log scheme
下载PDF
GIS Database Template for Environmental Management of Mining in Indonesia 被引量:3
8
作者 Sri Maryati Hideki Shimada +3 位作者 Takashi Sasaoka Akihiro Hamanaka Kikuo Matsui Hideaki Nagawa 《Journal of Geographic Information System》 2012年第1期62-70,共9页
Mining sector in Indonesia faces many challenges including needed to support national economy, compliance to central and local government regulations, local community empowerment and environmental impact management. M... Mining sector in Indonesia faces many challenges including needed to support national economy, compliance to central and local government regulations, local community empowerment and environmental impact management. Mining companies are mandatory to perform the environmental management efforts to minimize the negative impact to the environment and pursue sustainability of post-mining land use and as much as possible to restore land to the initial conditions. There are many challenges on management multi parameter and multi temporal spatial data of environmental management. The aim of this research is to design the GIS database template for environmental management in Indonesia’s mining operation. This GIS database is designed using ArcCatalog ArcGIS 9.3 software, through following steps: inventory and assessment government regulations, inventory and assessment environmental quality standards, sorting and grouping parameters, design feature class and attribute, create GIS database, create GIS database dictionary. According to research result, GIS database template has many advantages for environmental management include integrated into a single database, avoid redundancy data, reduce volume data, uniformity data, easy to find and track data, integrated spatial and attribute data, can be used as an input for GIS analysis for decision-making and development strategies. 展开更多
关键词 GIS SPATIAL database MINING ENVIRONMENTAL management
下载PDF
Design and validation of real-time dynamic spectrum management in OFDM-based HNPLC systems 被引量:2
9
作者 刘雯静 Guo Jingbo +1 位作者 Yan Yanxin Zhang Tongfei 《High Technology Letters》 EI CAS 2015年第4期379-387,共9页
Time-varying frequency selective attenuation and colored noises are unfavorable characteristics of power line communication(PLC) channels of the low voltage networks.To overcome these disadvantages,a novel real-time d... Time-varying frequency selective attenuation and colored noises are unfavorable characteristics of power line communication(PLC) channels of the low voltage networks.To overcome these disadvantages,a novel real-time dynamic spectrum management(DSM) algorithm in orthogonal frequency division multiplexing(OFDM)-based high-speed narrow-band power line communication(HNPLC) systems is proposed,and the corresponding FPGA circuit is designed and realized.Performance of the proposed DSM is validated with a large amount of network experiments under practical PLC circumstance.As the noise in each narrow subcarrier is approximately Gaussian,the proposed DSM adopts the BER/SER expression formulized via the AWGN channel to provide a handy and universal strategy for power allocation.The real-time requirement is guaranteed by choosing subcarriers in group and employing the same modulation scheme within each transmission.These measures are suitable for any modulation scheme no matter the system criterion is to maximize data rate or minimize power/BER.Algorithm design and hardware implementation of the proposed DSM are given with some flexible and efficient conversions.The DSM circuit is carried out with Xilinx KC705.Simulation and practical experiments validate that the proposed real-time DSM significantly improves system performance. 展开更多
关键词 real-time dynamic spectrum management high-speed narrowband power line com-munication (HNPLC) subcarrier grouping rate adaptive MULTI-CARRIER
下载PDF
Scheduling transactions in mobile distributed real-time database systems 被引量:1
10
作者 雷向东 赵跃龙 +1 位作者 陈松乔 袁晓莉 《Journal of Central South University of Technology》 EI 2008年第4期545-551,共7页
A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environment... A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environments. At the mobile hosts, all transactions perform local pre-validation. The local pre-validation process is carried out against the committed transactions at the server in the last broadcast cycle. Transactions that survive in local pre-validation must be submitted to the server for local final validation. The new protocol eliminates conflicts between mobile read-only and mobile update transactions, and resolves data conflicts flexibly by using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking, and respond time of mobile read-only transactions is greatly shortened. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. In global validation mobile distributed transactions have to do check to ensure distributed serializability in all participants. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols in terms of miss rate, restart rate, commit rate. Under high work load (think time is ls) the miss rate of DMVOCC-MVDA is only 14.6%, is significantly lower than that of other protocols. The restart rate of DMVOCC-MVDA is only 32.3%, showing that DMVOCC-MVDA can effectively reduce the restart rate of mobile transactions. And the commit rate of DMVOCC-MVDA is up to 61.2%, which is obviously higher than that of other protocols. 展开更多
关键词 mobile distributed real-time database systems muliversion optimistic concurrency control multiversion dynamic adjustment pre-validation multiversion data broadcast
下载PDF
A Domain Engineering Approach to Increase Productivity in the Development of a Service for Changes Notification of the Configuration Management Database 被引量:1
11
作者 Jose Ramon Coz Fernandez Ruben Heradio-Gil +1 位作者 David Fernandez-Amoros Jose Antonio Cerrada-Somolinos 《Journal of Software Engineering and Applications》 2013年第4期207-220,共14页
