期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
小电流接地系统故障计算实用程序
1
作者 王乡 陈永琳 《吉林电力》 1992年第1期22-24,共3页
本文所介绍的程序是用FORTRAN—77高级语言编写的,适用于TBM—PC系列微型机的电力系统故障计算程序。该程序利用补偿原理对操作线路进行了处理,无需重新形成节点导纳矩阵,节省了内存和机时。对于两点异相接地故障,程序采用了复杂故障计... 本文所介绍的程序是用FORTRAN—77高级语言编写的,适用于TBM—PC系列微型机的电力系统故障计算程序。该程序利用补偿原理对操作线路进行了处理,无需重新形成节点导纳矩阵,节省了内存和机时。对于两点异相接地故障,程序采用了复杂故障计算方法。程序具有功能强、使用灵活方便、计算速度快等特点,已在沈阳地区电网中使用,为继电保护的分析和整定提供了可靠的依据。 展开更多
关键词 小电流接地系统 接地故障 节点导纳矩阵 电力系统故障 程序利用 计算程序 零序 复杂故障计算 FORTRAN 最大运行方式
下载PDF
“我的晚会”——I-Worm/Myparty网络蠕虫程序的清除
2
作者 怜花 《电脑采购》 2002年第6期28-28,共1页
北京江民新科技术有限公司的计算机病毒反应小组最近捕获新的网络蠕虫I-Worm/Myparty(我的晚会)。该网络蠕虫程序和其他的网络蠕虫一样,是通过搜索Outlook Express的地址薄中的地址来发送自身的,不过该网络蠕虫程序利用的是其自身的发... 北京江民新科技术有限公司的计算机病毒反应小组最近捕获新的网络蠕虫I-Worm/Myparty(我的晚会)。该网络蠕虫程序和其他的网络蠕虫一样,是通过搜索Outlook Express的地址薄中的地址来发送自身的,不过该网络蠕虫程序利用的是其自身的发送服务器(SMTP),而并不需要受感染用户安装了特定的EMAL发送程序,包括OE、Foxmail Netscape等。 展开更多
关键词 蠕虫程序 I-Worm/Myparty FOXMAIL 程序利用 SMTP NETSCAPE Outlook 蟠虫 江民 查杀
下载PDF
实用简单的PATH编辑工具
3
作者 臧峥嵘 《电脑编程技巧与维护》 1994年第3期12-27,共2页
DOS为了能使用户在任意目录下都可执行程序,提供了一个PATH环境变量,当在命令行下执行程序时,如果当前目录下没有该程序,DOS就到PATH环境变量定义的目录中去寻找,直到找到并执行该程序或所有目录都已找遍为止。对于常用程序的目录可在AU... DOS为了能使用户在任意目录下都可执行程序,提供了一个PATH环境变量,当在命令行下执行程序时,如果当前目录下没有该程序,DOS就到PATH环境变量定义的目录中去寻找,直到找到并执行该程序或所有目录都已找遍为止。对于常用程序的目录可在AUTOEXEC.BAT程序中预先设置,但有时为了某些目的。 展开更多
关键词 编辑工具 PATH 当前目录 可执行程序 环境变量 命令行 变量定义 程序调用 程序利用 配置文件
下载PDF
向系统服务要安全要效率
4
作者 晨曦 《个人电脑》 2017年第7期89-92,共4页
版本越高的Windows系统,其自带的功能也就越多,可是,在平时工作过程中,大部分功能我们都用不到,这些无效功能的开启运行,将会浪费大量的系统资源,严重时能造成计算机系统工作效率下降。有鉴于此,我们应该有选择性地停用某些系统服务,... 版本越高的Windows系统,其自带的功能也就越多,可是,在平时工作过程中,大部分功能我们都用不到,这些无效功能的开启运行,将会浪费大量的系统资源,严重时能造成计算机系统工作效率下降。有鉴于此,我们应该有选择性地停用某些系统服务,不让它们白白耗费系统资源,从而达到提升工作效率的目的。 展开更多
关键词 系统工作效率 工作过程 运行对话框 快捷菜单 木马程序 标签页 程序利用 计算机实现 查杀 管理员权限
下载PDF
Energy Efficient Power Allocation for Relay-Aided D2D Communications in 5G Networks 被引量:13
5
作者 Ru Wang Jia Liu +2 位作者 Guopeng Zhang Shuanghong Huang Ming Yuan 《China Communications》 SCIE CSCD 2017年第6期54-64,共11页
As one of the key technologies for the fifth generation(5G) wireless networks,device-to-device(D2D) communications allow user equipment(UE) in close proximity to communicate with each other directly.Forwarded by a rel... As one of the key technologies for the fifth generation(5G) wireless networks,device-to-device(D2D) communications allow user equipment(UE) in close proximity to communicate with each other directly.Forwarded by a relay,the relay-aided D2D(RA-D2D) communications can not only be applied to communications in much longer distance but also achieve a high quality of service(Qo S) .In this paper,we first propose a two-layer system model allowing RA-D2 D links to underlay traditional cellular uplinks.Then we maximize the energy efficiency of the RA-D2 D link while satisfying the minimum data-rate of the cellular link.The optimal transmit power at both D2 D transmitter and D2 D relay sides is obtained by transforming the nonlinear fractional programming into a nonlinear parameter programming.Simulation results show that our proposed power allocation method is more energy efficient than the existing works,and the proposed RA-D2 D scheme outperformed direct D2 D scheme when the distance between two D2 D users is longer. 展开更多
关键词 D2D communication relay-aided underlay green communication energy efficiency power allocation
下载PDF
Application of coal mine roof rating in Chinese coal mines 被引量:4
6
作者 Wang Yongyin Taheri Abbas Xu Xianbi 《International Journal of Mining Science and Technology》 EI CSCD 2018年第3期491-497,共7页
The coal mine roof rating(CMRR) is a measure of roof quality or structure competency for bedded roof types typically of underground coal mines. The CMRR has been used widely in the US, South Africa,Canada and Australi... The coal mine roof rating(CMRR) is a measure of roof quality or structure competency for bedded roof types typically of underground coal mines. The CMRR has been used widely in the US, South Africa,Canada and Australia. In order to investigate the application of the CMRR system in Chinese coal mines,two coal mines in China located in Panjiang Coal Field in Guizhou Province were investigated. Field data were collected which is required to calculate the CMRR value based on underground exposure. The CMRR values of 11 locations in two coal mines were calculated. The investigations demonstrated that the chance of mine roof failure is very low if the CMRR value is more than 50, given adequate support is installed in mine. It was found that the CMRR guideline are useful to preliminarily investigate stability in Panjiang Coal Field mines. 展开更多
