期刊文献+
共找到697篇文章
< 1 2 35 >
每页显示 20 50 100
Spatial distribution characteristics of national protected areas in China 被引量:6
1
作者 XU Baicui PAN Jinghu 《Journal of Geographical Sciences》 SCIE CSCD 2019年第12期2047-2068,共22页
This paper investigated spatial structures of 3418 national protected areas(NPAs)grouped into 13 types using GIS and quantitative analysis,including point patterns,Ripley’s K function,hotspot clustering,quadrat analy... This paper investigated spatial structures of 3418 national protected areas(NPAs)grouped into 13 types using GIS and quantitative analysis,including point patterns,Ripley’s K function,hotspot clustering,quadrat analysis,and Gini coefficient.Spatial accessibility was calculated for all NPAs from matrix raster data using cost weighted distance on the Arc GIS platform.The results are as follows:(1)The NNI of NPAs is 0.515,Gini is 0.073,all of which indicates distribution was shown to be a spatially dependent agglomeration,and more balanced in the provinces.The national key parks and the national water conservancy scenic spots had present the strongest aggregation,with NNI of 0.563 and 0.561 respectively,and K index indicates reducing aggregation when distance exceeds 600 km.(2)The national forest parks account for the largest proportion of 22.87% of all NPAs,and the world biosphere reserves the least of 0.77%.The number of NPAs in Shandong with 240 had been the largest one in all the provinces,while Tianjin had the least number including 9 NPAs.(3)There is only one hot spot in the first-class zone,5 in the second-class zones,and 51 in the third-class zones,which indicates NPAs are also aggregated at microscopic scales.(4)The hotspot NPA regions were mainly concentrated in the middle and lower reaches of the Yellow and Yangtze rivers,east of 100°E.High density of NPAs were generally in flat,water-rich,broad-leaved forest dominated plains and low mountain areas,with fertile soil,pleasant weather,long cultural history,and high transportation accessibility.(5)Average NPA accessible time is 60.05 min,with 70.76%regions being within 60 min,and the furthest was 777 min.The distribution of accessibility was positively related to the traffic lines.Interdepartmental protectionism has meant the various departments developed different management systems,standards,and technical specifications. 展开更多
关键词 protected areas SPATIAL structure accessIBILITY NATIONAL PARK system ECOLOGICAL CIVILIZATION
原文传递
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
2
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division 被引量:4
3
作者 Wenyan Liu Xiangyang Luo +3 位作者 Yimin Liu Jianqiang Liu Minghao Liu Yun Q.Shi 《Computers, Materials & Continua》 SCIE EI 2018年第4期71-93,共23页
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(No... Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods. 展开更多
关键词 wi-fi access points indoor localization RSS signal strength relative relationship region division.
在线阅读 下载PDF
A Protective Mechanism for the Access Control System in the Virtual Domain 被引量:1
4
作者 Jinan Shen Deqing Zou +3 位作者 Hai Jin Kai Yang Bin Yuan Weiming Li 《China Communications》 SCIE CSCD 2016年第11期129-142,共14页
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the vip OS,in order to speed up communication between the vip OS and the security domain. The policy enforcement module is retained in the vip OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the vip OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo- 展开更多
关键词 HYPERVISOR VIRTUALIZATION memory protection vip OS access control system
在线阅读 下载PDF
Spatial Pattern and Development of Protected Areas in the North-south Transitional Zone of China 被引量:1
5
作者 LI Xiang MA Beibei +2 位作者 LU Chunxia YANG He SUN Mengyu 《Chinese Geographical Science》 SCIE CSCD 2021年第1期149-166,共18页
