期刊文献+
共找到1,542篇文章
< 1 2 78 >
每页显示 20 50 100
Coronavirus Mask Protection Algorithm:A New Bio-inspired Optimization Algorithm and Its Applications 被引量:3
1
作者 Yongliang Yuan Qianlong Shen +5 位作者 Shuo Wang Jianji Ren Donghao Yang Qingkang Yang Junkai Fan Xiaokai Mu 《Journal of Bionic Engineering》 SCIE EI CSCD 2023年第4期1747-1765,共19页
Nowadays,meta-heuristic algorithms are attracting widespread interest in solving high-dimensional nonlinear optimization problems.In this paper,a COVID-19 prevention-inspired bionic optimization algorithm,named Corona... Nowadays,meta-heuristic algorithms are attracting widespread interest in solving high-dimensional nonlinear optimization problems.In this paper,a COVID-19 prevention-inspired bionic optimization algorithm,named Coronavirus Mask Protection Algorithm(CMPA),is proposed based on the virus transmission of COVID-19.The main inspiration for the CMPA originated from human self-protection behavior against COVID-19.In CMPA,the process of infection and immunity consists of three phases,including the infection stage,diffusion stage,and immune stage.Notably,wearing masks correctly and safe social distancing are two essential factors for humans to protect themselves,which are similar to the exploration and exploitation in optimization algorithms.This study simulates the self-protection behavior mathematically and offers an optimization algorithm.The performance of the proposed CMPA is evaluated and compared to other state-of-the-art metaheuristic optimizers using benchmark functions,CEC2020 suite problems,and three truss design problems.The statistical results demonstrate that the CMPA is more competitive among these state-of-the-art algorithms.Further,the CMPA is performed to identify the parameters of the main girder of a gantry crane.Results show that the mass and deflection of the main girder can be improved by 16.44%and 7.49%,respectively. 展开更多
关键词 Coronavirus Mask protection algorithm Bionic algorithm Metaheuristic algorithm Optimization algorithm Truss optimization Parameter identification
在线阅读 下载PDF
Single Failure Routing Protection Algorithm in the Hybrid SDN Network 被引量:5
2
作者 Haijun Geng Jiangyuan Yao Yangyang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第7期665-679,共15页
Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet serv... Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet service providers have begun to deploy software defined network(SDN)technology,the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time.Therefore,this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios.First,the deployment of LFA scheme in a hybrid SDN network is described as a 0-1 integer linear programming(ILP)problem.Then,two greedy algorithms,namely,greedy algorithm for LFA based on hybrid SDN(GALFAHSDN)and improved greedy algorithm for LFA based on hybrid SDN(IGALFAHSDN),are proposed to solve the proposed problem.Finally,both algorithms are tested in the simulation environment and the real platform.Experiment results show that GALFAHSDN and IGALFAHSDN can cope with all single network component failure scenarios when only a small number of nodes are upgraded to SDN nodes.The path stretch of the two algorithms is less than 1.36. 展开更多
关键词 Multipath routing network availability routing protection algorithm network failure hybrid SDN network
在线阅读 下载PDF
A Niche-Based Evolutionary Tabu Search Algorithm for Optimal Coordination of Protection Relays in Power Networks
3
作者 YUAN Rongxiang ZOU Xiufen XU Chunlin 《Wuhan University Journal of Natural Sciences》 CAS 2009年第3期215-222,共8页
In this paper, refusal of operation and the degree of constraint violation are considered as one part of the objective function for optimizing the protection relay setting coordination of over current relays in power ... In this paper, refusal of operation and the degree of constraint violation are considered as one part of the objective function for optimizing the protection relay setting coordination of over current relays in power systems; a new expression of objective function in this optimization problem is proposed. To combine the advantages of both Tabu search (TS) and evolutionary algorithms (EAs), a new niche-based evolutionary Tabu search algorithm (named NETS) is presented to solve this optimization problem. Moreover, in two cases of power networks, comparisons between NETS and two published algorithms are given. Experimental results show the expression of the objective function for protection relay setting is feasible and reasonable, and the proposed algorithm NETS exhibits a good performance. 展开更多
关键词 evolutionary algorithm Tabu search power system protection relay coordination
原文传递
Transmission Lines Distance Protection Using Differential Equation Algorithm and Hilbert-Huang Transform
4
作者 Xingmao Liu Zhengyou He 《Journal of Power and Energy Engineering》 2014年第4期616-623,共8页