关键词 Coal mine roof rating Underground mine Roof stability Panjiang coal field
下载PDF
Big Data Research in Italy: A Perspective 被引量:1
7
作者 Sonia Bergamaschi Emanuele Carlini +9 位作者 Michelangelo Ceci Barbara Furletti Fosca Giannotti Donato Malerba Mario Mezzanzanica Anna Monreale Gabriella Pasi Dino Pedreschi Raffele Perego Salvatore Ruggieri 《Engineering》 SCIE EI 2016年第2期163-170,共8页
The aim of this article is to synthetically describe the research projects that a selection of Italian univer- sities is undertaking in the context of big data. Far from being exhaustive, this article has the objectiv... The aim of this article is to synthetically describe the research projects that a selection of Italian univer- sities is undertaking in the context of big data. Far from being exhaustive, this article has the objective of offering a sample of distinct applications that address the issue of managing huge amounts of data in Italy, collected in relation to diverse domains. 展开更多
关键词 Big data Smart cities EnergyJob offersPrivacy
下载PDF
Transport Layer Optimization for Cloud Computing Applications via Satellite: TCP Noordwijk+ 被引量:1
8
作者 M. Luglio C. Roseti F. Zampognaro 《China Communications》 SCIE CSCD 2014年第12期105-119,共15页
Cloud computing can significantly improve efficiency in Internet utilization and data management.Several cloud applications(file sharing,backup,data up/download etc.) imply transfers of large amount of data without re... Cloud computing can significantly improve efficiency in Internet utilization and data management.Several cloud applications(file sharing,backup,data up/download etc.) imply transfers of large amount of data without real-time requirements.In several use-cases cloud-computing solutions reduce operational costs and guarantee target QoS.These solutions become critical when satellite systems are utilized,since resources are limited,network latency is huge and bandwidth costs are high.Using satellite capacity for cloud-computing bulk traffic,keeping acceptable performance of interactive applications,is very important and can limit the connectivity costs.This goal can be achieved installing in the Set Top Box(STB) a proxy agent,to differentiate traffic and assign bandwidth according to priority,leaving spare capacity to bulk cloud computing traffic.This aim is typically reached using a specific QoS architecture,adding functional blocks at network or lower layers.We propose to manage such a process at transport layer only.The endpoint proxy implements a new transport protocol called TCP Noordwijk+,introducing a flow control differentiation capability.The proxy includes TPCN+ which efficiently transfers low-priority bulk data and handles interactive data,keeping a high degree of friendliness.The outcomes of Ns-2simulations confirm applicability and good performance of the proposed solution. 展开更多
关键词 TCP-Noordwijk+ cloud computing DVB-RCS satellite QoS Ns-2 bulk data
下载PDF
A Master-Slave Blockchain Paradigm and Application in Digital Rights Management 被引量:5
9
作者 Zhaofeng Ma Weihua Huang +2 位作者 Wei Bi Hongmin Gao Zhen Wang 《China Communications》 SCIE CSCD 2018年第8期174-188,共15页
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ... Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications. 展开更多
关键词 master-slave blockchain proof ofequivalent work proof of contribution pervasive computing DRM application
下载PDF
Analysis of Big Data's Impact on Social Consumption Values
10
作者 Ming Gao Chengwei Wen 《Journal of Philosophy Study》 2018年第4期178-182,共5页
