期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Active dynamic pre-protection mechanism for MPLS-TP network 被引量:1
1
作者 白晖峰 Ji Yuefeng 《High Technology Letters》 EI CAS 2011年第4期354-359,共6页
The active-fault-alarm (AFA) technologies and the dynamic protection mechanism of the optical network controlled by the multi-protocol label switching transport profile (MPLS-TP) are both studied in this article. ... The active-fault-alarm (AFA) technologies and the dynamic protection mechanism of the optical network controlled by the multi-protocol label switching transport profile (MPLS-TP) are both studied in this article. On this basis, an active dynamic pre-protection (ADPP) mechanism is proposed. This active dynamic pre-protection mechanism is allowed to establish a so called temporary protection path (TPP) for the work path before a potential fault occurs and to switch to TPP only after the fault occurs. It keeps the TPP flexibly only when it is in low- quality or fault state to realize dynamic protection even better and to achieve better resource utilization. Simulation results show that the proposed new mechanism has better performance in terms of the flexibility and the efficiency from the perspective of time. 展开更多
关键词 multiple protocol label switching transport profile (MPLS-TP) active-fault-alarm (AFA) network protection
在线阅读 下载PDF
Autonomous Optimal Coordination Scheme in Protection System of Power Distribution Network by Using Multi-Agent Concept 被引量:1
2
作者 LEE Seung-Jae KIM Tae-Wan LEE Gi-Young 《Transactions of Tianjin University》 EI CAS 2008年第2期106-111,共6页
A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ab... A protection system using a multi-agent concept for power distribution networks is proposed.Every digital over current relay(OCR)is developed as an agent by adding its own intelligence,self-tuning and communication ability.The main advantage of the multi-agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent.In order to cope with frequent changes in the network operation condition and faults,an OCR agent,proposed in this paper,is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents.Through this kind of coordination and information exchanges,not only a local but also a global protective scheme is completed.Simulations in a simple distribution network show the effectiveness of the proposed protection system. 展开更多
关键词 multi-agent system over current relay(OCR) communication protection of distribution network
在线阅读 下载PDF
Analysis of Network Security Protection System of Water Conservancy Informatization
3
作者 XUChao 《外文科技期刊数据库(文摘版)工程技术》 2022年第6期015-018,共4页
Water conservancy project is the key to Chinas national economic development and maintain social stability, and has played a huge role in water resources utilization, flood control and waterlogging prevention, ecologi... Water conservancy project is the key to Chinas national economic development and maintain social stability, and has played a huge role in water resources utilization, flood control and waterlogging prevention, ecological environment protection and disaster prevention and reduction. This paper analyzes the water conservancy information network security protection system, analyzes the concept of water conservancy information network security protection system and the value of water conservancy information network security protection system construction background, and put forward the effective measures of water conservancy information network security protection system construction, provide reference for improving the information management level of water conservancy project. 展开更多
关键词 water conservancy information technology network security protection system
原文传递
Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network
4
作者 WU Qi-wu CHEN Hao +1 位作者 JIANG Ling-zhi ZHOU Yang 《Optoelectronics Letters》 EI 2020年第6期455-461,共7页
Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. ... Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges. 展开更多
关键词 SERVICE Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network DOMAIN
原文传递
