期刊文献+
共找到11,328篇文章
< 1 2 250 >
每页显示 20 50 100
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
1
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN hidden Variables Bell’s Inequality Violation Spin Entanglement
下载PDF
Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models
2
作者 Virgile Simé Nyassi Franklin Tchakounté +3 位作者 Blaise Omer Yenké Duplex Elvis Houpa Danga Magnuss Dufe Ngoran Jean Louis Kedieng Ebongue Fendji 《Journal of Intelligent Learning Systems and Applications》 2024年第3期274-315,共42页
This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more ... This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach. 展开更多
关键词 Social Engineering hidden Markov Model Vishing Voice Mining
下载PDF
Deciphering the Hidden Secrets between the Early Skin Wrinkling & the Metabolic (X) Syndrome with the Possible Reversal of This Process at the Molecular Level
3
作者 Dalal Alsaadoun 《Journal of Cosmetics, Dermatological Sciences and Applications》 2024年第1期45-68,共24页
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ... The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. . 展开更多
关键词 COLLAGEN Skin Wrinkling Glycation Hyper-Insulinemia hidden Obesity Vis-ceral Fat Inflammatory Cytokines
下载PDF
Fresnel Equations Derived Using a Non-Local Hidden-Variable Particle Theory
4
作者 Dirk J. Pons 《Journal of Modern Physics》 2024年第6期950-984,共35页
Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel... Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel equations appear not to exist. Approach: The objective of this work was to derive the basic optical laws from first principles from a particle basis. The particle model used was the Cordus theory, a type of non-local hidden-variable (NLHV) theory that predicts specific substructures to the photon and other particles. Findings: The theory explains the origin of the orthogonal electrostatic and magnetic fields, and re-derives the refraction and reflection laws including Snell’s law and critical angle, and the Fresnel equations for s and p-polarisation. These formulations are identical to those produced by electromagnetic wave theory. Contribution: The work provides a comprehensive derivation and physical explanation of the basic optical laws, which appears not to have previously been shown from a particle basis. Implications: The primary implications are for suggesting routes for the theoretical advancement of fundamental physics. The Cordus NLHV particle theory explains optical phenomena, yet it also explains other physical phenomena including some otherwise only accessible through quantum mechanics (such as the electron spin g-factor) and general relativity (including the Lorentz and relativistic Doppler). It also provides solutions for phenomena of unknown causation, such as asymmetrical baryogenesis, unification of the interactions, and reasons for nuclide stability/instability. Consequently, the implication is that NLHV theories have the potential to represent a deeper physics that may underpin and unify quantum mechanics, general relativity, and wave theory. 展开更多
关键词 Wave-Particle Duality Optical Law Fresnel Equation Non-Local hidden-Variable
下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
5
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
下载PDF
基于标记树对象抽取技术的Hidden Web获取研究 被引量:9
6
作者 宋晖 张岭 +1 位作者 叶允明 马范援 《计算机工程与应用》 CSCD 北大核心 2002年第23期9-12,24,共5页
目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该... 目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该文提出了一套检索HiddenWeb信息的方法,给出了系统的框架结构,并详细讨论了实现的关键技术。系统采用新的基于标记树的对象抽取(Tag-Tree-basedObjectExtraction)方法自动地从Web页面中抽取HiddenWeb信息,然后在此基础上给出了结构化的HiddenWeb信息查询算法。文章最后对实验结果进行了讨论。 展开更多
关键词 标记树 对象抽取 hiddenWeb 互联网 搜索引擎 信息检索 结构化查询 数据库
下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
7
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 hidden WEB 爬虫 启发式算法
下载PDF
