首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
传统的电能计量资产管理方式存在资产管理分散、无序存放、流通不便、资产利用率低等现象。通过电能计量资产团队式管理创新,国网浙江宁波鄞州区供电公司实现了电能计量资产的定点定位存放、统一管理,杜绝了资产管理的人为性和随意性,实现了与SG186系统及采集系统的无缝衔接和数据信息共享,形成了良性的约束机制,有效规范了电能计量管理,提高了电能计量的管理质量和工作效率。  相似文献   

2.
针对偏远地区电能数据采集问题,提出一种利用北斗短报文通讯功能实现信息远程传输的方案。方案利用中间件技术,重新设计的通信规约与报文结构,成功实现了与现有计量自动化主站系统的通信。通过一段时间的上线运行,利用北斗短报文通讯可以实现偏远地区电能量数据远程自动采集,传输质量满足电能量数据的传输要求。  相似文献   

3.
正河池供电局电能量数据班肩负着河池网区171座变电站、114座电厂、1.5万个台区、3.6万台终端、85万个用户的电能量数据集中采集、分析监测和应用职责,是红色故里的电能量数据管理"神经中枢"。在"大数据"时代背景下,电能量数据班秉持"芯数聚、创无限"的班组特色文化,围绕精益数据、安全数据、创新数据、成长数据、服务数据五个方面深入研究,在营销服务、生产运维、  相似文献   

4.
黄骅港2#110kV站项目工程的电能质量在线监测系统,在充分探讨及根据现场实际情况基础上,依据电能质量国家标准,对电压、频率、谐波等稳态电能质量指标和电压骤变等暂态电压质量指标进行在线监测。该系统通过采集、统计及分析处理监测网内各种电能信息,实现对电气和用电设备的日常维护与管理,  相似文献   

5.
该系统在油田油水井生产过程中,对工况数据进行实时采集,建立统一的存储数据库,规范采集数据格式,提供数据提交接口,实现数据的统一存储与管理,统一展示,同时为采集数据进一步处理、分析,进行工艺和管理方式的优化提供了丰富的数据资源.  相似文献   

6.
正我国多数港口是通过人工或半自动方式进行集装箱基础信息的采集的,因此存在工作效率低、误差率高、信息传递不及时等缺点,对数据集装箱数据信息传输和使用有影响。伴随着手机物联网的发展,越来越多的集装箱堆场及其客户要求建立手机物联网信息共享平台,实现数据信息共享。1集装箱堆场管理存在的问题1.1箱号、图像识别的传统方式存在高错误率集装箱在进出堆场时是以箱号进行识别开始进行管理的,箱号是用来进行集装箱交接的。人工采集和图像识别是现在集装箱管理  相似文献   

7.
<正>抄表工作就是应用各种抄表方式抄录电能计量装置所计量的电能数据,是抄核收工作的第一道工序,直接关系到后续工作的进度及电费计算的准确和电费回收。传统的以现场检查为主的抄表质量管控方法目前已不适用,本文探讨基于大数据的抄表质量管控方法。随着"大、云、物、移、智"等新技术的快速发展和用电信息采集系统的应用,将分散、人工的传统现场抄表模式,转变为以集中远程自动抄表为主,现场红外抄表为辅的模式,抄表质量得到大幅提升,但也经常出现抄表数据出错现象,造成电费差错。  相似文献   

8.
<正>随着企业的飞速发展,科技的不断进步,新的管理方式、技术要求等对传统的电能管理方式产生了巨大冲击。企业信息化的建设已经进入了实施的阶段,需要建立一个自动化、一体化、信息可以共享的数据采集平台,将变电站、公变、专变、大用户,以及低压集抄的数据通过一体化平台进行数据采集、统计分析,然后  相似文献   

