期刊文献+
共找到372篇文章
< 1 2 19 >
每页显示 20 50 100
复杂故障下静态安全分析的部分因子化修正改进方法
1
作者 王毅 李可萌 +3 位作者 曹国芳 闪鑫 陆娟娟 陈中 《电力系统自动化》 北大核心 2026年第3期167-179,共13页
新型电力系统运行方式变化愈发频繁且复杂,要求静态安全分析应用能快速处理各种复杂预想故障。复杂预想故障存在电气节点数增减等特性,现有部分因子化修正方法适用性不佳,限制了当前静态安全分析应用的性能。为此,文中提出了部分因子化... 新型电力系统运行方式变化愈发频繁且复杂,要求静态安全分析应用能快速处理各种复杂预想故障。复杂预想故障存在电气节点数增减等特性,现有部分因子化修正方法适用性不佳,限制了当前静态安全分析应用的性能。为此,文中提出了部分因子化修正改进方法。首先,分析了现有考虑线路N-1的部分因子化修正方法和加大数法在母联开关N-1(节点增加)、母线N-1(节点减少)等场景下的应用局限性。然后,针对电气节点减少场景提出了节点隔离法,通过理论推导证明了节点隔离法可在远优于加大数法数值稳定性的基础上实现方程求解误差接近机器精度。随后,针对电气节点不变及增加场景,提出了增量矩阵分解策略和两阶段法,克服了以往部分因子化修正技术仅能高效处理线路N-1等简单故障的弊端。接着,提出了部分因子化修正框架,整合了节点隔离法(节点减少)、增量矩阵分解(节点不变)和两阶段法(节点增加),将部分因子化修正技术的适用范围拓展到全类型预想故障。最后,设计了包含D5000测试环境和仿真环境的多种规模算例,验证了所提方法较D5000内置算法及传统部分因子化修正算法的优势,支撑了静态安全分析应用。 展开更多
关键词 静态安全分析 部分因子化修正 故障 节点隔离 拓扑变化
在线阅读 下载PDF
考虑N-1故障重构下的配电网PMU优化配置方法
2
作者 晁婉萌 刘灏 +1 位作者 毕天姝 陈艳霞 《中国电机工程学报》 北大核心 2026年第2期569-581,I0010,共14页
含大规模分布式光伏与柔性负荷的新型配电网运行方式愈发复杂,配电网同步测量装置(synchrophasor measurement unit for distribution network,D-PMU)优化配置可为其协同调度控制提供有效的同步测量数据。然而,在配电网发生N-1故障并进... 含大规模分布式光伏与柔性负荷的新型配电网运行方式愈发复杂,配电网同步测量装置(synchrophasor measurement unit for distribution network,D-PMU)优化配置可为其协同调度控制提供有效的同步测量数据。然而,在配电网发生N-1故障并进行重构后,原有的配置方案难以满足调度控制需求。因此,提出一种考虑N-1故障重构下的D-PMU优化配置方法。首先,提出计及配电网重构的节点电压损失和网络拓扑结构的节点脆弱程度指标,划分节点权重;为保证故障重构后配电网可观,提出考虑N-1故障重构的D-PMU优化配置模型,基于配电网重构获取了网络拓扑结构,建立N-1故障重构下的可观测约束,并考虑D-PMU通道数量有限以及数据监控与采集系统(supervisory control and data acquisition,SCADA)和高级量测系统(advanced measurement infrastructure,AMI)量测信息对所提模型的影响;建立D-PMU统一优化配置模型,充分考虑经济性、正常情况下的全网可观、零注入节点、N-1故障重构可观、D-PMU通道的限制和已存在的传统量测;进一步,利用IEEE 33和IEEE 69节点系统验证该方法的可行性和有效性。 展开更多
关键词 N-1故障重构 优化配置 零注入节点 通道限制 传统量测
原文传递
A Selection Strategy of Test Node in Analogy Circuit with Sensitivity 被引量:1
3
作者 Longfu Zhou Yonghe Hu +4 位作者 Ming Zhao Yibing Shi Yi Sun Hong Tang Shuo Li 《通讯和计算机(中英文版)》 2011年第10期895-898,共4页
关键词 测试节点 模拟电路 灵敏度 选择策略 故障诊断 模糊理论 故障状态 故障隔离
在线阅读 下载PDF
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks 被引量:3
4
作者 Seo Hyun Oh Chan O. Hong Yoon Hwa Choi 《Wireless Sensor Network》 2012年第3期84-90,共7页
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulne... Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate. 展开更多
关键词 WIRELESS SENSOR Networks fault DETECTION MALICIOUS node DETECTION
暂未订购
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks 被引量:2
5
作者 Sung-Jib Yim Yoon-Hwa Choi 《Wireless Sensor Network》 2012年第9期219-225,共7页
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important... The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate. 展开更多
关键词 Wireless Sensor Networks MALICIOUS nodeS faults Neighbor-Based Detection
暂未订购
Fault Identification of Power Grid Based on Wide-Area Differential Current and K-Means Clustering
6
作者 Hao Wu Qunzhan Li 《Energy and Power Engineering》 2017年第4期19-29,共11页
A new method of fault domain identification is proposed based on K-means clustering analysis theories using the wide-area information of power grid. In the method, the node Intelligent Electronic Device (IED) associat... A new method of fault domain identification is proposed based on K-means clustering analysis theories using the wide-area information of power grid. In the method, the node Intelligent Electronic Device (IED) associated domain is defined, and the relationship of positive sequence current fault component for the association domain boundaries is sought, then the conception of positive sequence fault component differential current for node IED