Data collection and communication protocol of feeder terminal unit in distribution automation 配电自动化馈线终端的信息采集与通信规约
The central allocation/ earliest available wavelength assignment access protocol was proposed and the equilibrium probability distribution function was derived. 提出了基于帧的集中调度/最早可利用波长分配的接入方式,并求解出系统的稳态概率分布函数。
The paper introduces technical system, network topology, route protocol, distribution and network performance in designing electric power dispatch data network. 对电力调度数据网设计组网中的网络技术体制、网络拓扑结构、路由协议和分区、网络设计指标等问题进行探讨。
We propose a copyright protection protocol for a distribution model of digital videos in the paper. 文章针对数字视频分发模型提出一种版权保护协议。
Considering that AD-Hoc network requires high IO and less delay for multi-address connection. An improved TDMA protocol basing on fixed slot distribution protocol and self-adaptive competition protocol is introduced in this paper. 本文针对AD-HOC网络对多址接入协议的吞吐量大、时延小等要求,提出了固定分配机制和自适应竞争机制相结合的改进型TDMA协议。
The Copyright Protection Protocol for a Distribution Model of Digital Videos 一种数字视频分发模型的版权保护协议
Many features, including symmetry of network traffic, symmetry of SYN and SYN/ ACK packets, protocol distribution, are introduced in network traffic anomaly detection. And preprocessing of data is explained in detail. 提出了网络流量对称性、TCP报文SYN和SYN/ACK对称性以及协议分布等具有鲁棒性的特征参数,描述了数据的预处理方法。
According to quantum key code distribution's principle, this paper has put forward absolutely safe protocol of quantum key code distribution for realizing the key of symmetrical cryptosystem. 该文根据量子密钥分配原理,提出了实现对称密码体制密钥的绝对保密的量子密钥分配协议。
A medium access control ( MAC) protocol with effective spectral bandwidth distribution was proposed for the CDMA network carrying multi-service traffics. Based on the BER limited characteristics of the CDMA system, the protocol maps the diverse BER requirements of multimedia services into the effective spectral bandwidth. 提出了一种基于等效带宽分配的媒质接入控制(MAC)方法,它针对CDMA系统是误码率受限型系统这一特点,将多媒体业务不同的误码率要求映射为等效带宽。
In order to solve the flaws, the thesis provide a Variable Key Exchange Protocol ( VKEP), the protocol achieves the mutual authentication and key distribution between the Supplicant and AP. 提出了可变密钥交换协议(简称VKEP)来实现请求者和无线接入点AP之间的相互认证和密钥分配。
A perfect digital-watermarking protocol can prevent illegal distribution of digital products and avoid false-accusation to an honest buyer without the third part authorization. 好的数字水印协议可以防止数字产品的非法传播,并且在不需要第三方公证的情况下可防止对诚实用户的误指控。
Based on the pseudorandom bit generator with time parameters and the verification keys, the identity verification protocol in quantum key distribution proposed can avoid the attack because the attacker has to intercept exponential times in the length of time parameters to obtain just one copy of a particle. 给出的量子身份认证协议中引入了基于时间参数和认证密钥的伪随机序列,使攻击者进行的拦截次数只有达到时间参数长度的指数级,才能获得同一粒子的副本,逃避了多次拦截攻击。
The application of reformative protocol CAN in power distribution network communication 改进型CAN协议在配电网通信中的应用
Dedicated line, radio and power-line carrier. Based on the present trial state, the problems which must be solved in its extensive application, are presented, such as system design, transmission protocol and resource management of distribution network. 根据目前试用情况,提出低压电力集中抄表系统推广应用中有待解决的系统规划设计、传输规约和配电网络资源管理等问题。
A Mobile Authentication Protocol Based on Key Distribution Center 一种基于密钥分发中心的移动IP认证方案
In the system, contract net protocol decides load distribution and unit commitment. 在机组MAS中,通过合同网机制实现负荷分配和机组启停决策。
Some protocols in the standard are improved, and one of them, namely the key management protocol based on key distribution center, is applied in the newly designed network interface card with encryption. 改进了标准中的部分密钥管理协议,并把基于密钥发放中心的密钥管理协议应用到了新设计的加密网卡。
Their performance is evaluated and the existing problems and shortcomings, on which this paper is based, are also figured out. Then, a topology control protocol for code distribution, which is based on the notion of cluster, is proposed. 然后,针对代码分发中的能量有效性和传输可靠性问题,提出一个适于代码分发的网络拓扑控制协议CDTCP(CodeDistributionTopologyControlProtocol)。
Secondly, we analyze the policy distribution protocol-COPS protocol and the model of the policy distribution, and put the address at the analysis of the security of the design. 其次,本文分析了策略分发协议&COPS协议以及策略分发模型等问题。重点对方案设计的安全性进行了分析和论述。
The core of electronic conference system is the distribution of conference key. How to design a secure and efficient protocol for conference key distribution is an interesting challenge for many security people in the world. 电子会议系统的关键在于会议密钥的分发,如何设计安全且高效的会议密钥分发协议,对许多网络安全工作者来说都是一个有趣的挑战。
A Study of Data Acquisition and Telecontrol Protocol in Distribution Automation System 配电自动化系统数据采集和远动规约的研究
It mainly explains those key technical problems in need of solution, including the research on cooperative protocol, management of centralized distribution, design of data transmission, distributing version control and data storage of systems. 重点解释了需要解决的关键技术,主要包括协同协议的研究,集中分布的管理,数据传输的设计以及分布式版本控制和系统的数据存储等等问题。
In addition, this protocol improves the efficiency of polynomial distribution in the irregular region. 另外,该方案也解决了不规则网络中多项式的分配效率问题。
This dissertation is focused on quantum key distribution protocol, eavesdropping strategy of quantum key distribution, decoy-state quantum key distribution and quantum secure direct communication with authentication. 本文主要研究了量子通信中的量子密钥分发协议、量子密钥分发中的攻击方案、诱骗态量子密钥分发协议以及带有身份认证的量子安全直接通信方案。
Network technology refers to take certain communication protocol, distribution in different locations on the multiple independent computer system through the Internet channel ( i.e. communication lines) joined together, so as to realize the sharing data and service of computer technology. 网络技术指采取一定的通信协议,将分布在不同地点上的多个独立计算机系统通过互联通道(即通信线路)连接在一起,从而实现数据和服务共享的计算机技术①。
This paper analyzes the protocol processing and proposes a distribution measurement method for performance load, of which the basic performance unit is machine period. 本文详细分析了DAA的协议流程,提出了以机器周期为基本性能单位的性能负荷分布测量方法。
First, investigate how to choose the appropriate protocol based on the spatial distribution of relay nodes. 首先,本文研究了如何根据中继节点的空间分布选择合适的协作协议。
By the host computer protocol traffic capture analysis has been the distribution of the various agreements. 通过对主机协议流量的捕获分析得到了各个协议的分布。