1Since the middle of last century, the world has entered consumer society. Decided by consumerism, hedonic consumption has got popular. Hedonic consumption makes people be personalized during consumption and brings a ... 1Since the middle of last century, the world has entered consumer society. Decided by consumerism, hedonic consumption has got popular. Hedonic consumption makes people be personalized during consumption and brings a high degree of prosperity in consumption. But at the same time, for the materialization logic in consumerism, people has been enslaved by substance and involved in the vicious circle about unlimited demand for substance, which brought a series of problems in consumption. Nowadays, sharing consumption is rapidly developing, which leads to the change of consumption values. The application of big data in the consumer area, through bringing "big data sense" and solving information barrier, is one of the most important reasons to cause the change. This change can help to establish a fair consumption environment and harmonious consumption relations, which will make the economic development faster and better 展开更多
关键词 big data sharing consumption controlling consumption consumption fairness consumption relation
下载PDF
Understanding taxi driver's cruising behavior with ZIP model 被引量:1
11
作者 宗芳 《Journal of Central South University》 SCIE EI CAS 2014年第8期3404-3410,共7页
The taxi drivers' cruising pattern was learned using GPS trajectory data collected in Shenzhen,China.By employing zero-inflated Poisson model,the impacts of land use and previous pick-up experience on cruising dec... The taxi drivers' cruising pattern was learned using GPS trajectory data collected in Shenzhen,China.By employing zero-inflated Poisson model,the impacts of land use and previous pick-up experience on cruising decision were measured.The cruising strategies of different types of drivers as well as the top one driver were examined.The results indicate that both land use and previous pick-up experience affect travel behavior with the former's influence(7.07×10-4 measured by one of the coefficients in zero-inflated Poisson model) being greater than the latter's(4.58×10-5) in general,but the comparison also varies across the types of drivers.Besides,taxi drivers' day-to-day learning feature is also proved by the results.According to comparison of the cruising behavior of the most efficient and inefficient driver,an efficient cruising strategy was proposed,that is,obeying the distribution of land use in choice of cruising area,while learning from pick-up experience in selection of detailed cruising location.By learning taxi drivers' cruising pattern,the development of measures of regulating travel behaviors is facilitated,important factor for traffic organization and planning is identified,and an efficient cruising strategy for taxi drivers is provided. 展开更多
关键词 taxi driver GPS CRUISE land use objective information subjective information
下载PDF
Drivers of Change, Threats and Barriers to the Conservation of Biodiversity in Traditional Agricultural Systems
12
作者 R. T. Ngidlo 《Journal of Agricultural Science and Technology(B)》 2011年第5期675-684,共10页
People and nature are working in tandem to reduce the integrity of traditional agricultural systems. The paper highlighted the drivers of change acting on traditional agricultural landscapes including the threats and ... People and nature are working in tandem to reduce the integrity of traditional agricultural systems. The paper highlighted the drivers of change acting on traditional agricultural landscapes including the threats and barriers hindering biodiversity conservation. The drivers of change are: modem agriculture, tourism, education and outmigration and climate change. The threats are encroachment and land-use change, pollution, replacement of traditional varieties and erosion of indigenous knowledge systems and practices. The barriers to biodiversity conservation include the incapacity of farmers to respond to pressures affecting their traditional farming systems, absence of methodologies for integrating traditional and modem knowledge in biodiversity conservation and the multi-functionality of traditional agriculture not fully captured by the market. The conservation framework to guide stakeholders for in-situ management of biodiversity includes niche market development, revenue generation and cultural restoration. The study made use of data collected during the series of workshops conducted in 2005-2007 covering the Ifugao Rice Terraces of the Philippines. Secondary data from other traditional agricultural systems were integrated to enrich the discussion and write-up of this paper. 展开更多