association domains is introduced. The information of the positive sequence fault component differential current gathered by node IEDs is selected as the object of K-means clustering. The node IEDs of fault associated domains can be classified into one category, and the node IEDs of non-fault associated domains are classified into another category. With the fault area minimum principle, the group of node IEDs about fault associated domains can be obtained. The overlap of fault associated domains for different nodes is the fault area. A large number of simulations show that the algorithm proposed can identify fault domains with high accuracy and no influence by the operating mode of the system and topological changes. 展开更多
关键词 POSITIVE Sequence fault Component Differential Current K-Means Clustering fault Association DOMAIN The node IED fault DOMAIN Identification
暂未订购
Fault diagnosis based on dial-test data in datacenter networks
7
作者 QI Xiaogang WANG Bingchun LIU Lifang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第5期1035-1043,共9页
The fast growth of datacenter networks,in terms of both scale and structural complexity,has led to an increase of network failure and hence brings new challenges to network management systems.As network failure such a... The fast growth of datacenter networks,in terms of both scale and structural complexity,has led to an increase of network failure and hence brings new challenges to network management systems.As network failure such as node failure is inevitable,how to find fault detection and diagnosis approaches that can effectively restore the network communication function and reduce the loss due to failure has been recognized as an important research problem in both academia and industry.This research focuses on exploring issues of node failure,and presents a proactive fault diagnosis algorithm called heuristic breadth-first detection(HBFD),through dynamically searching the spanning tree,analyzing the dial-test data and choosing a reasonable threshold to locate fault nodes.Both theoretical analysis and simulation results demonstrate that HBFD can diagnose node failures effectively,and take a smaller number of detection and a lower false rate without sacrificing accuracy. 展开更多
关键词 DATACENTER network node failure PROACTIVE fault diagnosis
在线阅读 下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
8
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 Wireless Sensor Network (WSN) Key nodes fault model Complex network theory
在线阅读 下载PDF
Improved PBFT Consensus Algorithm Based on Node Role Division
9
作者 Xiyu Ren Xiangrong Tong Wei Zhang 《Journal of Computer and Communications》 2023年第2期20-38,共19页
The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to ... The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to support massive network nodes, the common participation over all nodes in the consensus mechanism would lead to increased communication complexity, and the arbitrary selection of master nodes would also lead to inefficient consensus. This paper offered a PBFT consensus method (Role Division-based Practical Byzantine Fault Tolerance, RD-PBFT) to address the above problems based on node role division. First, the nodes in the system voted with each other to divide the high reputation group and low reputation group, and determined the starting reputation value of the nodes. Then, the mobile node in the