期刊文献+
共找到1,523篇文章
< 1 2 77 >
每页显示 20 50 100
Coronavirus Mask Protection Algorithm:A New Bio-inspired Optimization Algorithm and Its Applications 被引量:3
1
作者 Yongliang Yuan Qianlong Shen +5 位作者 Shuo Wang Jianji Ren Donghao Yang Qingkang Yang Junkai Fan Xiaokai Mu 《Journal of Bionic Engineering》 SCIE EI CSCD 2023年第4期1747-1765,共19页
Nowadays,meta-heuristic algorithms are attracting widespread interest in solving high-dimensional nonlinear optimization problems.In this paper,a COVID-19 prevention-inspired bionic optimization algorithm,named Corona... Nowadays,meta-heuristic algorithms are attracting widespread interest in solving high-dimensional nonlinear optimization problems.In this paper,a COVID-19 prevention-inspired bionic optimization algorithm,named Coronavirus Mask Protection Algorithm(CMPA),is proposed based on the virus transmission of COVID-19.The main inspiration for the CMPA originated from human self-protection behavior against COVID-19.In CMPA,the process of infection and immunity consists of three phases,including the infection stage,diffusion stage,and immune stage.Notably,wearing masks correctly and safe social distancing are two essential factors for humans to protect themselves,which are similar to the exploration and exploitation in optimization algorithms.This study simulates the self-protection behavior mathematically and offers an optimization algorithm.The performance of the proposed CMPA is evaluated and compared to other state-of-the-art metaheuristic optimizers using benchmark functions,CEC2020 suite problems,and three truss design problems.The statistical results demonstrate that the CMPA is more competitive among these state-of-the-art algorithms.Further,the CMPA is performed to identify the parameters of the main girder of a gantry crane.Results show that the mass and deflection of the main girder can be improved by 16.44%and 7.49%,respectively. 展开更多
关键词 Coronavirus Mask protection algorithm Bionic algorithm Metaheuristic algorithm Optimization algorithm Truss optimization Parameter identification
在线阅读 下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
2
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization protective structure Genetic algorithm SURVIVABILITY VULNERABILITY
在线阅读 下载PDF
Single Failure Routing Protection Algorithm in the Hybrid SDN Network 被引量:5
3
作者 Haijun Geng Jiangyuan Yao Yangyang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第7期665-679,共15页
Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet serv... Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet service providers have begun to deploy software defined network(SDN)technology,the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time.Therefore,this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios.First,the deployment of LFA scheme in a hybrid SDN network is described as a 0-1 integer linear programming(ILP)problem.Then,two greedy algorithms,namely,greedy algorithm for LFA based on hybrid SDN(GALFAHSDN)and improved greedy algorithm for LFA based on hybrid SDN(IGALFAHSDN),are proposed to solve the proposed problem.Finally,both algorithms are tested in the simulation environment and the real platform.Experiment results show that GALFAHSDN and IGALFAHSDN can cope with all single network component failure scenarios when only a small number of nodes are upgraded to SDN nodes.The path stretch of the two algorithms is less than 1.36. 展开更多
关键词 Multipath routing network availability routing protection algorithm network failure hybrid SDN network
在线阅读 下载PDF
Distribution Line Longitudinal ProtectionMethod Based on Virtual Measurement Current Restraint
4
作者 WeiWang Yang Yu +3 位作者 Simin Luo Wenlin Liu Wei Tang Yuanbo Ye 《Energy Engineering》 EI 2024年第2期315-337,共23页