Preliminary Analysis of the Protection of Privacy in the Information Network Age
5
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the protection of Privacy in the Information network Age
原文传递
Applying systematic conservation planning to constitute a protection strategy for broad-leaved Korean pine forests in Changbai Mountains, China 被引量:5
6
作者 MA Lin SUN Gong-qi +1 位作者 QU Yi LI Jun-qing 《Journal of Mountain Science》 SCIE CSCD 2016年第3期493-507,共15页
The broad-leaved Korean pine(Pinus koraiensis) forest is one of the most biodiverse zonal communities in the North Temperate Zone and an important habitat for many endangered species.Broad-leaved Korean pine forests(B... The broad-leaved Korean pine(Pinus koraiensis) forest is one of the most biodiverse zonal communities in the North Temperate Zone and an important habitat for many endangered species.Broad-leaved Korean pine forests(BKPFs) are shrinking quickly due to deforestation and rapid urbanization. Thus, scientific protection strategies are urgently needed to change this status. Changbai Mountains contains one of the largest BKPFs and is considered a priority biodiversity conservation area in China. Guided by systematic conservation planning(SCP) methods and procedures, we chose representative species and communities in BKPFs ecosystem as priority conservation objects, and set quantitative conservation target, which is in the light of the biodiversity characteristic of BKPFs. The watershed area is used as planning unit. We used CPlan software to calculate the irreplaceability(Ir)value of each planning unit and the contribution value(Ti) of each conservation object to(1) assess the conservation efficiency;(2) identify the conservation gap of the existing conservation network. Then wecalculated a human disturbance index(HDI) for planning units in the conservation gaps and combine this with the Ir value to design three conservation scenarios to optimize the conservation network.Results show that planning units with high conservation value 14.16% of the total area, with3084.36 km2 were covered by the existing conservation network. 79.28% of planning units with high conservation value have not been protected which were concentrated mainly in the eight gap areas.Only 25.3% of protection objects achieved their conservation target with the existing conservation network. Conservation efficiency is low. Three conservation scenarios are constituted, each prioritizing a different aim:(1) ecological value;(2)species rescue; and(3) economical avoidance. The three conservation schemes potentially enable 93%,88% and 51% of conservation objects, respectively, to achieve identified conservation targets, thereby improving conservation efficiency significantly. 展开更多
关键词 Korean Pine Changbai Mountain Systematic conservation planning Conservation network protection strategy Conservation efficiency
原文传递
Simulation Studies of an Integrated Overcurrent Relay Protection Scheme for Distribution Systems 被引量:2
7
作者 Z.Q. Bo X.Z. Dong +1 位作者 B.H. Zhang J.H. He 《Journal of Energy and Power Engineering》 2011年第1期55-62,共8页
This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a sp... This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a specially designed protection relay is installed at each substation of a network and responsible for the protection of every line sections connected to the substation busbar The conventional directional overcurrent and the new adaptive accelerated protection algorithms with multiple settings are implemented into the relay to cover all the protected line sections. The paper includes studies of a typical multi section distribution network to demonstrate the principle of the scheme. Studies show that the new scheme not only offer the new protection features for individual power line section, but also provide the characteristics of integrated protection. 展开更多
关键词 Overcurrent protection integrated protection centralized protection network protection digital substation powersystem simulation.
在线阅读 下载PDF
Dynamic Capacity Allocation in OTN Networks 被引量:1
8