民航主题Hidden-Web爬虫的设计与实现 被引量:1
8
作者 张校慧 徐彬 +1 位作者 陈国强 陈珊 《计算机应用与软件》 CSCD 北大核心 2008年第7期187-189,共3页
分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对F... 分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对Form库中的Form进行填写并搜集含有匹配结果的页面集。实验证明此爬虫的性能令人满意且对其它Hidden-Web的应用研究具有借鉴意义。 展开更多
关键词 hidden-Web FORM 民航 爬虫
下载PDF
斜坡非均匀无黏性泥沙起动流速公式研究
9
作者 李楠 谭龙金 廖海梅 《兰州文理学院学报(自然科学版)》 2025年第1期78-83,共6页
为探究具有堰塞坝特征的大比降天然非均匀沙河道工程的泥沙颗粒起动流速,在前人基础上重新定义隐蔽度的概念,综合考虑泥沙颗粒的隐暴效应,采用滚动起动模式对斜坡上泥沙颗粒进行受力分析,建立斜坡非均匀无黏性泥沙颗粒的垂线平均流速公... 为探究具有堰塞坝特征的大比降天然非均匀沙河道工程的泥沙颗粒起动流速,在前人基础上重新定义隐蔽度的概念,综合考虑泥沙颗粒的隐暴效应,采用滚动起动模式对斜坡上泥沙颗粒进行受力分析,建立斜坡非均匀无黏性泥沙颗粒的垂线平均流速公式.采用实测资料对该公式及前人总结出的公式进行检验,结果表明本文计算值与实测值吻合度更高,误差更小. 展开更多
关键词 起动流速 滚动起动 无黏性泥沙 隐蔽度 暴露度
下载PDF
含隐伏断层底板原生缺陷致灾前兆研究
10
作者 王博睿 张远航 《煤炭技术》 CAS 2025年第1期216-220,共5页
为探究隐伏断层底板复杂构造活化致灾前兆规律,遏制含隐伏断层底板原生裂隙对导水通道的促进作用,运用了FLAC3D数值模拟软件,通过对比分析得到随掘过程中原生缺陷结构辨识方法及致灾前兆规律。研究结果表明:在导水通道的形成前,原生缺... 为探究隐伏断层底板复杂构造活化致灾前兆规律,遏制含隐伏断层底板原生裂隙对导水通道的促进作用,运用了FLAC3D数值模拟软件,通过对比分析得到随掘过程中原生缺陷结构辨识方法及致灾前兆规律。研究结果表明:在导水通道的形成前,原生缺陷结构沿采掘反方向长40 m、宽30 m的区域被看作原生缺陷结构的剪应力、压应力异常辨识区域;异常辨识区域内监测点剪应力不断升高,并在工作面过隐伏断层后剪应力呈下降趋势;异常辨识区域内监测点压应力都呈现“降低—升高”趋势,且监测点压应力的升高趋势亦可作为原生缺陷结构辨识信息。为安全绿色开采高承压水上煤炭资源,实现安全过隐伏构造提供科学理论及工程指导。 展开更多
关键词 隐伏断层 原生缺陷 数值模拟 致灾前兆
下载PDF
Study on Problems and Countermeasures of English Hidden Curriculum Construction in Higher Vocational Colleges in the Era of “Internet Plus” 被引量:1
11
作者 谢丹 《海外英语》 2017年第7期245-246,共2页
As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse thei... As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse their enthusiasm,initiative and creativity in learningEnglish.This paper analyzes the problems of English hidden curriculum construction in higher vocational colleges under the back-ground o"fInternet plus",and puts forward some corresponding countermeasures to bring the role of college English hidden curriculuminto full play. 展开更多
关键词 "Internet plus" higher vocational colleges construction of English hidden curriculum problems and countermeasures
下载PDF
《女巫的子孙》的隐性叙事:复仇的棋局
12
作者 裴小维 《唐山学院学报》 2025年第1期66-69,共4页
小说《女巫的子孙》是享誉世界的加拿大现当代女作家玛格丽特·阿特伍德创作的“霍加斯·莎士比亚经典改写系列”的第三部作品。小说情节围绕主人公菲利克斯的复仇计划,以显性叙事(复仇行动)与隐性叙事(棋局演进)平行互动的结... 小说《女巫的子孙》是享誉世界的加拿大现当代女作家玛格丽特·阿特伍德创作的“霍加斯·莎士比亚经典改写系列”的第三部作品。小说情节围绕主人公菲利克斯的复仇计划,以显性叙事(复仇行动)与隐性叙事(棋局演进)平行互动的结构形式展开,并以隐性叙事隐喻复仇计划的进展及主人公的蜕变过程。整部小说深刻反映了人类在多元文化背景下对自由平等、团结友爱以及彼此真诚相待的热烈渴望。 展开更多
关键词 女巫的子孙 隐性叙事 玛格丽特·阿特伍德
下载PDF
科研单位实验室蓄电池常见隐患分析及对策建议
13
作者 麻旭普 马斌 +1 位作者 王鹏翔 陈早艳 《中国标准化》 2025年第1期269-273,共5页
科研单位实验室蓄电池种类多种多样,在使用过程中由于管理制度不健全、部门间责权不清、使用和存储设施不完善等原因引发诸多安全隐患。本文通过充分分析隐患问题产生的原因,从完善管理制度、制定操作规程、规范采购流程、提供可靠的存... 科研单位实验室蓄电池种类多种多样,在使用过程中由于管理制度不健全、部门间责权不清、使用和存储设施不完善等原因引发诸多安全隐患。本文通过充分分析隐患问题产生的原因,从完善管理制度、制定操作规程、规范采购流程、提供可靠的存储环境、定期检查维护、建立详细管理台账和责任到人的措施等方面提出相应的对策建议,可有效减少实验室蓄电池存在的安全隐患和避免在使用过程中发生事故风险。 展开更多
关键词 科研单位 实验室 蓄电池 隐患分析 对策
下载PDF
Hidden cochlear impairments 被引量:8
14
作者 Guang-Di Chen 《Journal of Otology》 CSCD 2018年第2期37-43,共7页
Pure tone audiometry is a routine clinical examination used to identify hearing loss. A normal pure tone audiogram is usually taken as evidence of normal hearing. Auditory deficits detected in subjects with normal aud... Pure tone audiometry is a routine clinical examination used to identify hearing loss. A normal pure tone audiogram is usually taken as evidence of normal hearing. Auditory deficits detected in subjects with normal audiograms, such as poor sound discrimination and auditory perceptual disorders, are generally attributed to central problems. Does the pure tone audiogram truly reflect cochlear status? Recent evidence suggests that individuals with normal audiogram may still have reduced peripheral auditory responses but normal central responses, indicating that the pure tone audiometry may not detect some types of cochlear injuries. In the cochlea, the outer hair cells (OHCs), inner hair cells (IHCs), and the spiral ganglion neurons that synapse with IHCs