Search scope:
排序: Display mode:
Transactive Demand Response Operation at the Grid Edge using the IEEE 2030.5 Standard Article
Javad Fattahi, Mikhak Samadi, Melike Erol-Kantarci, Henry Schriemer
Engineering 2020, Volume 6, Issue 7, Pages 801-811 doi: 10.1016/j.eng.2020.06.005
Keywords: Transactive demand response IEEE 2030.5 Smart grid Multi-agent system Neighborhood coordination
Minimum Reserved Traffic Rate Based Fair Scheduling Algorithm in IEEE 802.16e
Shi Juncai,Hu Aiqun,Guan Yanfeng
Strategic Study of CAE 2008, Volume 10, Issue 2, Pages 54-59
According to the characteristics of IEEE 802.16-2005, a minimum reserved traffic rate based fair scheduling algorithm in IEEE 802.16-2005 is proposed in this paper.The algorithm pro posed in this paper is in accordance with IEEE 802-16-2005 and has gre at value.
Keywords: IEEE 802-16-2005 scheduling algorithm QoS fairness
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 69-73
Mesh network supported by IEEE802.16-2004 wireless-MAN standard is a fresh network combining tree
Keywords: IEEE 802.16 mesh node multi-hops mutual authentication self-modified routing
A novel method to investigate voltage stability of IEEE-14 bus wind integrated system using PSAT
Satish KUMAR,Ashwani KUMAR,N. K. SHARMA
Frontiers in Energy 2020, Volume 14, Issue 2, Pages 410-418 doi: 10.1007/s11708-016-0440-8
Keywords: voltage stability line indices power system analysis tool box (PSAT) wind system line loading power flow (PF)
Bo LI,Sung-kwon PARK
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10, Pages 1085-1094 doi: 10.1631/FITEE.1500314
Keywords: Power saving class State transition overhead IEEE 802.16e/m Quality of service
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Capacity of VoIP in IEEE 802.11 Wireless LAN
Chen Liquan,Hu Aiqun,Zhou Xueli
Strategic Study of CAE 2005, Volume 7, Issue 7, Pages 81-85
Keywords: wireless LAN voice over IP capacity Markov chain
Impact evaluation of large scale integration of electric vehicles on power grid
Rabah BOUDINA, Jie WANG, Mohamed BENBOUZID, Farid KHOUCHA, Mohamed BOUDOUR
Frontiers in Energy 2020, Volume 14, Issue 2, Pages 337-346 doi: 10.1007/s11708-018-0550-6
Keywords: PHEV vehicle-to-grid (V2G) technical impact IEEE 14 bus power flow analysis
Artificial intelligence in impact damage evaluation of space debris for spacecraft Editorial
BAO, Chun YIN, Xuegang HUANG, Wei YI, Sara DADRAS,chunyin@uestc.edu.cn,kusso@uestc.edu.cn,s_dadras@ieee.org
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 4, Pages 511-514 doi: 10.1631/FITEE.2220000
Jun WANG,De-jun LI,Can-jun YANG,Zhi-feng ZHANG,Bo JIN,Yan-hu CHEN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 12, Pages 1034-1045 doi: 10.1631/FITEE.1500099
Keywords: Power monitoring and protection Embedded processor Seafloor observatory network IEEE 1588 Junction
Theory and techniques for "intellicise" wireless networks Editorial
QUEK, Bo RONG,pzhang@bupt.edu.cn,pmg@bupt.edu.cn,shuguangcui@cuhk.edu.cn,ning_ming@zju.edu.cn,g.mao@ieee.org
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1, Pages 1-4 doi: 10.1631/FITEE.2210000
Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser Research
Shuai Wang, Lei Li, Yu-feng Song, Ding-yuan Tang, De-yuan Shen, Lu-ming Zhao,sdulilei@gmail.com,lmzhao@ieee.org
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 3, Pages 287-436 doi: 10.1631/FITEE.2000033
Keywords: 矢量孤子;类噪声脉冲;MXene;光纤激光器
Networks Innovation Institute, China
Peng XIAO,Zhi-yang LI,Song GUO,Heng QI,Wen-yu QU,Hai-sheng YU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 7, Pages 620-633 doi: 10.1631/FITEE.1500350
Keywords: Software-defined networking (SDN) Controller placement K self-adaptive method
Title Author Date Type Operation
Transactive Demand Response Operation at the Grid Edge using the IEEE 2030.5 Standard
Javad Fattahi, Mikhak Samadi, Melike Erol-Kantarci, Henry Schriemer
Journal Article
Minimum Reserved Traffic Rate Based Fair Scheduling Algorithm in IEEE 802.16e
Shi Juncai,Hu Aiqun,Guan Yanfeng
Journal Article
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Journal Article
A novel method to investigate voltage stability of IEEE-14 bus wind integrated system using PSAT
Satish KUMAR,Ashwani KUMAR,N. K. SHARMA
Journal Article
Maximizing power saving with state transition overhead for multiple mobile subscriber stations in WiMAX
Bo LI,Sung-kwon PARK
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Impact evaluation of large scale integration of electric vehicles on power grid
Rabah BOUDINA, Jie WANG, Mohamed BENBOUZID, Farid KHOUCHA, Mohamed BOUDOUR
Journal Article
Artificial intelligence in impact damage evaluation of space debris for spacecraft
BAO, Chun YIN, Xuegang HUANG, Wei YI, Sara DADRAS,chunyin@uestc.edu.cn,kusso@uestc.edu.cn,s_dadras@ieee.org
Journal Article
Developing a power monitoring and protection system for the junction boxes of an experimental seafloor observatory network
Jun WANG,De-jun LI,Can-jun YANG,Zhi-feng ZHANG,Bo JIN,Yan-hu CHEN
Journal Article
Theory and techniques for "intellicise" wireless networks
QUEK, Bo RONG,pzhang@bupt.edu.cn,pmg@bupt.edu.cn,shuguangcui@cuhk.edu.cn,ning_ming@zju.edu.cn,g.mao@ieee.org
Journal Article
Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser
Shuai Wang, Lei Li, Yu-feng Song, Ding-yuan Tang, De-yuan Shen, Lu-ming Zhao,sdulilei@gmail.com,lmzhao@ieee.org
Journal Article