期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Tracing Algorithm of Thevenin Equivalent Parameters for Power Systems With Large Disturbance 被引量:5
1
作者 SUN huadong CHEN Shuyong +1 位作者 CHANG Xiaopeng LIN Weifang 《中国电机工程学报》 EI CSCD 北大核心 2012年第22期I0017-I0017,共1页
Considering the existing problems of current Thevenin equivalent algorithms,a tracing algorithm of Thevenin equivalent that is applicable to power systems with large disturbance is presented.First,the potential voltag... Considering the existing problems of current Thevenin equivalent algorithms,a tracing algorithm of Thevenin equivalent that is applicable to power systems with large disturbance is presented.First,the potential voltage amplitude of Thevenin equivalent at the moment of fault is calculated with the parameters before fault.Then the resistance before fault and the potential voltage amplitude of the moment of fault is used to calculate other parameters of the moment of fault.The main steps of this algorithm are as follows:1)The resistance and reactance of Thevenin equivalent before fault are used as initial parameters. 展开更多
关键词 Thevenin equivalent large disturbance complete differential tracing algorithm
原文传递
A Novel Contour Tracing Algorithm for Object Shape Reconstruction Using Parametric Curves
2
作者 Nihat Arslan Kali Gurkahraman 《Computers, Materials & Continua》 SCIE EI 2023年第4期331-350,共20页
Parametric curves such as Bézier and B-splines, originally developedfor the design of automobile bodies, are now also used in image processing andcomputer vision. For example, reconstructing an object shape in an... Parametric curves such as Bézier and B-splines, originally developedfor the design of automobile bodies, are now also used in image processing andcomputer vision. For example, reconstructing an object shape in an image,including different translations, scales, and orientations, can be performedusing these parametric curves. For this, Bézier and B-spline curves can be generatedusing a point set that belongs to the outer boundary of the object. Theresulting object shape can be used in computer vision fields, such as searchingand segmentation methods and training machine learning algorithms. Theprerequisite for reconstructing the shape with parametric curves is to obtainsequentially the points in the point set. In this study, a novel algorithm hasbeen developed that sequentially obtains the pixel locations constituting theouter boundary of the object. The proposed algorithm, unlike the methods inthe literature, is implemented using a filter containing weights and an outercircle surrounding the object. In a binary format image, the starting point ofthe tracing is determined using the outer circle, and the next tracing movementand the pixel to be labeled as the boundary point is found by the filter weights.Then, control points that define the curve shape are selected by reducing thenumber of sequential points. Thus, the Bézier and B-spline curve equationsdescribing the shape are obtained using these points. In addition, differenttranslations, scales, and rotations of the object shape are easily provided bychanging the positions of the control points. It has also been shown that themissing part of the object can be completed thanks to the parametric curves. 展开更多
关键词 Contour tracing algorithm bézier curve B-spline curve object shape reconstruction
在线阅读 下载PDF
Numerical Evaluation on the Thermal Performance of the Solar External Cylinder Receiver using Monte Carlo Ray-Tracing Algorithm
3
作者 LI Yawei ZHOU Hao ZUO Yuhang 《Journal of Thermal Science》 SCIE EI CAS CSCD 2023年第6期2065-2080,共16页
The heat receiver is an essential part of the Concentrating Solar Power plant,directly affecting its operation and safety.In this paper,the Monte Carlo ray-tracing algorithm was introduced to evaluate a 50 MW(e)extern... The heat receiver is an essential part of the Concentrating Solar Power plant,directly affecting its operation and safety.In this paper,the Monte Carlo ray-tracing algorithm was introduced to evaluate a 50 MW(e)external cylindrical receiver’s thermal performance.The radiation heat flux concentrated from the heliostats field and the view factors between grids divided from the tubes were both calculated using Monte Carlo ray-tracing algorithm.Besides,an in-house code was developed and verified,including three modules of the view-factor calculation,thermal performance calculation,and thermal stress calculation.It was also employed to investigate the 50 MW(e)receiver,and the detailed 3D profiles of temperature and thermal stress in the receiver were analyzed.It was found that the molten salt was heated from 298℃to 565℃and the tube at the 50 MW(e)receiver’s outlet had a high temperature,while the high thermal stress came out at the receiver’s entrance.Finally,the over-temperature of the receiver was discussed,and an optimization algorithm was introduced.The tube wall temperature and film temperature at the overheated area matched the safety criteria,and the outlet molten salt temperature still reached 563℃after the optimization process,with only 2℃dropped. 展开更多
关键词 solar cylinder external receiver Monte Carlo ray tracing algorithm view factor thermal performance and thermal stress over-heating of the receiver
原文传递
Tracing Precept against Self-Protective Tortious Decoder
4
作者 Jie Tian Xin-Fang Zhang +1 位作者 Yi-Lin Song Wei Xiang 《Journal of Electronic Science and Technology of China》 2007年第2期115-119,共5页
Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the con... Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the content supplier encrypts the data and broadcast the cryptograph that only its subscribers can decrypt. However, a traitor may clone his decoder and sell the pirate decoders for profits. The traitor can modify the private key and the decryption program inside the pirate decoder to avoid divulging his identity. Furthermore, some traitors may fabricate a new legal private key together that cannot be traced to the creators. So in this paper, a renewed precept is proposed to achieve both revocation at a different level of capacity in each distribution and black-box tracing against self-protective pirate decoders. The rigorous mathematical deduction shows that our algorithm possess security property. 展开更多
关键词 Attack prevention broadcast encryption Diffie-Hellman problem malicious subscriber tracing algorithm.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部