期刊文献+
共找到1,292篇文章
< 1 2 65 >
每页显示 20 50 100
Distribution Line Longitudinal ProtectionMethod Based on Virtual Measurement Current Restraint
1
作者 WeiWang Yang Yu +3 位作者 Simin Luo Wenlin Liu Wei Tang Yuanbo Ye 《Energy Engineering》 EI 2024年第2期315-337,共23页
As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on ... As an effective approach to achieve the“dual-carbon”goal,the grid-connected capacity of renewable energy increases constantly.Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions.However,the inherent randomness,intermittency,and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics.Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources.Therefore,a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper.The positive sequence current data and the network parameters are used to calculate the virtual measurement current which compensates for the output current of photovoltaic(PV).The waveform difference between the virtual measured current and the terminal current for internal and external faults is used to construct the protection method.An improved edit distance algorithm is proposed to measure the similarity between virtual measurement current and terminal measurement current.Finally,the feasibility of the protection method is verified through PSCAD simulation. 展开更多
关键词 Photovoltaic interconnection distribution network longitudinal protection method edit distance algorithm
下载PDF
Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs
2
作者 Lianghao Hua Jianfeng Zhang +1 位作者 Dejie Li Xiaobo Xi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2129-2157,共29页
With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rej... With the increasing prevalence of high-order systems in engineering applications, these systems often exhibitsignificant disturbances and can be challenging to model accurately. As a result, the active disturbance rejectioncontroller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmannedaerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances andthe possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address theseissues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neuralnetwork (RBFNN) with a second-order ADRC and leverages a fractional gradient descent (FGD) algorithm.We integrate the plant protection UAV model’s uncertain parameters, load disturbance parameters, and actuatorfault parameters and utilize the RBFNN for system parameter identification. The resulting ADRC exhibits loaddisturbance suppression and fault tolerance capabilities, and our proposed active fault-tolerant control law hasLyapunov stability implications. Experimental results obtained using a multi-rotor fault-tolerant test platformdemonstrate that the proposed method outperforms other control strategies regarding load disturbance suppressionand fault-tolerant performance. 展开更多
关键词 Radial basis function neural network plant protection unmanned aerial vehicle active disturbance rejection controller fractional gradient descent algorithm
下载PDF
Single Failure Routing Protection Algorithm in the Hybrid SDN Network 被引量:5
3
作者 Haijun Geng Jiangyuan Yao Yangyang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第7期665-679,共15页
Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet serv... Loop free alternate(LFA)is a routing protection scheme that is currently deployed in commercial routers.However,LFA cannot handle all single network component failure scenarios in traditional networks.As Internet service providers have begun to deploy software defined network(SDN)technology,the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time.Therefore,this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios.First,the deployment of LFA scheme in a hybrid SDN network is described as a 0-1 integer linear programming(ILP)problem.Then,two greedy algorithms,namely,greedy algorithm for LFA based on hybrid SDN(GALFAHSDN)and improved greedy algorithm for LFA based on hybrid SDN(IGALFAHSDN),are proposed to solve the proposed problem.Finally,both algorithms are tested in the simulation environment and the real platform.Experiment results show that GALFAHSDN and IGALFAHSDN can cope with all single network component failure scenarios when only a small number of nodes are upgraded to SDN nodes.The path stretch of the two algorithms is less than 1.36. 展开更多
关键词 Multipath routing network availability routing protection algorithm network failure hybrid SDN network
下载PDF
Transmission Lines Distance Protection Using Differential Equation Algorithm and Hilbert-Huang Transform
4
作者 Xingmao Liu Zhengyou He 《Journal of Power and Energy Engineering》 2014年第4期616-623,共8页