This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various fa... This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various factors, such as the distributed capacitance, the transient response characteristics of current transformer and voltage transformer, etc. In order to overcome this problem, the proposed scheme applies HHT to improve the apparent impedance estimated by DEA. Empirical mode decomposition (EMD) is used to decompose the data set from DEA into the intrinsic mode functions (IMF) and the residue. This residue has monotonic trend and is used to evaluate the impedance of faulty line. Simulation results show that the proposed scheme improves significantly the accuracy of the estimated impedance. 展开更多
关键词 Hilbert-Huang TRANSFORM DIFFERENTIAL EQUATION algorithm DISTANCE protection Transmission LINES
在线阅读 下载PDF
Efficient Routing Protection Algorithm Based on Optimized Network Topology
5
作者 Haijun Geng Zikun Jin +7 位作者 Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan 《Computers, Materials & Continua》 SCIE EI 2022年第9期4525-4540,共16页
Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of mes... Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability. 展开更多
关键词 Routing protection algorithm network availability network failure shortest path backup path
在线阅读 下载PDF
Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network
6
作者 WU Qi-wu CHEN Hao +1 位作者 JIANG Ling-zhi ZHOU Yang 《Optoelectronics Letters》 EI 2020年第6期455-461,共7页
Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. ... Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges. 展开更多
关键词 SERVICE Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network DOMAIN
原文传递
XGBoost Algorithm under Differential Privacy Protection
7
作者 Yuanmin Shi Siran Yin +1 位作者 Ze Chen Leiming Yan 《Journal of Information Hiding and Privacy Protection》 2021年第1期9-16,共8页
Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the X... Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the XGBoost can improve the classification accuracy while protecting privacy information.When using CART regression tree to build a single decision tree,noise is added according to Laplace mechanism.Compared with random forest algorithm,this algorithm can reduce computation cost and prevent overfitting to a certain extent.The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. 展开更多
关键词 Differential privacy privacy protection XGBoost algorithm CART regression tree
在线阅读 下载PDF
基于冗余度和方差的P-Cycle圈构造算法的研究 被引量:1
8
作者 孙强 李德莉 任叶 《铁道学报》 EI CAS CSCD 北大核心 2018年第12期101-107,共7页
铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVP... 铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVPA(Redundancy and Variance Based P-Cycle Construction Algorithm)算法。圈扩展的过程中,算法将选择方差与冗余度能同时满足条件的候选圈作为本轮扩展圈,有效限制了完成保护的P-Cycle圈个数;圈扩展停止条件中,当UPL与参数M、冗余度的大小关系满足条件时,则停止圈扩展,从而限制圈上节点数,使圈个数与圈长度得到有效均衡;在仿真过程中,利用泛欧网络拓扑COST239对RVPA算法进行仿真,并对比分析不同M值下的性能。仿真结果表明,在相同空闲资源与待保护工作容量设定下,参数M取0.5时效果最优,并且RVPA算法的保护容量效率、所需圈的个数、算法整体耗时、总冗余度均优于已有的POCA(P-Cycle Optimization Configuration Heuristic Algorithm)算法。 展开更多
关键词 生存性 p-cycle保护 p-cycle圈扩展算法 资源占用 保护容量效率
在线阅读 下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:3
9
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain privacy protection ZERO-KNOWLEDGE PROOF algorithm ACCOUNT and multi-asset MODEL
在线阅读 下载PDF
Influence of the Inverse-Time Protection Relays on the Voltage Dip Index 被引量:2
10
作者 高新科 刘玡朋 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第3期354-360,共7页
The probability-assessment analyses on the characteristic value of voltage dip by using Monte Carlo stochastic modeling method to stimulate the randomness of the short circuit fault are introduced. Using Matlab and Po... The probability-assessment analyses on the characteristic value of voltage dip by using Monte Carlo stochastic modeling method to stimulate the randomness of the short circuit fault are introduced. Using Matlab and Power Systems CAD(PSCAD), we design control interface which combines the electromagnetic transient simulation with the Monte Carlo method. Specifically, the designing of interface which is meant to employ the method of Matlab programming to control the electromagnetic transients including direct current(EMTDC)simulation is introduced. Furthermore, the influences of the protection devices on the voltage dip to ensure the authenticity and the referential reliability are simulated. A system with the inverse-time protection devices equipped on each line which can coordinate together is designed to cut off the short-circuit fault. The voltage dip of the designed system is assessed by the pre- and post-system average root mean square(RMS) variation frequency index, and the voltage dip index is compared with the Information Technology Industry Council(ITIC)curves. The simulation results demonstrate that the inverse-time relay protection equipments are well-coordinated,and the severity and the range of the voltage dip are influenced by the cooperation of the equipped inverse-time protection devices. 展开更多
