Intelligent analysis framework for healthy environment spatial model of BIM horticultural therapy based on complex network information model

2020 ◽  
Author(s):  
Hongxiu Liu ◽  
Shuyan Ma
2020 ◽  
Vol 186 ◽  
pp. 02001
Author(s):  
Jianfeng Wang ◽  
Liang Chen ◽  
Liqin Shi ◽  
Dao’an Zhang ◽  
Hao Liu

In recent years, large-scale new energy sources have been connected to the power distribution network, and the ubiquitous power IoT sensing technology has developed rapidly. At the same time, the increase in energy consumption has placed higher requirements on the consumption of new energy, which has led to the “Triple-Alls” (All access, All sensing, All consumption) requirements of the distribution network. To this end, this paper conducts a series of studies on the “Triple-Alls” distribution network: First, it analyzes the characteristics and key technologies of the “Triple-Alls” distribution network by comparing with traditional distribution networks, and then establishes energy storage, photovoltaic, and wind power. Information model of “Triple-Alls” distribution network. Then, a platform design scheme meeting the requirements is constructed. Finally, the application functions of “All access”, “All sensing” and “All consumption” in the distribution network are explained in detail.


2014 ◽  
Vol 644-650 ◽  
pp. 2920-2924
Author(s):  
Yun Zhi Li

Assessment model of the vulnerability for information system is improved by using Bayesian equilibrium algorithm. The mathematical evaluation model of combined complex network information systems is established through the combination of weighted directional algorithm, and the algorithmic routine of network vulnerability assessment is designed. In order to verify the validity and reliability of the model and the algorithm, the test platform of complex network is built, and the vulnerability of network is detected with the weighted directional method, which has got the probability distribution nephogram of network vulnerability and the curve of network performance with time changing. At the last, the effect of different nodes of the network on the vulnerability of system is calculated with directed weights. And the results shown that the attacked number of different nodes and the attacked probability have improved the credibility of information analysis, which has provided theory reference for the research of information system vulnerability.


Sign in / Sign up

Export Citation Format

Share Document