关键词 Traditional agricultural systems biodiversity conservation drivers of change
下载PDF
Algorithmic Procedure to Design Water Utilization Systems Featuring Multiple Contaminants in Process Plants
13
作者 王东明 杨凤林 张兴文 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2005年第3期396-402,共7页
This paper introduces a non-iterative algorithmic procedure to design water utilization networks with multiple contaminants in process plants. According to the water pinch analysis rules, the processes in water utiliz... This paper introduces a non-iterative algorithmic procedure to design water utilization networks with multiple contaminants in process plants. According to the water pinch analysis rules, the processes in water utilization systems were first divided into three groups, then water-supply priority algorithm was proposed. The results of case studies showed that the water networks designed by this method gave water consumption lower than that estimated by other approaches. In addition, the procedure was subject to no limitation on the problem scale. 展开更多
关键词 water pinch technology priority of water supply water utilization networks wastewater minimization
下载PDF
"Principal Components" for the Calculation of the Best Estimate Liability of Future Discretionary Benefits under Solvency II
14
作者 Luca Bianchi 《Journal of Mathematics and System Science》 2013年第6期271-278,共8页
The core of the presentation that I propose treats about the application of principal component analysis for the estimation of the future earnings of the Segregated Funds. The Segregated Funds are the pools of assets ... The core of the presentation that I propose treats about the application of principal component analysis for the estimation of the future earnings of the Segregated Funds. The Segregated Funds are the pools of assets which have been using in the Italian Insurance Market since mid 80's for managing the "with profit" business, also known as business with "discretionary participation feature" according to IFRS4 since the income attributable to the policyholders is composed by the net realised gains less a fee and by a minimum guarantee, if any. The discretion of the Management of the Entity lays on the decision on whether and when to realise both the financial gains and the financial losses of the underlying investments. This strategy is tied by the need to manage an appropriate ALM, from the rules included in the local legislation as well as by the policy about the solvency margin (for example a minimum solvency ratio to fulfil that is conditional upon the value of income attributed that year). The fee can not be changed, i.e., is not discretionary, the minimum granted could be fixed on annual basis-sometimes paid on cash recurrently-or could be promised only at expiration or sometimes promised at expiration or in advance only for death and disability. In case of years so adverse that the Entity is not able to avoid earnings too low, sometimes the entity delivers an additional bonus, in order to compensate their policyholders, which is based above a full discretion. Principal components are used in finance as well as in other fields such as genetic. You can see some of these applications in two of the references advised below. The purposes of the technique of principal components are (1) to increase objectivity of results and their verifiability by third parties such as auditors, (2) make speeder the time spent for the analytical calculations (i.e., runs of the actuarial models) and (3) to render the relationship between the asset composition and the their earnings effectively used for the best estimate liabilities through their contribution in forecasting future cash flows. 展开更多
关键词 Liabilities in solvency II future discretionary benefits principal components.