are the 3 key cochlear components in transducing acoustical vibrations into the neural signals. This report reviews three types of cochlear damage identified in laboratory animals that may not lead to overt hearing loss. The first type of cochlear impairment, such as missing a certain proportion of IHCs without damage to OHCs, may reduce the cochlear output and elevate response threshold; however, the reduced peripheral auditory sensitivity may be restored along the auditory pathway via central gain enhancement. The second type of cochlear impairment, such as selective damage to the synapses of the high-threshold thin auditory nerve fibers (ANFs), reduces cochlear output at high stimulation levels with no effect on response threshold. In this case the reduced cochlear output may be compensated along the auditory pathway as well. The third type of cochlear impairment, such as missing a certain number of OHCs without damage to others, may not even affect cochlear function at all. These "hidden" cochlear impairments do not result in overt hearing loss, but they may increase the vulnerability of the cochlea to traumatic exposure and lead to disrupted central auditory processing. 展开更多
关键词 hidden hearing loss OHC damage IHC damage Synaptopathy
下载PDF
Complex transient dynamics of hidden attractors in a simple 4D system 被引量:3
15
作者 党小宇 李春彪 +1 位作者 包伯成 武花干 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期270-274,共5页
A simple four-dimensional system with only one control parameter is proposed in this paper. The novel system has a line or no equilibrium for the global control parameter and exhibits complex transient transition beha... A simple four-dimensional system with only one control parameter is proposed in this paper. The novel system has a line or no equilibrium for the global control parameter and exhibits complex transient transition behaviors of hyperchaotic attractors, periodic orbits, and unstable sinks. Especially, for the nonzero-valued control parameter, there exists no equilibrium in the proposed system, leading to the formation of various hidden attractors with complex transient dynamics. The research results indicate that the dynamics of the system shows weak chaotic robustness and depends greatly on the initial states. 展开更多
关键词 transient dynamics hidden attractor EQUILIBRIUM
下载PDF
A new nonlinear oscillator with infinite number of coexisting hidden and self-excited attractors 被引量:2
16
作者 Yan-Xia Tang Abdul Jalil M Khalaf +3 位作者 Karthikeyan Rajagopal Viet-Thanh Pham Sajad Jafari Ye Tian 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第4期208-213,共6页
In this paper,we introduce a new two-dimensional nonlinear oscillator with an infinite number of coexisting limit cycles.These limit cycles form a layer-by-layer structure which is very unusual.Forty percent of these ... In this paper,we introduce a new two-dimensional nonlinear oscillator with an infinite number of coexisting limit cycles.These limit cycles form a layer-by-layer structure which is very unusual.Forty percent of these limit cycles are self-excited attractors while sixty percent of them are hidden attractors.Changing this new system to its forced version,we introduce a new chaotic system with an infinite number of coexisting strange attractors.We implement this system through field programmable gate arrays. 展开更多
关键词 chaotic oscillators MULTISTABILITY hidden attractors
下载PDF
An Intrusion Detection Method Based on Hierarchical Hidden Markov Models 被引量:2
17
作者 JIA Chunfu YANG Feng 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期135-138,共4页