As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on ... As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions.However,the inherent randomness,intermittency,and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics.Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources.Therefore,a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper.The positive sequence current data and the network parameters are used to calculate the virtual measurement current which compensates for the output current of photovoltaic(PV).The waveform difference between the virtual measured current and the terminal current for internal and external faults is used to construct the protection method.An improved edit distance algorithm is proposed to measure the similarity between virtual measurement current and terminal measurement current.Finally,the feasibility of the protection method is verified through PSCAD simulation. 展开更多
关键词 Photovoltaic interconnection distribution network longitudinal protection method edit distance algorithm
在线阅读 下载PDF
Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs
5
作者 Lianghao Hua Jianfeng Zhang +1 位作者 Dejie Li Xiaobo Xi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2129-2157,共29页
With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rej... With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rejectioncontroller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmannedaerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances andthe possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address theseissues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neuralnetwork (RBFNN) with a second-order ADRC and leverages a fractional gradient descent (FGD) algorithm.We integrate the plant protection UAV model’s uncertain parameters, load disturbance parameters, and actuatorfault parameters and utilize the RBFNN for system parameter identification. The resulting ADRC exhibits loaddisturbance suppression and fault tolerance capabilities, and our proposed active fault-tolerant control law hasLyapunov stability implications. Experimental results obtained using a multi-rotor fault-tolerant test platformdemonstrate that the proposed method outperforms other control strategies regarding load disturbance suppressionand fault-tolerant performance. 展开更多
关键词 Radial basis function neural network plant protection unmanned aerial vehicle active disturbance rejection controller fractional gradient descent algorithm
在线阅读 下载PDF
A Niche-Based Evolutionary Tabu Search Algorithm for Optimal Coordination of Protection Relays in Power Networks
6
作者 YUAN Rongxiang ZOU Xiufen XU Chunlin 《Wuhan University Journal of Natural Sciences》 CAS 2009年第3期215-222,共8页
In this paper, refusal of operation and the degree of constraint violation are considered as one part of the objective function for optimizing the protection relay setting coordination of over current relays in power ... In this paper, refusal of operation and the degree of constraint violation are considered as one part of the objective function for optimizing the protection relay setting coordination of over current relays in power systems; a new expression of objective function in this optimization problem is proposed. To combine the advantages of both Tabu search (TS) and evolutionary algorithms (EAs), a new niche-based evolutionary Tabu search algorithm (named NETS) is presented to solve this optimization problem. Moreover, in two cases of power networks, comparisons between NETS and two published algorithms are given. Experimental results show the expression of the objective function for protection relay setting is feasible and reasonable, and the proposed algorithm NETS exhibits a good performance. 展开更多
关键词 evolutionary algorithm Tabu search power system protection relay coordination
原文传递
Transmission Lines Distance Protection Using Differential Equation Algorithm and Hilbert-Huang Transform
7
作者 Xingmao Liu Zhengyou He 《Journal of Power and Energy Engineering》 2014年第4期616-623,共8页