The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservatio... The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservation and ecological security of China. The protection and rational development of its natural habitat is of great significance to China’s ecological security and integration of protected areas based on mountain forest ecosystems on a global scale. In this study, five important types of protected areas in the transitional zone were selected, and their spatial patterns were analysed. Spatial analysis methods, such as kernel density estimation and accessibility analysis, were employed for both point and areal data, and focused on four aspects: land use scale, shift in the centre of gravity, spatial agglomeration, and accessibility. In addition, policy background and evolution of spatial and temporal characteristics of the protected area system in the transitional zone from 1963 to 2017 were also examined. We analysed the characteristics and geographical significance of the West-east corridor using the spatial pattern of the protected area system from the perspective of ecological and economic spaces. We focused on spatial shape, type intersection, and key areas to analyse the spatial overlap of the protected areas. Protected area establishment was divided into three stages: initial(1956–1980), rapid development(1981–2013), and national park transformation(2014–present). These stages reflected the change in the concept of ‘simple protection—sustainable use—integration and upgrade’ for protected areas of China. The spatial centre of gravity of the protection zone system was located in the west Qinling-Daba Mountains, and its high-density core exhibited a relatively stable N-shaped structure composed of four gathering areas. Affected by factors such as geographic environment and socio-economic development density, the average access time for protected areas was high(1.56 h);wetland parks and scenic areas are located closer to the city centre. As the West-east corridor in the transitional zone extends from west to east, there is a clear spatial dislocation between the development of protected areas and the intensity of human activities. During development, differentiated goal orientation should be adopted based on the idea of zoning and classified governance. With the advancement of the construction of protected areas, the spatial overlap of protected areas in the transition zone has become more prominent. At present, the spatially overlapped protected areas in the transitional zone remain prominent, with inclusion overlap being the most common, and forest parks exhibiting the highest probability of overlap with other protected areas, we should focus on in the integration process of the corridor-type ecological space based on the mountain forest ecosystem. 展开更多
关键词 North-south Transitional Zone(NSTZ) protected area(PA) spatial-temporal pattern accessIBILITY the West-east corridor spatial overlap
在线阅读 下载PDF
A Robust Wi-Fi Fingerprinting Indoor Localization Coping with Access Point Movement
6
作者 Yuan Liang Xingqun Zhan +1 位作者 Wenhan Yuan Shuai Jing 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第4期31-37,共7页
A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental e... A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental environmental changes,such as AP movement. In order to address this problem,a robust fingerprinting indoor localization method is initiated. In the offline phase,three attributes of Received Signal Strength Indication( RSSI) —average,standard deviation and AP's response rate—are computed to prepare for the subsequent computation. In this way,the underlying location-relevant information can be captured comprehensively. Then in the online phase, a three-step voting scheme-based decision mechanism is demonstrated, detecting and eliminating the part of AP where the signals measured are severely distorted by AP 's movement. In the following localization step,in order to achieve accuracy and efficiency simultaneously,a novel fingerprinting localization algorithm is applied. Bhattacharyya distance is utilized to measure the RSSI distribution distance,thus realizing the optimization of MAximum Overlapping algorithm( MAO). Finally,experimental results are displayed,which demonstrate the effectiveness of our proposed methods in eliminating outliers and attaining relatively higher localization accuracy. 展开更多
