期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
AlexNet网络的井下钻杆打钻动作识别 被引量:2
1
作者 宗占强 《电子世界》 CAS 2021年第17期118-120,共3页
由于目前煤矿井下钻杆计数效率低下且极易出错,因此本文提出一种基于AlexNet网络煤矿井下钻杆打钻动作识别的方法。本文对原AlexNet网络的拓扑结构和参数进行修改、调整,并通过MATLAB进行仿真实验对比,最终确定其最优的拓扑结构和参数... 由于目前煤矿井下钻杆计数效率低下且极易出错,因此本文提出一种基于AlexNet网络煤矿井下钻杆打钻动作识别的方法。本文对原AlexNet网络的拓扑结构和参数进行修改、调整,并通过MATLAB进行仿真实验对比,最终确定其最优的拓扑结构和参数。通过实验发现,神经网络深度为2层,卷积核个数为16,卷积核大小为5*5,步长为2,激活函数为Relu,学习率为0.001,最大学习整个数据集的次数为5,调整后的AlexNet网络模型分类检测平均准确率可达99.37%。 展开更多
关键词 网络拓扑结构 激活函数 动作识别 神经网络 平均准确率 卷积核大小 分类检测 钻杆计数
下载PDF
大中型军工企业逻辑网络设计要点
2
作者 张拓 《电讯工程》 2022年第1期37-42,共6页
网络开发过程描述了开发网络时必须完成基本任务,它是网络系统生命周期的一次迭代过程。现实中,网络开发过程通常按照5个阶段进行实施:(1)需求规范;(2)通信规范;(3)逻辑网络设计;(4)物理网络设计;(5)实施阶段。其中逻辑设计阶段主要完... 网络开发过程描述了开发网络时必须完成基本任务,它是网络系统生命周期的一次迭代过程。现实中,网络开发过程通常按照5个阶段进行实施:(1)需求规范;(2)通信规范;(3)逻辑网络设计;(4)物理网络设计;(5)实施阶段。其中逻辑设计阶段主要完成网络的拓扑结构、网络地址分配、设备命令规则、交换及路由协议选择、安全规划、网络管理等设计工作,并根据这些设计选择设备和服务供应商。 展开更多
关键词 逻辑网络设计 系统生命周期 网络管理 安全规划 网络拓扑结构 逻辑设计 服务供应商 需求规范
下载PDF
对一种电路网络函数综合的探讨
3
作者 桂明辉 《桂林师范高等专科学校学报》 1995年第2期85-89,共5页
关键词 函数综合 电路网络 变压器 网络拓扑结构 网络电路 导纳函数 并联网络 综合所得 允许信号 网络形式
下载PDF
省辖联行网络拓朴结构初析
4
作者 樊启华 《中国金融电脑》 1995年第1期20-21,共2页
省辖联行网络拓朴结构初析建成银行湖北分行电脑处樊启华随着改革开放的深化发展,作为现代化重要标志的计算机已进入社会生产、生活的各个方面并逐步普及。在这个进程中,对国家的稳定、发展与繁荣肩负着重大宏、微观调控作用的国家银... 省辖联行网络拓朴结构初析建成银行湖北分行电脑处樊启华随着改革开放的深化发展,作为现代化重要标志的计算机已进入社会生产、生活的各个方面并逐步普及。在这个进程中,对国家的稳定、发展与繁荣肩负着重大宏、微观调控作用的国家银行,各方面业务都在逐步实现电算化,... 展开更多
关键词 网络拓朴结构 异地交易 代理行 初析 电算化系统 网络拓扑结构 信用卡 实时控制 网络结构 网络通讯
下载PDF
谈高学院校的校园网建设
5
作者 贾军 《绥化学院学报》 1997年第3期78-80,共3页
关键词 校园网 计算机辅助教学(CAI) 计算机和信息 专科院校 校园网建设 办公管理系统 情报检索 网络拓扑结构 通信线路 辅助教学软件
下载PDF
PLC远程I/O的设计与安装技术分析
6
作者 王鹏 《锅炉制造》 2014年第4期52-54,共3页
PLC远程I/O的设计与安装过程中,关于远程I/O网络通讯硬件的配置、网络拓扑结构的优化、电缆规格型号的选择、以及远程I/O的测试与维护的技术解析。
关键词 RIO 远程I/O网络节点 远程I/O网络电缆 分支器 I/O网络拓扑结构 远程I/O测试与维护
下载PDF
综合布线系统工程设计新思路 被引量:2
7
作者 曹淑兰 《油气田地面工程》 北大核心 2002年第6期29-30,共2页
关键词 综合布线系统 工程设计 智能建筑 网络拓扑结构
下载PDF
IP地址冲突分析及解决方法
8
作者 于长虹 王兴春 《铁道通信信号》 2007年第12期57-58,共2页
关键词 IP地址管理 冲突分析 Internet 网络管理人员 网络基础设施 网络拓扑结构 用户管理 网络用户
下载PDF
Modeling of Malicious Code Propagations in Internet of Things 被引量:2
9
作者 林昭文 苏飞 马严 《China Communications》 SCIE CSCD 2011年第1期79-86,共8页
Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will ex... Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will expand to the Internet of Things. IPv6 is the cornerstone of the Internet of Things. In this paper, we investigate a fast active worm, referred to as topological worm, which can propagate twice to more than three times faster tl^an a traditional scan-based worm. Topological worm spreads over AS-level network topology, making traditional epidemic models invalid for modeling the propagation of it. For this reason, we study topological worm propagation relying on simulations. First, we propose a new complex weighted network mod- el, which represents the real IPv6 AS-level network topology. And then, a new worm propagation model based on the weighted network model is constructed, which descries the topological worm propagation over AS-level network topology. The simulation results verify the topological worm model and demonstrate the effect of parameters on the propagation. 展开更多
关键词 IOT IPV6 worm propagation worm model weighted complex network
下载PDF
局域网基础知识
10
作者 歌者 《网络与信息》 2002年第8期68-69,共2页
关键词 计算机网络 网络适配器 网络拓扑结构 局域网
下载PDF
我校图书馆电子阅览室建设简介 被引量:1
11
作者 陈春阳 《文献信息论坛》 2001年第1期31-33,共3页
本文介绍我校图书馆电子阅览室网络建设及资源建设与管理等情况。
关键词 高校图书馆 电子阅览室 网络建设 网络拓扑结构 网络设备 资源建设