This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various fa... This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various factors, such as the distributed capacitance, the transient response characteristics of current transformer and voltage transformer, etc. In order to overcome this problem, the proposed scheme applies HHT to improve the apparent impedance estimated by DEA. Empirical mode decomposition (EMD) is used to decompose the data set from DEA into the intrinsic mode functions (IMF) and the residue. This residue has monotonic trend and is used to evaluate the impedance of faulty line. Simulation results show that the proposed scheme improves significantly the accuracy of the estimated impedance. 展开更多
关键词 Hilbert-Huang TRANSFORM DIFFERENTIAL EQUATION algorithm DISTANCE protection Transmission LINES
在线阅读 下载PDF
Efficient Routing Protection Algorithm Based on Optimized Network Topology
8
作者 Haijun Geng Zikun Jin +7 位作者 Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan 《Computers, Materials & Continua》 SCIE EI 2022年第9期4525-4540,共16页
Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of mes... Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability. 展开更多
关键词 Routing protection algorithm network availability network failure shortest path backup path
在线阅读 下载PDF
Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network
9
作者 WU Qi-wu CHEN Hao +1 位作者 JIANG Ling-zhi ZHOU Yang 《Optoelectronics Letters》 EI 2020年第6期455-461,共7页
Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. ... Aiming at the problem of dynamic multicast service protection in multi-domain optical network, this paper proposes a dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network. The algorithm uses the minimum cost spanning tree strategy and fuzzy game theory. First, it virtualizes two planes to calculate the multicast tree and the multicast protection tree respectively. Then, it performs a fuzzy game to form a cooperative alliance to optimize the path composition of each multicast tree. Finally, it generates a pair of optimal multicast work tree and multicast protection tree for dynamic multicast services. The time complexity of the algorithm is O(k3 m2 n), where n represents the number of nodes in the networks, k represents the number of dynamic multicast requests, and m represents the number of destination nodes for each multicast request. The experimental results show that the proposed algorithm reduces significantly the blocking rate of dynamic multicast services, and improves the utilization of optical network resources within a certain number of dynamic multicast request ranges. 展开更多
关键词 SERVICE Dynamic multicast sharing protection algorithm based on fuzzy game in multi-domain optical network DOMAIN
原文传递
Research on the Responsibility Traceability Mechanism Based on AI and the Application Boundary of Algorithmic Ethics in Medical Decision Making
10
作者 Baochen Huang Zhikai Huang 《Proceedings of Business and Economic Studies》 2025年第4期280-298,共19页
With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attentio... With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attention.This paper analyzes the limitations of algorithmic ethics in medical decision-making and explores accountability mechanisms,aiming to provide theoretical support for ethically informed medical practices.The study highlights how the opacity of AI algorithms complicates the definition of decision-making responsibility,undermines doctor-patient trust,and affects informed consent.By thoroughly investigating issues such as the algorithmic“black box”problem and data privacy protection,we develop accountability assessment models to address ethical concerns related to medical resource allocation.Furthermore,this research examines the effective implementation of AI diagnostic systems through case studies of both successful and unsuccessful applications,extracting lessons on accountability mechanisms and response strategies.Finally,we emphasize that establishing a transparent accountability framework is crucial for enhancing the ethical standards of medical AI systems and protecting patients’rights and interests. 展开更多
关键词 algorithmic ethics Medical decision-making Liability tracing Medical AI Patient rights protection
暂未订购
XGBoost Algorithm under Differential Privacy Protection
