期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
两种故障电流相控开断电流零点预测算法对比 被引量:12
1
作者 段雄英 黄智慧 +1 位作者 李蕊 邹积岩 《高压电器》 CAS CSCD 北大核心 2011年第1期5-9,共5页
目标电流零点的快速预测是实现故障电流相控分断技术的一个关键难题。针对目前最主要的两种电流零点快速预测算法——安全点法和自适应算法,展开了理论与仿真研究,通过建立单相系统短路故障电流的数学模型,分析对比两种算法的适应性。... 目标电流零点的快速预测是实现故障电流相控分断技术的一个关键难题。针对目前最主要的两种电流零点快速预测算法——安全点法和自适应算法,展开了理论与仿真研究,通过建立单相系统短路故障电流的数学模型,分析对比两种算法的适应性。分析表明,对于不含谐波的故障电流模型,自适应算法的误差相对较小,精度较高;对于含有谐波的故障电流模型,安全点算法简单、可靠、容易实现,能够较好地预测波形。两种算法目前都只适用于单相故障系统。 展开更多
关键词 故障电流 相控开断 零点预测 安全点算法 自适应算法
下载PDF
基于Prony的故障电流相控分断零点预测算法 被引量:3
2
作者 李红蕾 冯英 +4 位作者 袁召 李辉 喻新林 何俊佳 潘垣 《高压电器》 CAS CSCD 北大核心 2014年第9期29-34,共6页
目标过零点的快速、准确预测是实现短路故障电流相控开断的基础。笔者根据短路电流信号特点,提出将Prony算法应用于故障电流相控分断时的零点预测。推导了Prony算法的求解过程,通过计算频率、幅值、相位等参数,得到采样信号的还原波形,... 目标过零点的快速、准确预测是实现短路故障电流相控开断的基础。笔者根据短路电流信号特点,提出将Prony算法应用于故障电流相控分断时的零点预测。推导了Prony算法的求解过程,通过计算频率、幅值、相位等参数,得到采样信号的还原波形,进而求取目标电流零点。在MATLAB中设置理想信号进行算例验证,结果说明Prony算法的参数计算误差小,波形拟合度高。在谐波环境下,采用1/4周期长数据与安全点算法进行了对比。结果显示,相比安全点算法,Prony算法对谐波更加稳定,波形拟合精度更高。 展开更多
关键词 过零点 故障电流相控开断 PRONY算法 安全点算法
下载PDF
A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process 被引量:8
3
作者 胡威 Li Jianhua Jiang Xinghao Zhang Yueguo Chen Xiuzhen 《High Technology Letters》 EI CAS 2007年第3期291-296,共6页
The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current ... The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends. Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation 展开更多
关键词 analytic hierarchical process security management situational awareness security vulnerabilities security situation
下载PDF
Quantum Polynomial-Time Fixed-Point Attack for RSA 被引量:3
4
作者 Yahui Wang Huanguo Zhang Houzhen Wang 《China Communications》 SCIE CSCD 2018年第2期25-32,共8页
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed. 展开更多
关键词 information security cryptogra-phy RSA fixed-point quantum computing
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
5
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部