原文传递
各级单位计算机网络解决方案
12
作者 吕韬 《广东公安科技》 1998年第3期15-21,共7页
关键词 计算机网络 交换机 路由器 网络拓扑结构 双绞线 派出所 星形拓扑结构 网络方案 综合布线系统 信息中心
原文传递
Alternate solutions for mine ventilation network to keep a preassigned fixed quantity in a working place 被引量:1
13
作者 K. A. El-Nagdy A. M. Shoaib 《International Journal of Coal Science & Technology》 EI 2015年第4期269-278,共10页
In underground constructions, a good ventilation design not only delivers fresh air to establish good working environment, but also provides a scientific and reliable basis to prevent disasters. In emergency cases, un... In underground constructions, a good ventilation design not only delivers fresh air to establish good working environment, but also provides a scientific and reliable basis to prevent disasters. In emergency cases, unexpected closure of the main airways may occur, providing the workers with alternative airways is substantial. This is important not only to sustain personnel lives, but also to prevent the mine ventilation system from damage. In this research, alternate solutions were introduced in case of failure in the underground construction to keep a pre-assigned fixed quantity in a working place for mine ventilation network. Eight different collapse scenarios were proposed to study their effect on the air quantity distribution among the branches in the ventilation circuit. From these scenarios, it is found that providing a sufficient air quantity in the working places could be achieved through modification of the network topology and adjusting the values of the regulators pressure. It is also indicated that the distance between the collapse and working places has a great effect on the amount of air delivered to it. A reduction in the power consumption could be done by re-arrange the installed regulators and decreasing the number of nodes and branches inside the network. A relationship representing the effect of changing the network topology on the total network power consumption was deduced through regression analysis. It is found that the total network power is quadratic dependent on the number of regulators and number of branches while it is directly dependent on the regulator power. 展开更多
关键词 Mine ventilation network Power consumption through mine ventilation networks Regulators adjustment Nonlinear optimization Air flow control
下载PDF
SAFE:a Scalable Filter-Based Packet Filtering Scheme 被引量:1
14
作者 LU Ning HU Wenhao 《China Communications》 SCIE CSCD 2016年第2期163-177,共15页
Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the ... Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the filtering location, the proposed schemes can be grouped into Victim-end Filtering and Source-end Filtering. The first scheme uses a single filtering router to block the attack flows near the victim, but does not take the factor that the filters are scarce resource into account, which causes the huge loss of legitimate flows; considering each router could contribute a few filters, the other extreme scheme pushes the filtering location back into each attack source so as to obtain ample filters, but this may incur the severe network transmission delay due to the abused filtering routers. Therefore, in this paper, we propose a scalable filter-based packet filtering scheme to balance the number of filtering routers and the available filters. Through emulating DoS scenarios based on the synthetic and real-world Intemet topologies and further implementing the various filter-based packet filtering schemes on them, the results show that our scheme just uses fewer filtering routers to cut off all attack flows while minimizing the loss of legitimate flows. 展开更多
