期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于决策偏好逼近的网络数据安全稳态评估分析
1
作者 刘洋 刘明利 王伟 《科技通报》 2023年第2期30-33,61,共5页
为有效评估网络数据的安全稳态,本文提出基于决策偏好逼近的网络数据安全稳态评估分析方法。根据阶梯层次形式构建网络数据安全稳态评估体系,并利用用户生成内容模式挖掘安全稳态关注点。本文采用二元语义模型呈现决策者偏好信息,根据... 为有效评估网络数据的安全稳态,本文提出基于决策偏好逼近的网络数据安全稳态评估分析方法。根据阶梯层次形式构建网络数据安全稳态评估体系,并利用用户生成内容模式挖掘安全稳态关注点。本文采用二元语义模型呈现决策者偏好信息,根据文档特征权值赋予评估指标属性权值。基于此,考虑决策者偏好信息,获取事件关键词属性权重,根据加权决策矩阵正负理想值,得到数据安全稳态评估结果。实验结果表明:该方法能够有效且全面地评估网络数据的安全稳态。 展开更多
关键词 网络数据 安全稳态评估 决策偏好 UGC挖掘 二元语义变量模型 文档特征函数
下载PDF
基于决策偏好逼近的网络数据安全稳态评估分析策略
2
作者 张玮 刘昕玥 《计算机应用文摘》 2023年第20期134-136,139,共4页
在互联网时代,随着网络数据的不断增长,确保网络数据的安全变得至关重要,以便充分发挥网络数据的作用和价值。文章从决策偏好的角度出发,提出了一种网络数据安全稳态评估分析策略。通过利用二元语义模型,该策略用于呈现决策者的偏好信息... 在互联网时代,随着网络数据的不断增长,确保网络数据的安全变得至关重要,以便充分发挥网络数据的作用和价值。文章从决策偏好的角度出发,提出了一种网络数据安全稳态评估分析策略。通过利用二元语义模型,该策略用于呈现决策者的偏好信息,从而构建了网络数据安全稳态评估体系。 展开更多
关键词 决策偏好 网络数据 安全稳态评估
下载PDF
Probabilistic steady-state and dynamic security assessment of power transmission system 被引量:14
3
作者 LIU YanLi YU YiXin 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第5期1198-1207,共10页
Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dy... Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dynamic security constraints and transitions between system configurations in terms of failure rate and repair rate are considered in the model.Time to insecurity is used as security index.The probability distribution of time to insecurity can be obtained by solving a linear vector differential equation.The coefficients of the differential equation are expressed in terms of configuration transition rates and security transition probabilities.The model is implemented in complex system successfully for the first time by using the following effective measures:firstly,calculating configuration transition rates effectively based on component state transition rate matrix and system configuration array;secondly,calculating the probability of random nodal power injection belonging to security region effectively according to practical parts of critical boundaries of security region represented by hyper-planes;thirdly,locating non-zero elements of coefficient matrix and then implementing sparse storage of coefficient matrix effectively;finally,calculating security region off-line for on-line use.Results of probabilistic security assessment can be used to conduct operators to analyze system security effectively and take preventive control.Test results on New England 10-generators and 39-buses power system verify the reasonableness and effectiveness of the method. 展开更多
关键词 power transmission system probabilistic security assessment time to insecurity security region uncertainties of windpower and load demand
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部