This paper presents an anomaly detection approach to detect intrusions into computer systems. In this approach, a hierarchical hidden Markov model (HHMM) is used to represent a temporal profile of normal behavior in... This paper presents an anomaly detection approach to detect intrusions into computer systems. In this approach, a hierarchical hidden Markov model (HHMM) is used to represent a temporal profile of normal behavior in a computer system. The HHMM of the norm profile is learned from historic data of the system's normal behavior. The observed behavior of the system is analyzed to infer the probability that the HHMM of the norm profile supports the observed behavior. A low probability of support indicates an anomalous behavior that may result from intrusive activities. The model was implemented and tested on the UNIX system call sequences collected by the University of New Mexico group. The testing results showed that the model can clearly identify the anomaly activities and has a better performance than hidden Markov model. 展开更多
关键词 intrusion detection hierarchical hidden Markov model anomaly detection
下载PDF
Detecting Hidden Malware Method Based on "In-VM" Model 被引量:2
18
作者 陈林 刘波 +2 位作者 胡华平 肖枫涛 张静 《China Communications》 SCIE CSCD 2011年第4期99-108,共10页
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and... Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. 展开更多
关键词 network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization
下载PDF
Coexisting hidden attractors in a 4D segmented disc dynamo with one stable equilibrium or a line equilibrium 被引量:2
19
作者 鲍江宏 陈丹丹 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第8期14-23,共10页
This paper introduces a four-dimensional (4D) segmented disc dynamo which possesses coexisting hidden attractors with one stable equilibrium or a line equilibrium when parameters vary. In addition, by choosing an ap... This paper introduces a four-dimensional (4D) segmented disc dynamo which possesses coexisting hidden attractors with one stable equilibrium or a line equilibrium when parameters vary. In addition, by choosing an appropriate bifurcation parameter, the paper proves that Hopf bifurcation and pitchfork bifurcation occur in the system. The ultimate bound is also estimated. Some numerical investigations are also exploited to demonstrate and visualize the corresponding theoretical results. 展开更多
关键词 coexisting hidden attractors 4D segmented disc dynamo pitchfork bifurcation Hopf bifurcation ultimate bound estimation
下载PDF
Research on Hidden Failure Reliability Modeling of Electric Power System Protection 被引量:3
20
作者 Jingjing Zhang Ming Ding +1 位作者 Xianjun Qi Yi Guo 《Energy and Power Engineering》 2013年第4期1377-1382,共6页
Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection functi... Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection function under Condition-Based Maintenance (CBM) circumstance and reliability indices such as probability of protection system hidden failure state are calculated. Impacts of different parameters (containing impacts of human errors) to hidden failure state probability and the optimal measures to improve reliability by variable parameter method are also analyzed. It’s demonstrated here that: Compared to a single main protection, double main protection system has an increased hidden failure probability, thus the real good state probability decreases, two main protections’ reliability must be improved at the same time, so configuration of the whole protection system for the component being protected can’t be complicated. Through improving means of on-line self-checking and monitoring system in digital protection system and human reliability, the real application of CBM can decrease hidden failure state probability. Only through this way can we assure that the protection systems work in good state. It has a certain reference value to protection system reliability engineering. 展开更多
关键词 Double MAIN PROTECTION System hidden FAILURE MARKOV Method Condition-Based Maintenance (CBM) Human ERROR
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部