关键词 internet security DoS attacks filtering scheme
下载PDF
Estimation of Data Transfer Routes Fractal Dimension in Large Scale Networks
15
作者 Yuriy Danik Yuriy Kulakov +1 位作者 Vladimir Vorotnikov Igor Gumenyuk 《Journal of Mathematics and System Science》 2016年第1期38-45,共8页
The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their tr... The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their transformation into fractal macrostructure. An example of calculating the fractal dimension of the data path for the boundary of the phase transition between the states of network connectivity. The dependence of the fractal dimension of the percolation cluster on the size of the square δ-cover and conductivity value network of large dimension. It is shown that for the value of the fractal dimension of the route dc ≈ 1.5, network has a stable dynamics of development and size of clusters are optimized with respect to the current load on the network. 展开更多
关键词 large scale network percolation cluster fractal dimension ROUTING
下载PDF
Algorithms for seismic topology optimization of water distribution network 被引量:1
16
作者 LIU Wei XU Liang LI Jie 《Science China(Technological Sciences)》 SCIE EI CAS 2012年第11期3047-3056,共10页
As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of wate... As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of water distribution network usually ignores the influence of earthquake,resulting in water stoppage in large area during many recent strong earthquakes.This study introduced a seismic design approach of water distribution network,i.e.,topology optimization design.With network topology as the optimization goal and seismic reliability as the constraint,a topology optimization model for designing water distribution network under earthquake is established.Meanwhile,two element investment importance indexes,a pipeline investment importance index and a diameter investment importance index,are introduced to evaluate the importance of pipelines in water distribution network.Then,four combinational optimization algorithms,a genetic algorithm,a simulated annealing genetic algorithm,an ant colony algorithm and a particle swarm algorithm,are introduced to solve this optimization model.Moreover,these optimization algorithms are used to optimize a network with 19 nodes and 27 pipelines.The optimization results of these algorithms are compared with each other. 展开更多
关键词 water distribution network seismic topology optimization genetic algorithm simulated annealing genetic algorithm ant colony algorithm particle swarm algorithm
原文传递
蓝芽——构筑“无线个人局域网” 被引量:1
17
作者 唐欣 《中国无线电管理》 2001年第3期29-31,共3页
关键词 蓝芽技术 无线个人局域网 网络拓扑结构
下载PDF
档案馆室局域网设计:基本依据与结构选型
18
作者 张照余 《浙江档案》 北大核心 2001年第8期33-35,共3页
关键词 档案馆室 网络化建设 局域网设计 结构选型 依据 网络拓扑结构 网络传输介质
下载PDF
交运行李安检分层管理系统网络设计与施工
19
作者 周全 《警察技术》 北大核心 1997年第1期9-10,共2页
关键词 交运行李 系统网络设计 分层管理 WindowsforWorkgroups 网络操作系统 非屏蔽双绞线 电缆测试仪 安检 设计与施工 网络拓扑结构
下载PDF
NOVELL教学网络环境规划
20
作者 周小珂 王小珍 《新乡师范高等专科学校学报》 2001年第1期121-123,共3页
关键词 NOVELL 教学网络 环境规则 网络拓扑结构 目录结构 网络服务器 安全性
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部