作者 Maria Catarina Taful Joao Pires 《Communications and Network》 2015年第1期43-54,共12页
A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the ... A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources. Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS) are two techniques that when properly combined can be used to provide improved dynamism in OTN networks. These techniques have been previously standardized in the context of Next Generation SDH/SONET networks. VCAT is used to tailor the capacity of network connections according to service requirements, while LCAS can adjust dynamically that capacity in a hitless manner. This paper presents an overview of the application of VCAT/LCAS techniques in the context of OTN. It explains in detail how these techniques can be employed to resize the connection capacity and analyses its use in network protection solutions. Furthermore, a detailed analysis of the time delays associated with different operations is provided and its application to some reference networks is undertaken. The obtained results provide an idea about the time delays of the capacity adjustment processes and define potential scenarios for implementing VCAT/LCAS techniques. 展开更多
关键词 OTN VCAT LCAS Time Delay network protection
暂未订购
Broad-based Network for Protecting the Rights and Interests of Women and Children——A story about the Women's Federation of Qinhuangdao City
9
作者 OUR STAFF REPORTER 《The Journal of Human Rights》 2010年第6期28-30,共3页
The room is in utter chaos, with chairs piling up in a comer and the cable TV not connected to the power source. But one thing is put in place: a slogan on the wall "Creating an outstanding WFQ team for the benefit ... The room is in utter chaos, with chairs piling up in a comer and the cable TV not connected to the power source. But one thing is put in place: a slogan on the wall "Creating an outstanding WFQ team for the benefit of all women and children." 展开更多
关键词 WFQ A story about the Women’s Federation of Qinhuangdao City Broad-based network for Protecting the Rights and Interests of Women and Children
原文传递
ICT贸易依赖网络结构的演化特征及影响因素研究 被引量:1
10
作者 何佳佳 李庭辉 《统计研究》 北大核心 2025年第5期62-76,共15页
信息通信技术(ICT)产业是关乎国家未来发展的战略性产业,但近年来全球ICT产业发展受到贸易保护主义的严重影响。本文构建了1996-2022年间全球126个经济体的ICT贸易依赖网络,探讨其演化特征及影响因素,其中包括两次关于贸易保护主义冲击... 信息通信技术(ICT)产业是关乎国家未来发展的战略性产业,但近年来全球ICT产业发展受到贸易保护主义的严重影响。本文构建了1996-2022年间全球126个经济体的ICT贸易依赖网络,探讨其演化特征及影响因素,其中包括两次关于贸易保护主义冲击的关键事件,即2008年国际金融危机和2018年中美贸易摩擦。研究发现:ICT贸易依赖网络呈现“核心–外围”结构和“小世界”特性,中国和美国是关键枢纽,中美之间合作与冲突并存;不同时期ICT贸易依赖网络存在结构性变化,贸易保护主义冲击降低了网络连通性和互惠性,增强了地理区域化特征。2018年以后,中美ICT贸易依赖关系逐渐减弱,与区域贸易协定(RTA)合作伙伴的联系增强;ICT贸易依赖网络关联关系的形成同时受到内生和外生机制的影响,经济发展程度、人力资本水平、RTA签订及RTA数字化程度对ICT贸易依赖关系具有显著正向作用。特别是在摩擦冲突加剧期,人力资本水平更高和签订数字化程度更深的RTA条款能更有效地维护依赖关系。本文研究表明,提高人力资本水平和积极倡导基于规则的多边数字贸易体系是抵御逆全球化风险的有效策略。 展开更多
关键词 ICT 贸易依赖 社会网络分析 贸易保护主义
在线阅读 下载PDF
跨文化与跨民族市场营销的人类学思考 被引量:7
11
作者 田广 邵欢 《河北经贸大学学报(综合版)》 2014年第2期5-10,共6页
在经济全球一体化发展的态势下,如何更加有效地从跨文化和跨民族的需要出发,开展国际营销活动,对世界各国各民族的经营管理人员而言,是一个更富挑战性的任务。人类学的理论认为人们的一切行为都受约于其文化价值体系的刚性结构,跨文化... 在经济全球一体化发展的态势下,如何更加有效地从跨文化和跨民族的需要出发,开展国际营销活动,对世界各国各民族的经营管理人员而言,是一个更富挑战性的任务。人类学的理论认为人们的一切行为都受约于其文化价值体系的刚性结构,跨文化跨民族营销是当代人类经济社会行为的一个重要领域,因此也是人类学研究的一个重要领域。从不同的角度讨论人类学对跨文化跨民族营销的诠释,探讨跨文化跨民族营销与传统营销的差异性,并对增进营销人员的跨文化跨民族经营能力提出具体建议具有非常重要的意义。 展开更多
关键词 跨文化 跨民族 文化权利 国际营销 人类学 网络营销 语言 文化贸易保护主义
在线阅读 下载PDF
技术扩散和贸易保护主义下的多期供应链网络均衡 被引量:4
12
作者 吴海翔 徐兵 《中国管理科学》 CSSCI CSCD 北大核心 2024年第2期324-334,共11页
国际技术扩散是提高一国技术创新能力的重要途径。然而,当前国际贸易保护主义重新抬头,企业通过国际贸易获得技术扩散的效应日益减弱。此时,一国如何制定应对策略以提升本国的技术水平并获得经济和社会的长久发展,是各国特别是发展中国... 国际技术扩散是提高一国技术创新能力的重要途径。然而,当前国际贸易保护主义重新抬头,企业通过国际贸易获得技术扩散的效应日益减弱。此时,一国如何制定应对策略以提升本国的技术水平并获得经济和社会的长久发展,是各国特别是发展中国家面临的紧迫问题。文章利用纳什均衡、变分不等式和Lagrange对偶理论建立多期国际供应链网络均衡模型,分析提高关税和限制技术扩散对技术进步、供应链成员利益和社会整体的经济和环境效益的影响。结果表明:两国企业成本对称且两国采取限制技术扩散对等措施之下,加大关税增长的幅度将扩大本土产品的生产和消费,消费者剩余增加,但企业利润和社会福利减少,产品技术水平降低。适当的技术补贴对消费者、企业和整个社会都有益,有利于技术水平的提高。限制技术扩散对消费者、企业和社会整体都不利,也不利于技术水平的提高。由此得出,经济实力和科技水平相当的国家或地区应加强自由贸易区的建设,以实现自由贸易和技术合作带来的互利共赢。 展开更多
关键词 国际供应链网络 关税 贸易保护主义 技术投资 变分不等式
原文传递
美国“再工业化”战略研究:措施、难点、成效及影响 被引量:11
13
作者 林珏 《西部论坛》 2014年第1期76-85,共10页