下载PDF
Black Pine Afforestations in Abruzzo (Central Italy): Perspectives and Management
15
作者 Roberto Mercurio Bartolomeo Schirone 《Journal of Environmental Science and Engineering(A)》 2015年第9期494-500,共7页
In Italy, the hydro-geological protection of the Apennine territories is a well-known issue. For this reason, at the end of the 19th century, a new reforestation technique was proposed by the Inspector of Forest Servi... In Italy, the hydro-geological protection of the Apennine territories is a well-known issue. For this reason, at the end of the 19th century, a new reforestation technique was proposed by the Inspector of Forest Service, Pietro Montanari to cope with difficult soil conditions of the mountain areas. This new approach was the first application of the so-called "gradoni" (small terraces) method of soil preparation. Each "gradone" was 100-120 cm wide and made with a slight counter slope (ca 10-15 degrees) to promote the accumulation of water and organic matter. Along each "gradone", bare root black pine seedlings (Pinus nigra Am.) were planted at a distance of 1 m from each other with a density of more than 3,000/ha. Nowadays, 19,158 hectares of black pine forests are growing in the Apennine of the Abruzzi region, largely resulting from those reforestation projects realized since the beginning of the 20th century. A case study of Monte Plaia (42°00′ 12″ N 13°53′39″ E), that illustrates the situation after 70-110 years in consequence of lacking of silvicultural treatment and the application of aforest restoration method is presented. 展开更多
关键词 Black pine afforestation forest restoration Italy.
下载PDF
Learning taxis' cruising patterns with Ripley's K function
16
作者 宗芳 张慧永 LI Hai-fan 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第9期3677-3682,共6页
Taxi drivers' cruising patterns are learnt with GPS trajectory data collected in Shenzhen, China. By employing Ripley's K function, the impacts of land use and pick-up experience on taxis' cruising behavio... Taxi drivers' cruising patterns are learnt with GPS trajectory data collected in Shenzhen, China. By employing Ripley's K function, the impacts of land use and pick-up experience on taxis' cruising behavior are investigated concerning about both intensity of influence and radius of influence. The results indicate that, in general, taxi drivers tend to learn more from land use characteristics than from pick-up experience. The optimal radius of influence of land use points and previous pick-up points is 14.18 km and 9.93 km, respectively. The findings also show that the high-earning drivers or thorough drivers pay more attention to land use characteristics and tend to cruise in high-density area, while the low-earning drivers or focus drivers prefer to learn more from previous pick-up experience and select the area which is far away from the high-density area. These findings facilitate the development of measures of managing taxi's travel behavior by providing useful insights into taxis' cruising patterns. The results also provide useful advice for taxi drivers to make efficient cruising decision, which will contribute to the improvement of cruising efficiency and the reduction of negative effects. 展开更多
关键词 TAXI cruising patterns land use pick-up points
下载PDF
An Utilitarianist Reading of Criminal Law
17
作者 Joao Paulo Orsini Martinelli 《Sociology Study》 2014年第4期348-359,共12页