11
作者 Yuanmin Shi Siran Yin +1 位作者 Ze Chen Leiming Yan 《Journal of Information Hiding and Privacy Protection》 2021年第1期9-16,共8页
Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the X... Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the XGBoost can improve the classification accuracy while protecting privacy information.When using CART regression tree to build a single decision tree,noise is added according to Laplace mechanism.Compared with random forest algorithm,this algorithm can reduce computation cost and prevent overfitting to a certain extent.The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. 展开更多
关键词 Differential privacy privacy protection XGBoost algorithm CART regression tree
在线阅读 下载PDF
A novel heuristic pathfinding algorithm for 3D security modeling and vulnerability assessment
12
作者 Jun Yang Yue-Ming Hong +2 位作者 Yu-Ming Lv Hao-Ming Ma Wen-Lin Wang 《Nuclear Science and Techniques》 2025年第5期152-166,共15页
Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulner... Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications. 展开更多
关键词 Physical protection system 3D modeling and simulation Vulnerability assessment A^(*)Heuristic Pathfinding Dijkstra algorithm
在线阅读 下载PDF
基于冗余度和方差的P-Cycle圈构造算法的研究 被引量:1
13
作者 孙强 李德莉 任叶 《铁道学报》 EI CAS CSCD 北大核心 2018年第12期101-107,共7页
铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVP... 铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVPA(Redundancy and Variance Based P-Cycle Construction Algorithm)算法。圈扩展的过程中,算法将选择方差与冗余度能同时满足条件的候选圈作为本轮扩展圈,有效限制了完成保护的P-Cycle圈个数;圈扩展停止条件中,当UPL与参数M、冗余度的大小关系满足条件时,则停止圈扩展,从而限制圈上节点数,使圈个数与圈长度得到有效均衡;在仿真过程中,利用泛欧网络拓扑COST239对RVPA算法进行仿真,并对比分析不同M值下的性能。仿真结果表明,在相同空闲资源与待保护工作容量设定下,参数M取0.5时效果最优,并且RVPA算法的保护容量效率、所需圈的个数、算法整体耗时、总冗余度均优于已有的POCA(P-Cycle Optimization Configuration Heuristic Algorithm)算法。 展开更多
关键词 生存性 p-cycle保护 p-cycle圈扩展算法 资源占用 保护容量效率
在线阅读 下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:3
14
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain privacy protection ZERO-KNOWLEDGE PROOF algorithm ACCOUNT and multi-asset MODEL
在线阅读 下载PDF
Influence of the Inverse-Time Protection Relays on the Voltage Dip Index 被引量:2
15
作者 高新科 刘玡朋 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第3期354-360,共7页
The probability-assessment analyses on the characteristic value of voltage dip by using Monte Carlo stochastic modeling method to stimulate the randomness of the short circuit fault are introduced. Using Matlab and Po... The probability-assessment analyses on the characteristic value of voltage dip by using Monte Carlo stochastic modeling method to stimulate the randomness of the short circuit fault are introduced. Using Matlab and Power Systems CAD(PSCAD), we design control interface which combines the electromagnetic transient simulation with the Monte Carlo method. Specifically, the designing of interface which is meant to employ the method of Matlab programming to control the electromagnetic transients including direct current(EMTDC)simulation is introduced. Furthermore, the influences of the protection devices on the voltage dip to ensure the authenticity and the referential reliability are simulated. A system with the inverse-time protection devices equipped on each line which can coordinate together is designed to cut off the short-circuit fault. The voltage dip of the designed system is assessed by the pre- and post-system average root mean square(RMS) variation frequency index, and the voltage dip index is compared with the Information Technology Industry Council(ITIC)curves. The simulation results demonstrate that the inverse-time relay protection equipments are well-coordinated,and the severity and the range of the voltage dip are influenced by the cooperation of the equipped inverse-time protection devices. 展开更多
关键词 power quality voltage dip inverse-time protection relay Monte Carlo algorithm SIMULATION
原文传递
The Influence of Abnormal Data on Relay Protection 被引量:1
16
作者 Xuze Zhang Xiaoning Kang +2 位作者 Yali Ma Hao Wang Qiyue Huang 《Energy and Power Engineering》 2017年第4期95-101,共7页