This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various fa... This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various factors, such as the distributed capacitance, the transient response characteristics of current transformer and voltage transformer, etc. In order to overcome this problem, the proposed scheme applies HHT to improve the apparent impedance estimated by DEA. Empirical mode decomposition (EMD) is used to decompose the data set from DEA into the intrinsic mode functions (IMF) and the residue. This residue has monotonic trend and is used to evaluate the impedance of faulty line. Simulation results show that the proposed scheme improves significantly the accuracy of the estimated impedance. 展开更多
关键词 Hilbert-Huang TRANSFORM DIFFERENTIAL EQUATION algorithm DISTANCE protection Transmission LINES
下载PDF
Efficient Routing Protection Algorithm Based on Optimized Network Topology
5
作者 Haijun Geng Zikun Jin +7 位作者 Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan 《Computers, Materials & Continua》 SCIE EI 2022年第9期4525-4540,共16页
Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of mes... Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability. 展开更多
关键词 Routing protection algorithm network availability network failure shortest path backup path
下载PDF
XGBoost Algorithm under Differential Privacy Protection
6
作者 Yuanmin Shi Siran Yin +1 位作者 Ze Chen Leiming Yan 《Journal of Information Hiding and Privacy Protection》 2021年第1期9-16,共8页
Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the X... Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the XGBoost can improve the classification accuracy while protecting privacy information.When using CART regression tree to build a single decision tree,noise is added according to Laplace mechanism.Compared with random forest algorithm,this algorithm can reduce computation cost and prevent overfitting to a certain extent.The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. 展开更多
关键词 Differential privacy privacy protection XGBoost algorithm CART regression tree
下载PDF
基于冗余度和方差的P-Cycle圈构造算法的研究 被引量:1
7
作者 孙强 李德莉 任叶 《铁道学报》 EI CAS CSCD 北大核心 2018年第12期101-107,共7页
铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVP... 铁路光传送网络是高速铁路地面基础设施的神经中枢,为避免网络故障给铁路运营带来巨大损失,重点研究光传送网P-Cycle(Pre-configured Cycle)保护技术,提出在圈扩展时以所有候选圈上未保护工作容量的方差、冗余度两个指标为比较标准的RVPA(Redundancy and Variance Based P-Cycle Construction Algorithm)算法。圈扩展的过程中,算法将选择方差与冗余度能同时满足条件的候选圈作为本轮扩展圈,有效限制了完成保护的P-Cycle圈个数;圈扩展停止条件中,当UPL与参数M、冗余度的大小关系满足条件时,则停止圈扩展,从而限制圈上节点数,使圈个数与圈长度得到有效均衡;在仿真过程中,利用泛欧网络拓扑COST239对RVPA算法进行仿真,并对比分析不同M值下的性能。仿真结果表明,在相同空闲资源与待保护工作容量设定下,参数M取0.5时效果最优,并且RVPA算法的保护容量效率、所需圈的个数、算法整体耗时、总冗余度均优于已有的POCA(P-Cycle Optimization Configuration Heuristic Algorithm)算法。 展开更多
关键词 生存性 p-cycle保护 p-cycle圈扩展算法 资源占用 保护容量效率
下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:3
8
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain privacy protection ZERO-KNOWLEDGE PROOF algorithm ACCOUNT and multi-asset MODEL
下载PDF
The Influence of Abnormal Data on Relay Protection 被引量:1
9
作者 Xuze Zhang Xiaoning Kang +2 位作者 Yali Ma Hao Wang Qiyue Huang 《Energy and Power Engineering》 2017年第4期95-101,共7页
The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fou... The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fourier Algorithm. Two simulation models are established in Matlab to study the influence of abnormal data on relay protection. The simulation results show that the abnormal data can make distance protection extend the fault’s influence and make over current protection start by error. 展开更多
关键词 RELAY protection ABNORMAL DATA FOURIER algorithm
下载PDF
Protection Coordination Optimization for FREEDM (Future Renewable Electric Energy Delivery and Management) System
10
作者 Mohamed F. Kotb Magdi El-Saadawi Eman H. El-Desouky 《Journal of Electrical Engineering》 2018年第3期161-176,共16页
The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) a... The FREEDM (future renewable electric energy delivery and management) system is a smart distribution system that facilitates seamless integration of high-penetration DRER (distributed renewable energy resources) and DESD (distributed energy storage devices) with the existing distribution system. Protection schemes have been proposed to detect the overcurrent faults throughout the FREEDM system, according to its requirements. In this paper the time inverse directional over current protection coordination scheme is developed as a backup protection when the primary protection communication failed. The proposed scheme is applied to FREEDM network using conventional mathematical model. To speed up the fault clearing time without coordination loss, the settings of the proposed relays in the two directions are minimized using genetic algorithm. The developed methods are validated using ETAP software. The results ensure that the faults throughout the FREEDM system sections are detected and the relays tripping time are minimized. 展开更多
关键词 FREEDM protection coordination genetic algorithm ETAP software.