关键词 power quality voltage dip inverse-time protection relay Monte Carlo algorithm SIMULATION
原文传递
The Influence of Abnormal Data on Relay Protection 被引量:1
11
作者 Xuze Zhang Xiaoning Kang +2 位作者 Yali Ma Hao Wang Qiyue Huang 《Energy and Power Engineering》 2017年第4期95-101,共7页
The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fou... The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fourier Algorithm. Two simulation models are established in Matlab to study the influence of abnormal data on relay protection. The simulation results show that the abnormal data can make distance protection extend the fault’s influence and make over current protection start by error. 展开更多
关键词 RELAY protection ABNORMAL Data FOURIER algorithm
在线阅读 下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
12
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization protective structure Genetic algorithm SURVIVABILITY VULNERABILITY
在线阅读 下载PDF
Distribution Line Longitudinal ProtectionMethod Based on Virtual Measurement Current Restraint
13
作者 WeiWang Yang Yu +3 位作者 Simin Luo Wenlin Liu Wei Tang Yuanbo Ye 《Energy Engineering》 EI 2024年第2期315-337,共23页
As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on ... As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions.However,the inherent randomness,intermittency,and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics.Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources.Therefore,a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper.The positive sequence current data and the network parameters are used to calculate the virtual measurement current which compensates for the output current of photovoltaic(PV).The waveform difference between the virtual measured current and the terminal current for internal and external faults is used to construct the protection method.An improved edit distance algorithm is proposed to measure the similarity between virtual measurement current and terminal measurement current.Finally,the feasibility of the protection method is verified through PSCAD simulation. 展开更多
关键词 Photovoltaic interconnection distribution network longitudinal protection method edit distance algorithm
在线阅读 下载PDF
Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs
14
作者 Lianghao Hua Jianfeng Zhang +1 位作者 Dejie Li Xiaobo Xi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2129-2157,共29页
With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rej... With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rejectioncontroller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmannedaerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances andthe possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address theseissues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neuralnetwork (RBFNN) with a second-order ADRC and leverages a fractional gradient descent (FGD) algorithm.We integrate the plant protection UAV model’s uncertain parameters, load disturbance parameters, and actuatorfault parameters and utilize the RBFNN for system parameter identification. The resulting ADRC exhibits loaddisturbance suppression and fault tolerance capabilities, and our proposed active fault-tolerant control law hasLyapunov stability implications. Experimental results obtained using a multi-rotor fault-tolerant test platformdemonstrate that the proposed method outperforms other control strategies regarding load disturbance suppressionand fault-tolerant performance. 展开更多
关键词 Radial basis function neural network plant protection unmanned aerial vehicle active disturbance rejection controller fractional gradient descent algorithm
在线阅读 下载PDF
Protection Coordination Optimization for FREEDM (Future Renewable Electric Energy Delivery and Management) System
15
作者 Mohamed F. Kotb Magdi El-Saadawi Eman H. El-Desouky 《Journal of Electrical Engineering》 2018年第3期161-176,共16页
The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) a... The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) and DESD (distributed energy storage devices) with the existing distribution system. Protection schemes have been proposed to detect the overcurrent faults throughout the FREEDM system, according to its requirements. In this paper the time inverse directional over current protection coordination scheme is developed as a backup protection when the primary protection communication failed. The proposed scheme is applied to FREEDM network using conventional mathematical model. To speed up the fault clearing time without coordination loss, the settings of the proposed relays in the two directions are minimized using genetic algorithm. The developed methods are validated using ETAP software. The results ensure that the faults throughout the FREEDM system sections are detected and the relays tripping time are minimized. 展开更多
关键词 FREEDM protection coordination genetic algorithm ETAP software.