This paper presents a domain engineering approach to build a software product line that supports the change notification service in a Configuration Management Database (CMDB) according to the Information Technology In... This paper presents a domain engineering approach to build a software product line that supports the change notification service in a Configuration Management Database (CMDB) according to the Information Technology Infrastructure Library (ITIL) best practices. For the development of this product line, the proposed approach makes use of a construction of products methodology by analogy: this is a new notation which reports the variability of the products, obtaining metrics as important as the number of products and uses a language that enables, by means of the flexibilization of a product and the development of some generators, to build the rest of the product line. In addition the paper offers a standard for the analysis and design of the CMDB as well. Finally, the paper presents an economic model for the product line, where the profitability and productivity of the proposed solution are analyzed. 展开更多
关键词 ITIL CMDB databaseS Change management CONFIGURATION management Domain Engineering Software Product Lines
下载PDF
Validation concurrency control protocol in parallel real-time database systems 被引量:3
12
作者 LEI Xiang-dong(雷向东) YUAN Xiao-li(袁晓莉) 《Journal of Central South University of Technology》 2002年第3期197-201,共5页
In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can e... In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold. 展开更多
关键词 PARALLEL database system real-time database CONCURRENCY control VALIDATION TRANSACTIONS
下载PDF
A dynamic crash recovery scheme for distributed real-time database systems
13
作者 肖迎元 刘云生 +2 位作者 刘小峰 廖国琼 王洪亚 《Journal of Shanghai University(English Edition)》 CAS 2006年第6期510-516,共7页
Recovery performance in the event of failures is very important for distributed real-time database systems. This paper presents a time-cognizant logging-based crash recovery scheme (TCLCRS) that aims at distributed ... Recovery performance in the event of failures is very important for distributed real-time database systems. This paper presents a time-cognizant logging-based crash recovery scheme (TCLCRS) that aims at distributed real-time databases, which adopts a main memory database as its ground support. In our scheme, each site maintains a real-time log for local transactions and the subtransactions, which execute at the site, and execte local checkpointing independently. Log records are stored in non-volatile high- speed store, which is divided into four different partitions based on transaction classes. During restart recovery after a site crash, partitioned crash recovery strategy is adopted to ensure that the site can be brought up before the entire local secondary database is reloaded in main memory. The partitioned crash recovery strategy not only guarantees the internal consistency to be recovered, but also guarantee the temporal consistency and recovery of the sates of physical world influenced by uncommitted transactions. Combined with two- phase commit protocol, TCLCRS can guarantee failure atomicity of distributed real-time transactions. 展开更多
关键词 distributed real-time database system partitioned real-time logging partitioned crash recovery.
下载PDF
REAL-TIME LICENSING MANAGEMENT OF SECURE MULTIMEDIA CONTENT DELIVE RY
14
作者 马兆丰 冯博琴 《Journal of Pharmaceutical Analysis》 SCIE CAS 2004年第2期110-113,118,共5页
Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violat... Media Commerce is now becoming a new trend which results fr om faster development of network bandwidth and high availability of multimedia t echnologies, how to protect media content from being used in a right-violated w ay is one of most important issues to take into account. In this paper, a novel and efficient authorization and authentication Digital Rights Management (DRM) s chema is proposed firstly for secure multimedia delivery, then based on the sche ma, a real-time digital signature algorithm built on Elliptic Curve Cryptograph y (ECC) is adopted for fast authentication and verification of licensing managem ent, thus secure multimedia delivery via TCP/RTP can efficiently work with real -time transaction response and high Quality of Service (QoS) . Performance eval uations manifest the proposed schema is secure, available for real-time media s tream authentication and authorization without much effected of QoS. The propose d schema is not only available for Client/Server media service but can be easily extended to P2P and broadcasting network for trusted rights management. 展开更多
关键词 digital rights management multimedia delivery real-time licensing management elliptic curve cryptography
下载PDF
A Proposal for a Geospatial Database to Support Emergency Management
15
作者 Ivan Frigerio Stefano Roverato Mattia De Amicis 《Journal of Geographic Information System》 2013年第4期396-403,共8页
The basic procedure of the Italian Civil Protection Department aims at reducing disaster losses by giving prominence to a proactive strategy, focusing on prevision and prevention of hazard events rather than postdisat... The basic procedure of the Italian Civil Protection Department aims at reducing disaster losses by giving prominence to a proactive strategy, focusing on prevision and prevention of hazard events rather than postdisater activities. Italian law commits municipalities to produce Emergency Plans that include risk scenarios as well as all data required for emergency management, such as structures, infrastructures and human resources. However the law in the matter of Civil Protection does not supply information about how to produce and archive necessary data for emergency planning and management. For this reason, we propose a standard methodology to create a geodatabase using GIS software, to collect all data that could be used by municipalities to create Emergency Plans. The resulting geodatabase provides a tool for hazard mitigation planning, allowing not only the identification of areas at risk, but also the structures, infrastructures and resources needed to overcome a crisis, thus improving all strategies of risk reduction and the resilience of the system [1]. 展开更多
关键词 EMERGENCY management GEOSPATIAL database CIVIL Protection EMERGENCY PLANNING
下载PDF