关键词 wi-fi fingerprinting INDOOR localization RECEIVED Signal Strength INDICATION (RSSI) access Point MOVEMENT erroneous AP detecting algorithm
在线阅读 下载PDF
Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC
7
作者 Oussama Stiti Othmen Braham Guy Pujolle 《International Journal of Communications, Network and System Sciences》 2014年第6期175-180,共6页
The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the de... The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this context, APs (Access Points) have to become as secure as cellular networks. Furthermore, authentication process between a mobile device and an access point has to be automated, without user constraining configuration. For reaching this purpose, client must have different credentials depending on authentication method. Our goal is to create an architecture that is both ergonomic and flexible in order to meet the need for connection and client mobility. We use NFC technology as a radio channel for starting communication with the network. The communication initiation will instantiate a virtual Wi-Fi AP and distribute all policies and access certificates for an authentication based on EAP-TLS (it could be extended to any EAP method for 802.1X standard). The end result of our new topology is to allow access to services through a virtual Wi-Fi AP with an enterprise-grade in a public hotspot. 展开更多
关键词 wi-fi NFC VIRTUAL access Point PAIRING AUTOMATION
暂未订购
Java类protected继承链访问控制机制研究
8
作者 袁琼 《软件导刊》 2014年第11期51-52,共2页
基于从C++语言到Java语言类封装特性的演变,从类和类的继承两个方面讨论了Java打包类的4层访问控制特性,特别剖析、提出并用例程论证了Java类Protected继承链访问控制机制,研究结果为目前关于Java类封装机制的认识提供了补充。
关键词 JAVA 封装 访问控制
在线阅读 下载PDF
瑞安华数Wi-Fi降频接入网络MoCA Access1.1+改造升级方案
9
作者 陈朝智 曾步权 +1 位作者 唐啸谷 田玉江 《有线电视技术》 2017年第1期44-46,共3页
本文介绍了瑞安华数公司用Mo CA Access 1.1+(头端吞吐率800Mbps)升级原有Wi-Fi降频接入网络,为用户提供20Mbps^50Mbps带宽,解决原有网络的问题。
关键词 wi-fi降频 EOC MOCA access1.1+
在线阅读 下载PDF
Access数据库加密系统的安全性及其保护措施 被引量:2
10
作者 南亦民 张舞杰 《电脑知识与技术》 2007年第3期1206-1207,共2页
ACCESS数据库结构简。单、功能比较齐全、使用维护方便,因此,在功能能够满足要求的条件下,往往成为一些小型数据库软件的首选。但是由于数据库的加密机制非常简单,很容易破解数据库密码,安全性差。本文在分析了MSAccess数据库的加... ACCESS数据库结构简。单、功能比较齐全、使用维护方便,因此,在功能能够满足要求的条件下,往往成为一些小型数据库软件的首选。但是由于数据库的加密机制非常简单,很容易破解数据库密码,安全性差。本文在分析了MSAccess数据库的加密原理以及现有破解方法的基础上,给出了简便易行的保护措施。并且,用VB给出了切实可行的实现方案。应用表明,该保护措施能有效地提高数据库的安全性。 展开更多
关键词 access数据库 加密 破解 保护
在线阅读 下载PDF
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption 被引量:8
11
作者 Tao Feng Hongmei Pei +2 位作者 Rong Ma Youliang Tian Xiaoqin Feng 《Computers, Materials & Continua》 SCIE EI 2021年第1期871-884,共14页
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char... Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model. 展开更多
关键词 Blockchain privacy protection attribute encryption access control searchable-encryption
在线阅读 下载PDF
Novel Private Data Access Control Scheme Suitable for Mobile Edge Computing 被引量:2
12
作者 Wei Liang Songyou Xie +3 位作者 Jiahong Cai Chong Wang Yujie Hong Xiaoyan Kui 《China Communications》 SCIE CSCD 2021年第11期92-103,共12页
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e... Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes. 展开更多
关键词 mobile edge computing(MEC) privacy protection access control anonymous authentication
在线阅读 下载PDF
Hardware/Compiler Memory Protection in Sensor Nodes
13
作者 Lanfranco LOPRIORE 《International Journal of Communications, Network and System Sciences》 2008年第3期235-240,共6页
With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the mic... With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode. 展开更多
关键词 access Control protectION DOMAIN protectION System Sensor NODE
暂未订购
Access Control Policy Based on Friend Circle
14
作者 Qin Liu Tinghuai Ma +3 位作者 Fan Xing Yuan Tian Abdullah Al-Dhelaan Mohammed Al-Dhelaan 《Computers, Materials & Continua》 SCIE EI 2020年第3期1143-1159,共17页
Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more complex.It is difficult to find a su... Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more complex.It is difficult to find a suitable way to manage them automatically.In order to solve this problem,we propose an access control model for social network to protect the privacy of the central users,which achieves the access control accurately and automatically.Based on the hybrid friend circle detection algorithm,we consider the aspects of direct judgment,indirect trust judgment and malicious users,a set of multi-angle control method which could be adapted to the social network environment is proposed.Finally,we propose the solution to the possible conflict of rights in the right control,and assign the rights reasonably in the case of guaranteeing the privacy of the users. 展开更多
关键词 Social network privacy protection circle of friends access control
在线阅读 下载PDF
Inverted XML Access Control Model Based on Ontology Semantic Dependency
15
作者 Meijuan Wang Jian Wang +1 位作者 Lihong Guo Lein Harn 《Computers, Materials & Continua》 SCIE EI 2018年第6期465-482,共18页
In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic ass... In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic association.The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information.Considering the semantic association,reasonable security access for privacy protect is required.Semi-structured and self-descriptive XML(eXtensible Markup Language)has become a common form of data organization for database management in big data environments.Based on the semantic integration nature of XML data,this paper proposes a data access control model for individual users.Through the semantic dependency between data and the integration process from bottom to top,the global visual range of inverted XML structure is realized.Experimental results show that the model effectively protects the privacy and has high access efficiency. 展开更多
关键词 Privacy protection access control semantic dependence inverted XML global view
在线阅读 下载PDF
Reference Encryption for Access Right Segregation and Domain Representation
16
作者 Lanfranco Lopriore 《Journal of Information Security》 2012年第2期86-90,共5页
With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solu... With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key. 展开更多
关键词 access RIGHT DOMAIN protection Symmetric-Key CRYPTOGRAPHY
暂未订购
Morphological Characterization of Mango (Mangifera indica) Accessions Based on Brazilian Adapted Descriptors
17
作者 Ierla Carla Nunes dos Santos Ribeirol Carlos Antonio Femandes Santos Francisco Pinheiro Lima Neto 《Journal of Agricultural Science and Technology(B)》 2013年第11期798-806,共9页
The aim of this study was to characterize 103 mango accessions of the field germplasm collection of Embrapa semi-arid region, located in Juazeiro, Bahia, Brazil and to apply 50 morphological descriptors established by... The aim of this study was to characterize 103 mango accessions of the field germplasm collection of Embrapa semi-arid region, located in Juazeiro, Bahia, Brazil and to apply 50 morphological descriptors established by the Brazilian Ministry of Agriculture, livestock and supply to help in the development of new mango cultivars for the Northeastern region of Brazil. Four trees were selected for each accession and eight adult leaves, eight flowers and 16 fruits were collected from each tree. Morphological characteristics ranging from plant size to seed embryo were evaluated. Simple percentages were estimated for all the descriptors. Only the descriptors for leaf symmetry and fruit waxiness did not show variability among the accessions. Eight accessions did not show fruits with fibers, while nine other accessions presented flesh firmness, which is an important characteristic to improve breeding. The soluble solids content was high, above 14 ~Brix for 95% of the accessions with Tommy Atkins showing the lowest value, 12.5 ~Brix. A great diversity was found in the color of the epidermis ranging from green to red. The accessions Amrapali and Salitre presented a dark orange flesh color. The obtained data set, are the most comprehensive so far in Brazil, it allows choosing the best parents to develop new cultivars and will also contribute to the protection of mango cultivars in Brazil. 展开更多