在线阅读 下载PDF
Research on the Responsibility Traceability Mechanism Based on AI and the Application Boundary of Algorithmic Ethics in Medical Decision Making
16
作者 Baochen Huang Zhikai Huang 《Proceedings of Business and Economic Studies》 2025年第4期280-298,共19页
With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attentio... With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attention.This paper analyzes the limitations of algorithmic ethics in medical decision-making and explores accountability mechanisms,aiming to provide theoretical support for ethically informed medical practices.The study highlights how the opacity of AI algorithms complicates the definition of decision-making responsibility,undermines doctor-patient trust,and affects informed consent.By thoroughly investigating issues such as the algorithmic“black box”problem and data privacy protection,we develop accountability assessment models to address ethical concerns related to medical resource allocation.Furthermore,this research examines the effective implementation of AI diagnostic systems through case studies of both successful and unsuccessful applications,extracting lessons on accountability mechanisms and response strategies.Finally,we emphasize that establishing a transparent accountability framework is crucial for enhancing the ethical standards of medical AI systems and protecting patients’rights and interests. 展开更多
关键词 algorithmic ethics Medical decision-making Liability tracing Medical AI Patient rights protection
暂未订购
A novel heuristic pathfinding algorithm for 3D security modeling and vulnerability assessment
17
作者 Jun Yang Yue-Ming Hong +2 位作者 Yu-Ming Lv Hao-Ming Ma Wen-Lin Wang 《Nuclear Science and Techniques》 2025年第5期152-166,共15页
Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulner... Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications. 展开更多
关键词 Physical protection system 3D modeling and simulation Vulnerability assessment A^(*)Heuristic Pathfinding Dijkstra algorithm
在线阅读 下载PDF
基于VSG的交流微电网自触发功率经济分配隐私保护策略
18
作者 杨珺 范晏通 秦杰 《电力系统自动化》 北大核心 2026年第1期118-129,共12页
针对高比例可再生能源并网导致的微电网惯性下降问题,聚焦于虚拟同步发电机控制交流微电网的功率经济分配与数据安全协同优化问题展开研究。首先,提出了一种融合模型预测控制的改进增量成本一致性算法,对功率不平衡值进行计算,打破了传... 针对高比例可再生能源并网导致的微电网惯性下降问题,聚焦于虚拟同步发电机控制交流微电网的功率经济分配与数据安全协同优化问题展开研究。首先,提出了一种融合模型预测控制的改进增量成本一致性算法,对功率不平衡值进行计算,打破了传统一致性算法中领导节点需要计算全局信息的限制。其次,提出了一种双维度协同的自触发隐私保护策略,并采用差分隐私机制对交互信息进行噪声注入以解决数据泄露问题。同时,结合事件驱动的自触发机制以减少计算负担并降低通信和加密成本。最后,通过4机7节点系统进行仿真验证。结果表明,所提自触发隐私保护策略显著减少了通信资源与计算资源,提升了微电网控制的鲁棒性与隐私安全性。 展开更多
关键词 微电网 虚拟同步发电机 隐私保护 功率经济分配 模型预测控制 一致性算法
在线阅读 下载PDF
IMPROVED FOURIER ALGORITHM FOR CORRECTING POWER SYSTEM FREQUENCY DEVIATION 被引量:1
19
作者 姜惠兰 杨维 +2 位作者 徐建强 刘梅 仇晓锋 《Transactions of Tianjin University》 EI CAS 2001年第3期192-196,共5页
On the basis of high precision requirement for input signals in the power system protection and control system,this paper,only for the influence of power system frequency deviation on extracting fundamental harmonic,s... On the basis of high precision requirement for input signals in the power system protection and control system,this paper,only for the influence of power system frequency deviation on extracting fundamental harmonic,studies the amplitude error of Fourier algorithm,presents a method of correcting frequency deviation,and further derives the formulas of improved Fourier algorithm.The simulation results verified the effectiveness of the algorithm,it not only can greatly weaken the influence of frequency deviation,but also increase the precision of the power system protection and control.As a result the study in this paper has practical application value. 展开更多
关键词 power system protection and control frequency deviation Fourier algorithm
在线阅读 下载PDF
A Weighted Algorithm for Watermarking Relational Databases 被引量:2
20
作者 CUI Xinchun QIN Xiaolin SHENG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期79-82,共4页
A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. ... A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. A one-way hash function and a secret key known only to the owner of the data are used to select tuples and bits to mark. By assigning high weight to significant attributes, the scheme ensures that important attributes take more chance to be marked than less important ones. Experimental results show that the proposed scheme is robust against various forms of attacks, and has perfect immunity to subset attack. 展开更多
关键词 weighted algorithm watermarking relational databases copyright protection
在线阅读 下载PDF
上一页 1 2 78 下一页 到第
使用帮助 返回顶部