The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fou... The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fourier Algorithm. Two simulation models are established in Matlab to study the influence of abnormal data on relay protection. The simulation results show that the abnormal data can make distance protection extend the fault’s influence and make over current protection start by error. 展开更多
关键词 RELAY protection ABNORMAL Data FOURIER algorithm
在线阅读 下载PDF
Protection Coordination Optimization for FREEDM (Future Renewable Electric Energy Delivery and Management) System
17
作者 Mohamed F. Kotb Magdi El-Saadawi Eman H. El-Desouky 《Journal of Electrical Engineering》 2018年第3期161-176,共16页
The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) a... The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) and DESD (distributed energy storage devices) with the existing distribution system. Protection schemes have been proposed to detect the overcurrent faults throughout the FREEDM system, according to its requirements. In this paper the time inverse directional over current protection coordination scheme is developed as a backup protection when the primary protection communication failed. The proposed scheme is applied to FREEDM network using conventional mathematical model. To speed up the fault clearing time without coordination loss, the settings of the proposed relays in the two directions are minimized using genetic algorithm. The developed methods are validated using ETAP software. The results ensure that the faults throughout the FREEDM system sections are detected and the relays tripping time are minimized. 展开更多
关键词 FREEDM protection coordination genetic algorithm ETAP software.
在线阅读 下载PDF
基于同源录波数据比对的继电保护采样回路异常检测方法 被引量:3
18
作者 戴志辉 张富泽 韩笑 《电力系统保护与控制》 北大核心 2025年第1期147-159,共13页
处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检... 处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检测方法。首先,利用双向编码器表征(bidirectional encoder representations from transformers,BERT)语言模型与余弦相似度算法,实现同源录波数据的通道匹配。然后,利用重采样技术和曼哈顿距离完成波形的采样频率统一与时域对齐。最后,基于动态时间规整(dynamic time warping,DTW)算法提出改进算法,并结合采样点偏移量共同设置采样回路的异常判据。算例分析表明,该方法可以完成录波数据的同源通道匹配,实现波形的一致性对齐,并且相比于传统DTW算法,改进DTW算法对异常状态识别的灵敏性和准确性更高。根据异常判据能够有效检测继电保护采样回路的异常状态,确保了智能变电站的安全可靠运行。 展开更多
关键词 继电保护装置 采样回路 异常检测 改进DTW算法 录波数据
在线阅读 下载PDF
从赋权走向治理:数字隐私保护的中国因应之策 被引量:3
19
作者 吴弘 赵畅 《求实》 北大核心 2025年第2期68-80,M0005,共14页
“数据+算法”的社会驱动模式进一步打破了数据、信息与隐私之间的形态界限,促使隐私开始呈现向数据和信息横向扩张的趋势,对个人隐私保护产生了诸多不确定性影响,并对现有基于赋权逻辑所制定的隐私法律制度提出了新的挑战,包括知情同... “数据+算法”的社会驱动模式进一步打破了数据、信息与隐私之间的形态界限,促使隐私开始呈现向数据和信息横向扩张的趋势,对个人隐私保护产生了诸多不确定性影响,并对现有基于赋权逻辑所制定的隐私法律制度提出了新的挑战,包括知情同意权的实效危机、删除权的技术缺陷等。数字时代,在面对关涉群体利益乃至社会公共利益的数字隐私侵害,以知情同意权和删除权为主导的权利型隐私保护路径已经在制度层面出现危机。对此,数字隐私保护有必要从赋权逻辑转向治理逻辑、从隐私控制主义转向算法训导主义,通过公权力介入处于不平等地位的数字平台及其用户之间,进一步探索“隐私增强技术”和算法还原的可行性及其有效进路,以强化数字时代隐私保护的制度回应。 展开更多
关键词 权利保护 个人隐私 数字时代 数字隐私 治理型保护 隐私增强技术 算法还原 社会公共利益
在线阅读 下载PDF
基于目标扰动的本地化差分隐私矩阵分解推荐算法 被引量:2
20
作者 王永 罗陈红 +1 位作者 邓江洲 高明星 《计算机学报》 北大核心 2025年第2期451-462,共12页
推荐系统作为有效应对信息过载的工具被广泛应用在电子商务、社交媒体和新闻资讯等领域中。矩阵分解具有泛化能力强和计算效率高的优点,是构建推荐系统的主流算法之一。为提高推荐质量,推荐服务器需要收集大量用户数据用于推荐模型的训... 推荐系统作为有效应对信息过载的工具被广泛应用在电子商务、社交媒体和新闻资讯等领域中。矩阵分解具有泛化能力强和计算效率高的优点,是构建推荐系统的主流算法之一。为提高推荐质量,推荐服务器需要收集大量用户数据用于推荐模型的训练。由于推荐服务器不是完全可信的,向服务器共享用户数据会对用户隐私构成极大的威胁。如何构建一个在保护用户隐私的同时,还能确保推荐质量和准确性的系统,成为了一个热门的研究话题。本地化差分隐私是一种分布式的隐私保护机制,它从中心化差分隐私中发展而来,旨在解决服务器不可信场景下的数据的安全收集和分析。这种框架通过精确的数学证明来确保隐私保护的强度。目前,已经有研究工作将本地化差分隐私引入推荐系统,目的是在推荐效果可接受的情况下,确保用户隐私数据的安全。然而,这些研究还面临一些挑战。首先,隐私保护的范围有限。目前的方法大多只关注显式数据的具体数值,认为这是用户的隐私信息。事实上,攻击者可以通过检查数据是否包含在数据集中,来推测用户的隐私信息。其次,推荐质量较低。本地化差分隐私通过引入扰动来保护用户隐私,但这种方法会导致扰动幅度过大和误差累积,进而影响推荐质量。在推荐服务器不可信场景下,本文提出一种基于本地化差分隐私的矩阵分解推荐算法。首先,该算法将评分数值和评分存在性同时作为隐私保护的对象,为用户提供全面的隐私保护。其次,本算法采用目标扰动方法,添加的噪声量不会随着迭代次数增加而增加,有效避免模型训练过程中噪声累积的问题,保证模型训练的有效性。最后,针对分布式场景下多轮迭代导致的中间参数泄露问题,以无放回方式将采样的模型梯度元素发送给推荐服务器,用于模型训练。本文从理论上证明了所提算法满足本地化差分隐私。对所提算法的效用分析证明本文算法在保证有效的推荐质量的同时,能够实现对用户隐私数据的保护。实验结果表明本文算法极大地提高了隐私保护推荐算法的性能,本文算法在公开数据集上的误差下降幅度平均可达18%,在推荐领域数据隐私保护中展现出良好的应用价值。 展开更多
关键词 矩阵分解 本地化差分隐私 目标扰动 推荐算法 隐私保护
在线阅读 下载PDF
上一页 1 2 77 下一页 到第
使用帮助 返回顶部