关键词 MANGO germplasm bank accessIONS morphological descriptors the international union for the protection of newvarieties of plants (UPOV).
在线阅读 下载PDF
Private Sector Ombudsman and Strengthening Consumers' Access to Justice: The Experience From Yogyakarta
18
作者 Johanes Widijantoro 《Sociology Study》 2012年第8期569-590,共22页
After the monetary and political crisis of 1997 and 1998, Indonesia has been viewed by some observers as having entered into a transitional phase from authoritarian rule by a strong state toward a new democratic syste... After the monetary and political crisis of 1997 and 1998, Indonesia has been viewed by some observers as having entered into a transitional phase from authoritarian rule by a strong state toward a new democratic system of government in which civil societies will play a more prominent role. Democratization process is also accompanied by the rise of a strong civil society, which would together result in more efficient and transparent governments at local levels. This article aims to show the dynamic of democratization process in Indonesia, in which civil societies such as business actors, NGOs (non-government organizations), journalists, scientists, business associations, consumer organizations, etc., play a more apparent role. Focused on the establishment of Private Sector Ombudsman (Lembaga Ombudsman Swasta--LOS) and also its role and responsibility, the author examines how LOS has become an alternative option for consumers to strengthen access to justice. In the last three years, LOS has succeeded in handling more than 200 cases and some of them have been the hottest issues. On the one hand, the emergence of LOS shows that civil society in Yogyakarta has played a significant role in implementing business ethics and good governance principles, and on the other hand, LOS has been proven to be the answer for consumers' needs in which consumers' complaints settled quickly, informal, and free of charge. 展开更多
关键词 Private Sector Ombudsman (Lembaga Ombudsman Swasta--LOS) consumer protection access to justice
在线阅读 下载PDF
基于大数据的继电保护运维管理系统的设计与实现 被引量:6
19
作者 戴志辉 耿宏贤 +3 位作者 刘媛 吴道钰 刘悦 杨鑫 《电测与仪表》 北大核心 2025年第1期80-88,共9页
在双碳背景下,促进清洁能源消纳与碳减排已成为电网发展的重要目标。提出了一种优化方法,考虑可再生能源不确定性与系统功率储备进行系统调度。在预测误差分析的基础上,提出了一种基于负荷损失概率的评估方法,以确定系统运行储备功率。... 在双碳背景下,促进清洁能源消纳与碳减排已成为电网发展的重要目标。提出了一种优化方法,考虑可再生能源不确定性与系统功率储备进行系统调度。在预测误差分析的基础上,提出了一种基于负荷损失概率的评估方法,以确定系统运行储备功率。将系统运营成本和二氧化碳排放量建模为优化目标。优化过程包括两个阶段,在第一阶段优化中利用混合整数线性规划方法进行确定性优化,生成具有规定功率储备要求的发电机组组合。在第二阶段优化中考虑预测不确定性,对运行计划进行调整,使用可控发电机来处理预测偏差。将不同方法下可用运行储备功率、成本和二氧化碳排放量在仿真中进行了对比。与传统大数据技术及智能电网的发展为继电保护系统历史数据进行深层次挖掘提供了支撑,以此为基础研究了基于大数据的继电保护运维管理系统。文章针对基于大数据的继电保护运维管理系统进行设计,详细阐述了系统架构、数据库设计、系统功能模块、系统实现。系统在原始数据预处理的基础上进行数据可视化,从统计分析和动态分析两个角度对保护设备进行评估,实现了设备失效数据的统计计算、设备缺陷关联性分析、运行水平评估以及设备状态检修功能。系统实现了继电保护设备运维全流程管理,最终服务于继电保护检修工作,能够为运行人员状态检修提供参考,对于减小维修的盲目性、提高检修工作效率具有参考价值。 展开更多
关键词 继电保护 access数据库 关联规则 可靠度函数 状态检修
在线阅读 下载PDF
基于区块链的可信分布式工业数据治理方案 被引量:6
20
作者 黄荣 杨文琴 宋志刚 《浙江大学学报(工学版)》 北大核心 2025年第2期269-277,共9页
针对当前工业系统缺乏统一的产品数据共享服务,限制了用户获取可信的产品追溯信息的问题,基于区块链设计可信分布式工业数据治理方案,实现高效、安全的产品数据共享与治理.产品数据生成者将数据提交到区块链系统之前,在离链状态下对产... 针对当前工业系统缺乏统一的产品数据共享服务,限制了用户获取可信的产品追溯信息的问题,基于区块链设计可信分布式工业数据治理方案,实现高效、安全的产品数据共享与治理.产品数据生成者将数据提交到区块链系统之前,在离链状态下对产品数据进行压缩和加密.为了在离链过程中使产品数据可用,系统通过2种类型的区块链交易(生成者交易和数据交易)支持离链/链上数据访问.提供混合访问控制机制用于加密产品数据,将秘密密钥仅提供给经过授权的数据用户.该方案能够有效地保护产品数据的隐私性,提供细粒度的访问控制,能够对产品数据生成的全流程进行溯源.系统性能的测试结果表明,在secp256k1椭圆曲线上(提供128 bit安全性),密钥生成阶段的计算和通信开销不高于81.592 ms和2.83 kB,数据提交阶段不高于50.251 ms和3.59 kB,数据更新时间不超过251.596 ms,数据读取时间不高于311.104 ms.与同类方案的性能比较结果证实了该方案的高效性. 展开更多
关键词 区块链 数据可信治理 隐私保护 细粒度访问控制 全流程溯源
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部