group was divided into roles according to the high reputation value, and a total of three roles were divided into consensus node, backup node, and supervisory node to reduce the number of nodes involved in the consensus process and reduced the complexity of communication. In addition, an adaptive method was used to select the master nodes in the consensus process, and an integer value was introduced to ensure the unpredictability and equality of the master node selection. Experimentally, it was verified that the algorithm has lower communication complexity and better decentralization characteristics compared with the PBFT consensus algorithm, which improved the efficiency of consensus. 展开更多
关键词 Blockchain Consensus Algorithm Practical Byzantine fault Tolerance node Role Division
在线阅读 下载PDF
Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network 被引量:1
10
作者 Min-Cheol Shin Yoon-Hwa Choi 《Wireless Sensor Network》 2013年第3期52-60,共9页
In this paper, we present a malicious node detection scheme using confidence-level evaluation in a grid-based wireless sensor network. The sensor field is divided into square grids, where sensor nodes in each grid for... In this paper, we present a malicious node detection scheme using confidence-level evaluation in a grid-based wireless sensor network. The sensor field is divided into square grids, where sensor nodes in each grid form a cluster with a cluster head. Each cluster head maintains the confidence levels of its member nodes based on their readings and reflects them in decision-making. Two thresholds are used to distinguish between false alarms due to malicious nodes and events. In addition, the center of an event region is estimated, if necessary, to enhance the event and malicious node detection accuracy. Experimental results show that the scheme can achieve high malicious node detection accuracy without sacrificing normal sensor nodes. 展开更多
关键词 Sensor Networks MALICIOUS node Detection Grid-Based WSN faultS CONFIDENCE LEVELS
暂未订购
A Method on Analog Circuit Fault Diagnosis with Tolerance
11
作者 Yan-Jun Li Hou-Jun Wang Ruey-Wen Liu 《Journal of Electronic Science and Technology of China》 2009年第4期297-302,共6页
In this paper, it is proved that the direction of the node-voltage difference vector, which is the difference between the node-voltage vector at faulty state and the one at the nominal state, is determined only by the... In this paper, it is proved that the direction of the node-voltage difference vector, which is the difference between the node-voltage vector at faulty state and the one at the nominal state, is determined only by the location of the faulty clement in linear analog circuits. Considering that the direction of the node-voltage sensitivity vector is the same as the one of the node-voltage difference vector and also considering that the module of the node-voltage sensitivity vector presents the weight of the parameter of faulty element deviation relative to the voltage difference, fault dictionary is set up based on node-voltage sensitivity vectors. A decision algorithm is proposed concerned with both the location and the parameter difference of the faulty element. Single fault and multi-fault can be diagnosed while the circuit parameters deviate within the tolerance range of 10 %. 展开更多
关键词 Analog circuit fault diagnosis fault dictionary node-voltage difference vector sensitivity vector.
