期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Data Driven Security Correction Method for Power Systems with UPFC 被引量:1
1
作者 Qun Li Ningyu Zhang +2 位作者 Jianhua Zhou Xinyao Zhu Peng Li 《Energy Engineering》 EI 2023年第6期1485-1502,共18页
The access of unified power flow controllers(UPFC)has changed the structure and operation mode of power grids all across the world,and it has brought severe challenges to the traditional real-time calculation of secur... The access of unified power flow controllers(UPFC)has changed the structure and operation mode of power grids all across the world,and it has brought severe challenges to the traditional real-time calculation of security correction based on traditionalmodels.Considering the limitation of computational efficiency regarding complex,physical models,a data-driven power system security correction method with UPFC is,in this paper,proposed.Based on the complex mapping relationship between the operation state data and the security correction strategy,a two-stage deep neural network(DNN)learning framework is proposed,which divides the offline training task of security correction into two stages:in the first stage,the stacked auto-encoder(SAE)classification model is established,and the node correction state(0/1)output based on the fault information;in the second stage,the DNN learningmodel is established,and the correction amount of each action node is obtained based on the action nodes output in the previous stage.In this paper,the UPFC demonstration project of NanjingWest Ring Network is taken as a case study to validate the proposed method.The results show that the proposed method can fully meet the real-time security correction time requirements of power grids,and avoid the inherent defects of the traditional model method without an iterative solution and can also provide reasonable security correction strategies for N-1 and N-2 faults. 展开更多
关键词 MANUSCRIPT security correction data-driven deep neural network(DNN) unified power flow controller(UPFC) overload of transmission lines
下载PDF
A measurement-device-independent quantum key distribution protocol with a heralded single photon source 被引量:8
2
作者 周媛媛 周学军 苏彬彬 《Optoelectronics Letters》 EI 2016年第2期148-151,共4页
With a heralded single photon source(HSPS), a measurement-device-independent quantum key distribution(MDIQKD) protocol is proposed, combined with a three-intensity decoy-state method. HSPS has the two-mode characteris... With a heralded single photon source(HSPS), a measurement-device-independent quantum key distribution(MDIQKD) protocol is proposed, combined with a three-intensity decoy-state method. HSPS has the two-mode characteristic, one mode is used as signal mode, and the other is used as heralded mode to reduce the influence of the dark count. The lower bound of the yield and the upper bound of the error rate are deduced and the performance of the MDI-QKD protocol with an HSPS is analyzed. The simulation results show that the MDI-QKD protocol with an HSPS can achieve a key generation rate and a secure transmission distance which are close to the theoretical limits of the protocol with a single photon source(SPS). Moreover, the key generation rate will improve with the raise of the senders' detection efficiency. The key generation rate of the MDI-QKD protocol with an HSPS is a little less than that of the MDI-QKD protocol with a weak coherent source(WCS) in the close range, but will exceed the latter in the far range. Furthermore, a farther transmission distance is obtained due to the two-mode characteristic of HSPS. 展开更多
关键词 photon coherent decoy secure exceed latter raise correction deduced limits
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部