期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Thermal comfort in offices:comfort values and optimization of indoor control variables
1
作者 徐巍 陈祥光 +1 位作者 赵军 胡鹤 《Journal of Beijing Institute of Technology》 EI CAS 2011年第1期123-128,共6页
In order to search for reasonable air conditioned indoor control variables and save energy consumption and meet to need of personal thermal comfort, a method which is based on numerical simulation is employed to optim... In order to search for reasonable air conditioned indoor control variables and save energy consumption and meet to need of personal thermal comfort, a method which is based on numerical simulation is employed to optimize indoor control variables. Computational fluid dynamics (CFD) is used to describe thermal state of office. An optimal method is proposed in this paper, dual neural network model is firstly used to acquire reliable information, data from CFD model are pre pro cessed, and the remaining data are used to train artificial neural networks (ANN), then CFD model is replaced by ANN model to reduce computational cost when is optimized, indoor control variables are optimized by genetic algorithm. Simulation results show that indoor thermal comfort is improved obviously, and the energy cost is decreased accordingly. 展开更多
关键词 computational fluid dynamics (CFD) neural network genetic algorithm predictedmean vote (PMV)
下载PDF
Topology-assisted deterministic packet marking for IP traceback 被引量:3
2
作者 WANG Xiao-jing WANG Xiao-yin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期116-121,共6页
A novel deterministic packet marking (DPM) for IP traceback against denial of service (DOS) and distributed denial of service (DDoS) attacks is presented, which features good scalability and high accuracy. In th... A novel deterministic packet marking (DPM) for IP traceback against denial of service (DOS) and distributed denial of service (DDoS) attacks is presented, which features good scalability and high accuracy. In this scheme, an ingress router pre-calculates a Hash of its IP address and splits the Hash into several fragments. When marking a packet, the router randomly selects a fragment to mark into the packet. In the traceback stage the victim identifies the marked router with the help of the map of its upstream routers. Based on the map, the victim can identify a candidate ingress router after receiving only several marked packets. The scheme overcomes defects in previous deterministic packet marking schemes, where too much packets are required to recover a router and high false positive rate occurs in case of large-scale DDoS. Theoretical analysis, the pseudo code and experimental results are provided. The scheme is proved to be accurate and efficient and can handle large-scale DDoS attacks. 展开更多
关键词 network security DDOS 1P traceback deterministic packet marking (DPM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部