在线阅读 下载PDF
基于人工智能技术的激光通信网络故障诊断方法
12
作者 盛桂敏 慕昱 +1 位作者 张博阳 张恒艳 《激光杂志》 北大核心 2025年第9期167-172,共6页
针对大规模激光通信网络故障类型复杂,难以精准检测的问题,提出了基于人工智能技术的激光通信网络故障诊断方法。首先构建激光通信网络系统的节点连通图,利用激光通信网络的故障特征与故障标签,选取光梯度提升机算法确定激光通信网络故... 针对大规模激光通信网络故障类型复杂,难以精准检测的问题,提出了基于人工智能技术的激光通信网络故障诊断方法。首先构建激光通信网络系统的节点连通图,利用激光通信网络的故障特征与故障标签,选取光梯度提升机算法确定激光通信网络故障的映射关系。然后依据故障的映射关系,利用RBF神经网络建立激光通信网络故障诊断模型,最后进行了激光通网络仿真实验。实验结果表明,该方法能够有效诊断不同类型的激光通信网络故障,定位激光通信网络故障的X轴与Y轴的定位误差均低于±10 cm,且激光通信网络故障诊断正确率较高、时间较短,获得了比较理想的激光通信网络故障诊断结果。 展开更多
关键词 人工智能 光通信 网络系统 故障诊断 节点连通图 光梯度提升机
原文传递
基于节点参与度的低压有源配电网故障定位监测装置优化配置方法 被引量:6
13
作者 陈韶昱 冯洋 +3 位作者 郑志祥 徐益飞 崔健勇 乐健 《电测与仪表》 北大核心 2025年第1期124-132,共9页
低压配电网馈线区段短且分支多,现场情况复杂难以准确进行故障定位,出于对设备投资的考量,无法在每个节点安装故障监测装置,开展低压配电网故障监测装置优化配置方法的研究具有现实意义。文中利用安装在线路分段开关或联络开关处的故障... 低压配电网馈线区段短且分支多,现场情况复杂难以准确进行故障定位,出于对设备投资的考量,无法在每个节点安装故障监测装置,开展低压配电网故障监测装置优化配置方法的研究具有现实意义。文中利用安装在线路分段开关或联络开关处的故障监测装置监测故障电流信息,将边缘计算技术应用于故障定位系统。统计各个馈线区段发生故障时各馈线首端节点的参与频次,依次计算节点参与度。设计综合考虑整体故障监测单元的参与度和监测装置配置均匀程度的优化模型目标函数,考虑经济性约束条件。通过多个算例验证了文中所提出的优化配置方法的正确性和有效性。文中方法可有效确保低压有源配电网故障定位的准确性,提高低压配电网运行的可靠性与经济性。 展开更多
关键词 低压配电网 边缘计算 故障区段定位 节点参与度 监测装置优化配置
在线阅读 下载PDF
断层在泥岩盖层内纵向封堵性“三时间节点”判识方法及其应用——以海拉尔盆地贝尔凹陷呼和诺仁断层为例
14
作者 付广 徐浩轩 《天然气地球科学》 北大核心 2025年第12期2217-2226,共10页
为研究海拉尔盆地贝尔凹陷呼和诺仁断层处的油气分布特征,特构建了一套断层在泥岩盖层内纵向封堵性“三时间节点”(活动期、停止活动时、现今停止活动后)判识方法,即:通过活动期泥岩盖层古断接厚度和断层在泥岩盖层内上下贯通要求的最... 为研究海拉尔盆地贝尔凹陷呼和诺仁断层处的油气分布特征,特构建了一套断层在泥岩盖层内纵向封堵性“三时间节点”(活动期、停止活动时、现今停止活动后)判识方法,即:通过活动期泥岩盖层古断接厚度和断层在泥岩盖层内上下贯通要求的最大断接厚度,判识活动期断层在泥岩盖层内纵向封堵性;通过停止活动时断层充填物古泥质含量和断层纵向封堵要求的最小充填物泥质含量,判识停止活动时断层在泥岩盖层内纵向封堵性;通过现今停止活动后断层岩泥质含量和断层纵向封堵要求的最小断层岩泥质含量,判识现今停止活动后断层在泥岩盖层内纵向封堵性。用其对呼和诺仁断层在下白垩统大磨拐河组一段下部(大一下段)泥岩盖层内3个时间节点纵向封堵性进行了判识研究。结果表明:研究点1~3、5、7~8、12~15处3个时间节点呼和诺仁断层在大一下段泥岩盖层内纵向皆封堵,而研究点4、6、9~11处3个时间节点呼和诺仁断层在大一下段泥岩盖层内纵向皆不封堵;研究点1~3、5、7~8、12~15处有利于油气在呼和诺仁断层处南屯组二段(南二段)内聚集与保存,是造成目前呼和诺仁断层在研究点7~8、12~15处南二段获得油气(研究点1~3、5处可能因处于构造低部位,油气供给不足,未充满圈闭,造成未获得油气)的根本原因。 展开更多