Utilitarianism is the branch of philosophy that studies the usefulness of an idea. Among the possible gains and losses, the balance must be positive to reach the intended utility. Criminal law is the most repressive b... Utilitarianism is the branch of philosophy that studies the usefulness of an idea. Among the possible gains and losses, the balance must be positive to reach the intended utility. Criminal law is the most repressive branch of legal system and therefore should be applied sparingly by the state. Its usefulness should be the protection of legal interests and minimal restriction of personal liberty. The lawmaker should seek the best way to achieve this utility with the choice of the most relevant legal interests and less repressive means before appealing to the criminal law. The legal interests protected by criminal law must be the most important ones for a social life in harmony and prohibited behaviors must be injurious or dangerous to those legal interests. The Rule of Law does not authorize criminal prohibitions without a minimum limit that allows citizens to behave according to their wishes, provided that does not harm the interests of other people. This is the calculation that legislator, judge, and interpreter should seek: more protection and less restriction to citizens. 展开更多
关键词 UTILITARIANISM legal interests personal liberty PROPORTIONALITY
下载PDF
Strategic Prospective Methodology to Explore Sustainable Futures
18
作者 Guillermo Gaindara Fierro 《Journal of Modern Accounting and Auditing》 2015年第11期606-614,共9页
This paper shows prospective methodology as a tool to generate strategic knowledge for designing sustainable futures. The strategic prospective is a social science discipline dedicated to explore the future. Based on ... This paper shows prospective methodology as a tool to generate strategic knowledge for designing sustainable futures. The strategic prospective is a social science discipline dedicated to explore the future. Based on qualitative methods with participative experts and stakeholders, the strategic prospective allows designing different future scenarios and planning the transformation of a current situation into a desired future. To design sustainable futures, this paper proposes a four-stage methodology: understanding the context; strategy visualization; design of alternative scenarios and definition of desired future; and planning its construction. This methodology makes evident the possibility of seeking alternative scenarios for a sustainable future in different scopes, particularly, in two prospective applications: biodiversity conservation and water treatment. The outcomes of the application have allowed proposing strategies and policies for the management of environmental goods, such as environmental services and water reuse, with a long-time outlook based on a collective desired future. 展开更多
关键词 future studies scenario methodology strategic prospective future scenarios FUTURE
下载PDF
潜能无极限
19
作者 三面鱼 《才智》 2005年第3期20-20,共1页
每一个人的生命都潜藏着许多连自己也不知道的能量,这种能量叫做潜能。潜能日夜地工作,以一种不为人知的程序利用了无穷的智慧力量,把一个人的欲望转化成了物质等同物。如果不去尝试,这些能量永远也没有机会大放异彩。只要我们勇敢地向... 每一个人的生命都潜藏着许多连自己也不知道的能量,这种能量叫做潜能。潜能日夜地工作,以一种不为人知的程序利用了无穷的智慧力量,把一个人的欲望转化成了物质等同物。如果不去尝试,这些能量永远也没有机会大放异彩。只要我们勇敢地向前走一步,那些像火山一样炙热的才情就会喷薄而出。意大利画家达·芬奇做学徒的时候,才华深潜未露。当时,他的老师是个很有名望的画家,年老多病, 展开更多
关键词 人的生命 喷薄而出 智慧力量 深潜 程序利用 囊袋
原文传递
基于.NET的数据缓冲池模块设计与实现
20
作者 张婷婷 卢晓春 《信息与电脑(理论版)》 2013年第6期65-66,共2页
本程序利用.NET平台、框架、多线程、委托和泛型技术,采用面向对象方法,实现通用的数据缓冲池模块设计,该模块提供数据分发、统计处理,支持用户自定义计算方法和数据类型。该模块不仅具有常规数据读写和流量统计功能,还具有在系统底层... 本程序利用.NET平台、框架、多线程、委托和泛型技术,采用面向对象方法,实现通用的数据缓冲池模块设计,该模块提供数据分发、统计处理,支持用户自定义计算方法和数据类型。该模块不仅具有常规数据读写和流量统计功能,还具有在系统底层特性上的控制技术。为采用.NET平台进行系统开发的工程人员提供了方便高效的模块化组件工具。 展开更多
关键词 缓冲池 NET 模块功能 数据缓存 泛型技术 面向对象方法 多线程 程序利用 用户自定义 流量统计
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部