An OWL-Based Specification of Database Management Systems
16
作者 Sabin C.Buraga Daniel Amariei Octavian Dospinescu 《Computers, Materials & Continua》 SCIE EI 2022年第3期5537-5550,共14页
In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptual... In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks.Also,it can be used to improve the decision-making process for determining/selecting the appropriate DBMS,subject to specific requirements.The proposed model describes the most important features and aspects regarding the DBMS domain,including the support for various paradigms(relational,graph-based,key-value,tree-like,etc.),query languages,platforms(servers),plus running environments(desktop,Web,cloud),specific contexts—i.e.,focusing on optimizing queries,redundancy,security,performance,schema vs.schema-less approaches,programming languages/paradigms,and others.The process of populating the ontology with significant individuals(actual DBMSs)benefits from the existing knowledge exposed by free and open machine-processable knowledge bases,by using structured data fromWikipedia and related sources.The pragmatic use of our ontology is demonstrated by two educational software solutions based on current practices in Web application development,proving support for learning and experimenting key features of the actual semantic Web technologies and tools.This approach is also an example of using multiple knowledge from database systems,semanticWeb technologies,and software engineering areas. 展开更多
关键词 database management systems knowledge model web engineering
下载PDF
Quasi Serializable Concurrency Control in Distributed Real-Time Database Systems
17
作者 党德鹏 Liu Yunsheng 《High Technology Letters》 EI CAS 2003年第1期72-76,共5页
This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, thro... This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved. 展开更多
关键词 distributed real-time database systems relaxing serializability real-tirne concurrency control
下载PDF
A New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance
18
作者 Rizik M. H. Al-Sayyed Fawaz A. Al Zaghoul +2 位作者 Dima Suleiman Mariam Itriq Ismail Hababeh 《Journal of Software Engineering and Applications》 2014年第11期891-905,共15页
The efficiency and performance of Distributed Database Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the... The efficiency and performance of Distributed Database Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the major design issues of the DDBMS. In this paper, we propose new approach that integrates both fragmentation and data allocation in one strategy based on high performance clustering technique and transaction processing cost functions. This new approach achieves efficiently and effectively the objectives of data fragmentation, data allocation and network sites clustering. The approach splits the data relations into pair-wise disjoint fragments and determine whether each fragment has to be allocated or not in the network sites, where allocation benefit outweighs the cost depending on high performance clustering technique. To show the performance of the proposed approach, we performed experimental studies on real database application at different networks connectivity. The obtained results proved to achieve minimum total data transaction costs between different sites, reduced the amount of redundant data to be accessed between these sites and improved the overall DDBMS performance. 展开更多
关键词 Distributed database management System FRAGMENTATION ALLOCATION CLUSTERING Network SITES
下载PDF
Congestion Management Strategies of Real-Time Market
19
作者 Qi Wang Chunyu Zhang Yi Ding 《Journal of Power and Energy Engineering》 2014年第4期227-232,共6页
The high penetration of distributed energy resources (DERs) will significantly challenge the power system operation and control due to their stochastic, intermittent, and fluctuation characteristics. This enhances the... The high penetration of distributed energy resources (DERs) will significantly challenge the power system operation and control due to their stochastic, intermittent, and fluctuation characteristics. This enhances the difficulty of congestion management of power systems in cross-border electricity market among different regions. For handling this, the Real-Time Market is proposed for balancing capacity trading against congestions. Several strategies for Real-Time Market dealing with congestions are proposed. The strategy of two-stage crossborder markets in Day-ahead, Intra-day and Real Time Market are introduced with the congestion constraints complied. Pre-Contingency strategy is proposed as the advance preparation for the future congestion, and In-Day redispatch is used for regulation. Accordingly, the requirements on facilities considering telemetry and remote control in a fast manner are discussed at last. 展开更多
关键词 CONGESTION management ELECTRICITY MARKET real-time MARKET DISTRIBUTED Energy Resources(DERs)
下载PDF
Database Management System Construction for the Evaluation Results of Intensive Land Use in the Development Areas of Hunan Province 被引量:1
20
作者 Mingliang LIU 《Asian Agricultural Research》 2013年第12期54-58,共5页
Using spatial data integration and database technology,analyzing and integrating the assessment results in all the development zones at different time in Hunan Province,the paper is intended to construct the database ... Using spatial data integration and database technology,analyzing and integrating the assessment results in all the development zones at different time in Hunan Province,the paper is intended to construct the database and managerial system for the assessment results of land use intensity in development zones,thus formulating"one map"of Hunan Development zones and realizing the integrated management and application of the assessment results in all the development zones at any time of Hunan above the provincial level.It has been proved that the system has good application effect and promising development in land management for land management departments and development zones. 展开更多
关键词 SPATIAL DATA INTEGRATION EVALUATION of INTENSIVE l
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部