9.
针对电能质量扰动数据大、识别算法繁琐,难以实现在线实时识别等问题,提出了基于深度卷积神经网络AlexNet的电能质量扰动识别数法,首先将各类电能质量扰动转化为图片格式,然后输入到AlexNet算法,通过学习、调整电能质量扰动信号的特征参数,迭代收敛,最后将实时的电能质量扰动通过训练好的AlexNet,直接实现扰动识别分类。实时仿真结果表明,所提出的方法能精确识别包括3种复合扰动在内的17种电能质量扰动问题,只需要对电能质量扰动信号进行学习,即可以直接对电能质量扰动信号进行识别与分类,识别算法简单且处理的时间短,达到了实时性的目的。  相似文献   

10.
针对作业成本计算(ABC)已成为国际先进企业的一种有效管理工具,具有很高的推广意义,而能否取得完整、准确的数据,已成为ABC应用中的一个关键环节,结合项目实践探讨了ABC数据采集的研究方法,首次提出了DACC过程,即通过制订基本原则、分析存在的问题、对比各个采集方式的优劣、综合选择4个步骤来研究ABC数据采集方法。  相似文献   

11.
本文主要介绍了加拿大GEMSYS生产的GEM-19、GEM-19G型号质子磁力仪与重庆奔腾数控技术研究所生产的WCZ-1型号质子磁力仪之间数据格式的转换,在Microsoft Excel下可以将一种型号质子磁力仪的数据格式转换成另一种型号质子磁力仪的数据格式,经转换后的数据可以利用其中一种型号质子磁力仪所配软件做日变改正。  相似文献   

12.
数据的收集和分析处理工作是一切可靠性工作的基础,不进行数据的收集和分析处理,就不可能定量地表示可靠性。可靠性数据可以分为规则寿命数据和不规则寿命数据。通常可靠性数据多为不规则寿命数据。通过对不规则寿命数据进行分段处理,应用可靠性理论,推导出这种常见的且非常重要的不规则寿命数据的处理方法,使得对不规则厅靠性寿命数据处理方法的理解更加深入,公式的意义更加明确,公式的应用更加方便。  相似文献   

13.
在地震数据采集中进行工序质量控制存在宏观协调、工序安排、参数选择等难点。从过程控制的观点出发,将具体的质量管理技术引进到数据采集作业中,提出了解决上述难点的方法和措施。  相似文献   

14.
Data brokers play a central role in the big data ecosystem, compiling personal data from numerous sources and subsequently selling them to businesses worldwide. Such practices, however, generally occur clandestinely without consumers' knowledge or consent and can harm consumers in a discriminatory manner. In recent years, US policymakers have been urged to regulate data brokers by promoting individual choice but have failed, whereas the European Union has introduced broad data privacy guarantees for consumers and a data protection regime that limits data brokers' activities if consumers' consent has not been obtained for specific purposes. Because of the power imbalance between consumers and data brokers, the author argues that the European Union's coherent data protection framework serves as an effective model for regulating data brokers.  相似文献   

15.
One of the primary concerns in measuring the relative efficiency of a telecommunication unit compared with other similar units is the uncertainty on input/output data. In this paper, a bootstrapped robust data envelopment analysis (BRDEA) model is proposed to measure the efficiency of telecommunication companies. The proposed method is capable of handling different issues such as the uncertainty in data or sampling errors. The model is examined using some real data from a telecommunication company. First, the data from 24 telecommunication companies are assumed with uncertainty and the efficiency of telecommunication companies are estimated using a robust DEA model. Then, the results of the efficiencies are corrected by a bootstrapping technique. The results indicate that the BRDEA method considers the perturbation in data and sampling error with an adaptation of bootstrapped robust data envelopment analysis and could be more reliable for efficiency estimating strategies.  相似文献   