关键词 贝尔凹陷 “3时间节点”判识方法 呼和诺仁断层 大磨拐河组一段下部(大一下段) 泥岩盖层 纵向封堵性
原文传递
考虑配电网故障重构的电压薄弱节点辨识方法 被引量:1
15
作者 杨隽雯 尚磊 +2 位作者 叶欣智 刘承锡 董旭柱 《电力工程技术》 北大核心 2025年第1期39-49,共11页
在建设新型配电系统的背景下,电压越限问题逐渐突出,系统稳定运行日趋复杂。文中基于全纯嵌入法,研究拓扑变化下节点电压指标轨迹的偏移特性,提出考虑配电网故障重构的薄弱节点辨识方法。首先,基于电力系统解耦的思想提出节点电压指标... 在建设新型配电系统的背景下,电压越限问题逐渐突出,系统稳定运行日趋复杂。文中基于全纯嵌入法,研究拓扑变化下节点电压指标轨迹的偏移特性,提出考虑配电网故障重构的薄弱节点辨识方法。首先,基于电力系统解耦的思想提出节点电压指标与配电网电压可视化安全域;然后,通过全纯嵌入法求解出节点电压指标轨迹,定义电压指标偏移距离表征节点电压指标轨迹特性,计及配电网故障后的拓扑变化提出概率性节点电压指标轨迹求解方法;最后,综合配电网正常态工况与N-1+1故障态运行工况,根据配电网电压可视化安全域与节点电压指标轨迹的相对位置关系,构建配电网薄弱节点评价指标体系,提出薄弱节点辨识方法。基于IEEE 33节点配电系统进行分析,结果表明,所提方法可实现节点电压状态的可视化监测,准确辨识电压薄弱节点。 展开更多
关键词 全纯嵌入法 薄弱节点 故障重构 节点电压指标 电压安全域 电压稳定边界
在线阅读 下载PDF
基于边缘计算的配电网故障检测方法 被引量:2
16
作者 阳浩 赵欢 +3 位作者 薛荣 余郁彬 魏恩伟 黄兵 《电测与仪表》 北大核心 2025年第1期191-198,共8页
为精准、快速地检测出配电网的发生故障,确保电力稳定供应,提出基于边缘计算的配电网故障检测方法。通过多个故障检测器、云计算中心以及终端设备构建边缘计算模型,基于边缘侧结合多维S变换融合算法与相模变换矩阵法,提取配电网相关故... 为精准、快速地检测出配电网的发生故障,确保电力稳定供应,提出基于边缘计算的配电网故障检测方法。通过多个故障检测器、云计算中心以及终端设备构建边缘计算模型,基于边缘侧结合多维S变换融合算法与相模变换矩阵法,提取配电网相关故障特征,根据特征提取结果,设定边缘计算模型的各个检测装置-支路关联矩阵及其元素取值条件,经获取、修正故障信息后,构建故障信息矩阵,根据此矩阵元素取值,对线路区段上的故障作出判定。实验结果证明,基于边缘计算的配电网故障检测方法能够有效检测出不同种类的故障,且响应时间均低于0.005 s,检测精度超过95%,满足实际应用需求。 展开更多
关键词 边缘计算 配电网 故障检测 边缘节点 关联矩阵
在线阅读 下载PDF
面向物联网的改进拜占庭容错共识算法 被引量:2
17
作者 谢勇 孙传恒 +1 位作者 罗娜 邢斌 《计算机工程与设计》 北大核心 2025年第2期360-367,共8页
为更好提升区块链和物联网的融合度,提出一种基于信任和主节点选取的拜占庭容错容错共识算法(trusted and primary node election Byzantine fault tolerance,TBFT)。对实用拜占庭容错(practical Byzantine fault tolerance,PBFT)算法... 为更好提升区块链和物联网的融合度,提出一种基于信任和主节点选取的拜占庭容错容错共识算法(trusted and primary node election Byzantine fault tolerance,TBFT)。对实用拜占庭容错(practical Byzantine fault tolerance,PBFT)算法进行改进,优先选择快速节点作为主节点;加入直接信任模型实现拜占庭节点、宕机节点的剔除机制,优化一致性协议和视图切换协议。实验及分析结果表明,当网络中的诚实节点数量为34个、宕机和拜占庭节点共16个时,该算法相比PBFT,共识时延下降72%,吞吐量高约37%,系统安全性和稳定性得到了提升。 展开更多