美国"再工业化"战略是在国内传统工业衰落、产业空洞化、对外贸易严重逆差以及经济衰退背景下提出的,目的不是要步回传统的工业化时代,而是开展对制造业材料、工艺、技术、动力能源、管理、服务形式、生产模式的一场创新活动... 美国"再工业化"战略是在国内传统工业衰落、产业空洞化、对外贸易严重逆差以及经济衰退背景下提出的,目的不是要步回传统的工业化时代,而是开展对制造业材料、工艺、技术、动力能源、管理、服务形式、生产模式的一场创新活动,是对产业链中高附加值环节的再造,预示着一场由美国主导的新的产业革命的开始。重振制造业是美国"再工业化"战略的核心;尽管面临经费投入多、结构性成本高、就业难度大、地区发展不平衡、就业人口老龄化以及工程师不足等困难,通过立法重振制造业、建立制造创新中心和产学研相结合的技术创新体制、改革教育与培训体制、加强知识产权与贸易保护等措施,"再工业化"已经对美国制造业的振兴、就业状况等带来一定的影响。美国利用国内页岩气革命带来的能源低廉优势,通过技术创新推动制造业朝着智能化方向发展,将使中国等新兴经济体的制造业对美国制造业的成本竞争优势被削弱,技术差距拉大。为此,中国必须重视这场由美国主导的新一轮产业革命动向,借鉴其研发、投资经验与模式,推动技术研发与创新,提升制造业整体技术水平,实现产业结构的高新化。 展开更多
关键词 “再工业化”战略 重振制造业 先进制造业 技术创新网络 制造创新中心 新贸易保护主义 制造业价值链 产业革命 传统工业 新兴工业
在线阅读 下载PDF
Resource Flows of Villages with Contrasting Lifestyles in Nanda Devi Biosphere Reserve, Central Himalaya, India
14
作者 K. S. Rao S. Nautiyal +1 位作者 R. K. Maikhuri K. G. Saxena 《Journal of Mountain Science》 SCIE CSCD 2005年第4期271-293,共23页
Resource use efficiency analyses of village ecosystem are necessary for effective and efficient planning of resource utilization. This paper deals with economic and energy input-output analyses of different components... Resource use efficiency analyses of village ecosystem are necessary for effective and efficient planning of resource utilization. This paper deals with economic and energy input-output analyses of different components of village ecosystem in representative buffer zone villages, which are practicing transhumance and settled way of lifestyles in Nanda Devi Biosphere Reserve (NDBR) of Garhwal Himalaya. While the villages practicing transhumance used various natural resources spatially segregated,the villages practicing settled way of lifestyle have to manage resources from a limited spatial area through rotation and varied extraction intensities. Forests subsidized the production activity in both type of villages and the per capita resource extractions were found to be greater in tran^humance village than settled village. Though crops provided maximum energy, in terms of economic criteria, animal husbandry played important role in both settled and transhumance villages. As villages representing both the situations showed different ways of adjustments to the conservation oriented land use changes, management authority needs to address the eco-development plans fulfilling the aspirations of all people traditionally using the resources of the Reserve to reduce the conflicts and encourage their participation in the conservation of the area. 展开更多
关键词 HIMALAYA resource flow natural resource management protected area network sustainable development TRANSHUMANCE village ecosystem
在线阅读 下载PDF
Robust Deep Image Watermarking:A Survey
15
作者 Yuanjing Luo Xichen Tan Zhiping Cai 《Computers, Materials & Continua》 SCIE EI 2024年第10期133-160,共28页
In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of d... In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of deep learning,watermarking has seen significant advancements.Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces,resilient to various attacks.These methods,characterized by a streamlined encoder-decoder architecture,have shown enhanced performance through the incorporation of novel training modules.This article offers an in-depth analysis of deep watermarking’s core technologies,current status,and prospective trajectories,evaluating recent scholarly contributions across diverse frameworks.It concludes with an overview of the technical hurdles and prospects,providing essential insights for ongoing and future research endeavors in digital image watermarking. 展开更多
关键词 Deep image watermarking multimedia security data protection deep neural network
在线阅读 下载PDF
Delay Time Measurement and Comparison of Protection Strategies with One-Link Failed Domestic Optical Fiber Networks in Taiwan
16
作者 Shyh-Lin Tsao Lan-Chih Yang 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期-,共2页
In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy an... In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time. 展开更多
关键词 link work it as in Delay Time Measurement and Comparison of protection Strategies with One-Link Failed Domestic Optical Fiber networks in Taiwan of
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部