16.
Post the Snowden and Cambridge Analytica episodes, concerns have been raised by governments and regulators on protecting consumer data collected and transmitted by various digital firms. Driven by concerns of privacy, national security, surveillance, and cyber terrorism, governments around the world have been erecting barriers in cyberspace through data localization. The extent of data localization varies from free flow of data, to stringent restrictions requiring all data to be stored only within the territorial jurisdiction of the country. Though there are certain legitimate concerns regarding protection of personal data, scholars and liberal economists have long proclaimed that any restrictions on the Internet and associated digital trade will have serious economic consequences. Data localization affects digital trade between consumers and producers of digital services to varying degrees. In this paper, we use agent based modeling to study the properties and behaviours of consumers and producers under varying data localization regimes. An augmented gravity model of trade with iceberg coefficient is incorporated to reflect distance-related costs between producers and consumers. Varying data localization compliance costs are included to reflect the effect of non-tariff barriers of data restrictions. Our extensive simulations indicate that there is often clustering of consumers around local firms in highly restrictive data localization regimes, thus enabling local firms to effectively compete against global multinationals. However, results also indicate that while free cross-border data flow enables intense competition amongst producers, data localization restrictions often limit consumer choice due to its effect on price and quality of services.  相似文献   

17.
分析了现场寿命数据的4种类型,即寿终数据、右删失数据、左删失数据和区间型数据的特点.结合实例说明了含有删失数据的可靠性函数估计的几种方法,对于现场寿命数据分析与可靠性评估具有参考价值.  相似文献   

18.
There is a steady global trend towards “Data Localization,” laws by which data is required to be maintained and processed within the geographic boundaries of its state of origin. This development has raised concerns about its possible adverse impacts on emerging data-intensive technologies such as Cloud services/E-commerce, Big Data, Artificial Intelligence and the Internet of Things (collectively, the Embedded Infosphere). The inability to reach an international agreement on rules for cross-border data flows may have significant adverse consequences for all future users of the Internet.The basis of Data Localization is grounded in two distinct but inter-related policy models: Data Sovereignty and Trans-Border Data Flows. These two concepts have different origins. “Data Sovereignty” is derived from the historic power of a state of absolute and exclusive control within its geographic borders. Policies behind TBDFs arose in Europe following World War II, primarily motivated by Nazi use of early proto-computers to help round up Jews and others. As they have evolved, TBDF policies have been directed primarily at protecting personal data and privacy.This article first examines the issues of: 1) “Information Sovereignty” and 2) TBDFs. It then describes the arguments for and against “Data Localization,” offers some examples of strong localization policies (Russia, China), and summarizes contesting policy proposals. It then contextualizes TBDF with issues of human rights (free flow of information) and privacy.While the utility of an international agreement on TBDFs is clear, the differences in approaches are tenacious. For the free-market developed world (e.g, EU, OECD), the path forward seems to lead through policy convergence to compatible rules, with differentiated levels of data protection and accountability. It is far from clear whether these rules will address, in a mandatory way, issues of the “free flow” of information in the human rights sense. At the same time, there are countries (e.g., BRICS), representing a majority of the world's population, in which political and cultural resistance will produce stringent Cyber Sovereignty and Data Localization policies with few if any human rights components.The article concludes that the more the Internet is “localized”, the more attenuated its benefits will become. The negative consequences of Data Localization will become increasingly obvious as new, data-intensive technologies become ubiquitous, creating a condition of “Data Dependence”. It is projected that in the future the nations with the least amount of Data Localization and the most open flow of information will be the most successful in benefiting from new data-intensive embedded, networked technologies. This will most likely be characterized by values adopted as policies and practices in the EU.  相似文献   

19.
Trade in telecommuncations and computing services, particularly trade in data-related services, offers potential for economic growth in all sectors. This article raises a number of issues which need to be settled in international fora before the greatest benefits can be reaped. Differing national regulations, international competition, treatment of data as a commodity, the role of trade in the services economy and legal questions are explored. The author suggests that international agreement on trade in telecommunications and computing services could provide the basis for a ‘core’ agreement on trade in services.  相似文献   

20.
通过网络平台,对个性化印品进行设计制作过程中,印品数据信息传输的完整性及规范性尤为关键。针对XML数据文件缺少统一规范等问题,本研究分析了个性化印品数据模型的建立及应用流程,采用面向对象的方式对网络个性化印品进行共性提取及个性描述,并建立相应的印品数据模型。在此基础上,根据XMLSchema的语言规则及应用特点,构建个性化印品XMLSchema模板,最后利用实验验证了个性化印品模板能对个性化印品数据进行约束及规范化。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号