关键词 区块链 共识算法 信任模型 快速节点 物联网 拜占庭容错 仿真实验
在线阅读 下载PDF
基于TOPSIS算法的电力通信网络故障节点智能识别方法 被引量:1
18
作者 司毅洋 杨贝贝 《长江信息通信》 2025年第4期162-165,共4页
故障节点智能识别是电力通信网络自动化监测中重要环节,对保证电力通信网络性能具有重要作用,但现行方法识别效果并不理想,不仅信道冲撞率比较高,而且通信网络误码率也比较高,无法为网络故障检修提供准确依据,为此提出基于TOPSIS算法的... 故障节点智能识别是电力通信网络自动化监测中重要环节,对保证电力通信网络性能具有重要作用,但现行方法识别效果并不理想,不仅信道冲撞率比较高,而且通信网络误码率也比较高,无法为网络故障检修提供准确依据,为此提出基于TOPSIS算法的电力通信网络故障节点智能识别方法。建立电力通信网络节点交互状态模型,描述节点交互状态,根据节点交互状态提取到电力通信网络节点交互率、历史故障率、节点连通度故障特征,利用TOPSIS算法对故障特征排序,并进行多指标决策分析,识别到故障节点,实现基于TOPSIS算法的电力通信网络故障节点智能识别。经实验证明,设计方法应用下电力通信网络信道冲撞率和误码率均不超过1%,可以实现对通信网络故障节点的精准识别。 展开更多
关键词 TOPSIS算法 电力通信网络 故障节点 智能识别 交互状态 节点连通度
在线阅读 下载PDF
基于图神经网络的工业物联网节点通信故障预测方法 被引量:1
19
作者 孙哲 曹潇男 刘朝忠 《无线互联科技》 2025年第18期89-92,共4页
工业物联网(Industrial Internet of Things,IIoT)中通信故障具有突发性与结构依赖性,提升节点异常状态的预测精度对保障IIoT系统的稳定运行具有重要意义。文章构建了基于图神经网络(Graph Neural Network,GNN)的通信故障预测模型,提出... 工业物联网(Industrial Internet of Things,IIoT)中通信故障具有突发性与结构依赖性,提升节点异常状态的预测精度对保障IIoT系统的稳定运行具有重要意义。文章构建了基于图神经网络(Graph Neural Network,GNN)的通信故障预测模型,提出了通信图建模方法。该方法设计了多层图卷积结构与注意力机制,构建了多类别故障标签并实现动态图序列预测。实验结果表明,该方法在预测准确率、故障识别能力与推理效率方面优于传统模型,可以有效感知节点间拓扑与状态演化关系,在工业通信网络中具备部署价值与应用前景。 展开更多
关键词 工业物联网 图神经网络 通信故障预测 节点状态建模
在线阅读 下载PDF
基于稀疏测点的含逆变型分布式电源配电网故障测距
20
作者 赵景涛 高嫦霞 +3 位作者 杜晓通 郑舒 李猛 和敬涵 《电气自动化》 2025年第6期97-101,共5页
针对高比例逆变型分布式电源接入配电网后导致故障测距方法可靠性严重降低和测点信息难以获取的问题,提出了一种基于稀疏测点的含逆变型分布式电源配电网故障测距方法。构建了故障后的节点阻抗矩阵,结合正、负、零序网络推导相域不对称... 针对高比例逆变型分布式电源接入配电网后导致故障测距方法可靠性严重降低和测点信息难以获取的问题,提出了一种基于稀疏测点的含逆变型分布式电源配电网故障测距方法。构建了故障后的节点阻抗矩阵,结合正、负、零序网络推导相域不对称短路的故障测距方程。最后,在PSCAD/EMTDC中验证了所提测距方法的性能。结果表明,对于任何类型的不对称短路故障,都有较高的测距精度。所提方法仅利用少量任意位置的节点信息便能精确测距,且无需源阻抗数据。 展开更多
关键词 逆变型分布式电源 配电网 故障测距 节点阻抗矩阵 序网络
在线阅读 下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部