下载PDF
基于区块链共识激励机制的新型联邦学习系统
11
作者 米波 翁渊 +1 位作者 黄大荣 刘洋 《信息安全学报》 CSCD 2024年第1期15-32,共18页
随着云存储、人工智能等技术的发展,数据的价值已获得显著增长。但由于昂贵的通信代价和难以承受的数据泄露风险迫使各机构间产生了“数据孤岛”问题,大量数据无法发挥它的经济价值。虽然将区块链作为承载联邦学习的平台能够在一定程度... 随着云存储、人工智能等技术的发展,数据的价值已获得显著增长。但由于昂贵的通信代价和难以承受的数据泄露风险迫使各机构间产生了“数据孤岛”问题,大量数据无法发挥它的经济价值。虽然将区块链作为承载联邦学习的平台能够在一定程度上解决该问题,但也带来了三个重要的缺陷:1)工作量证明(Proof of Work,POW)、权益证明(Proof of Stake,POS)等共识过程与联邦学习训练过程并无关联,共识将浪费大量算力和带宽;2)节点会因为利益的考量而拒绝或消极参与训练过程,甚至因竞争关系干扰训练过程;3)在公开的环境下,模型训练过程的数据难以溯源,也降低了攻击者的投毒成本。研究发现,不依靠工作量证明、权益证明等传统共识机制而将联邦学习与模型水印技术予以结合来构造全新的共识激励机制,能够很好地避免联邦学习在区块链平台上运用时所产生的算力浪费及奖励不均衡等情况。基于这种共识所设计的区块链系统不仅仍然满足不可篡改、去中心化、49%拜占庭容错等属性,还天然地拥有49%投毒攻击防御、数据非独立同分布(Not Identically and Independently Distributed,Non-IID)适应以及模型产权保护的能力。实验与论证结果都表明,本文所提出的方案非常适用于非信任的机构间利用大量本地数据进行商业联邦学习的场景,具有较高的实际价值。 展开更多
关键词 联邦学习 区块链 共识算法 模型产权保护 投毒攻击
下载PDF
基于多目标优化的变电站消防资源配置算法
12
作者 刘毅敏 张聪伟 王慧刚 《沈阳工业大学学报》 CAS 北大核心 2024年第1期29-34,共6页
针对变电站消防资源分配与分布不均匀的问题,提出了一种基于多目标优化的变电站消防资源配置算法。该算法采用电力生产场所的道路网作为变电站消防责任区划分的依据,并结合各划分区域的消防需求构建消防资源配置模型。根据该模型的特点... 针对变电站消防资源分配与分布不均匀的问题,提出了一种基于多目标优化的变电站消防资源配置算法。该算法采用电力生产场所的道路网作为变电站消防责任区划分的依据,并结合各划分区域的消防需求构建消防资源配置模型。根据该模型的特点,在帕累托最优解的约束下提出了一种基于模拟退火的多目标优化算法,来求解该消防资源配置模型。仿真与实验结果表明,所提出的消防资源配置模型更符合实际变电站各场所分布的特点,且所提出的多目标优化算法得到的消防资源分配结果能在消防资源有限的条件下,实现最大的配置效益和快速的消防响应。 展开更多
关键词 变电站 消防资源 多目标优化 智能算法 资源配置 帕累托最优解 模拟退火算法 道路网
下载PDF
基于灾变遗传算法的雷达防护装置多目标优化设计
13
作者 陈世荣 黄海涛 彭国朋 《机械设计与制造工程》 2024年第10期5-10,共6页
为了提高车载雷达的防护性能,提出了一种新型的自动化防护装置。通过对防护装置机构原理进行分析,建立了驱动连杆机构的运动学方程,获得了连杆机构关键节点的位置、速度和加速度方程;通过传动角分析获得油缸驱动的传动效率方程。依据分... 为了提高车载雷达的防护性能,提出了一种新型的自动化防护装置。通过对防护装置机构原理进行分析,建立了驱动连杆机构的运动学方程,获得了连杆机构关键节点的位置、速度和加速度方程;通过传动角分析获得油缸驱动的传动效率方程。依据分析结果,采用灾变遗传算法对防护装置以运动平稳性和传动效率为目标进行优化,结合工程实际获得了综合最优的机构形式。依据优化结果建立原理样机进行验证试验,结果表明,防护装置运动平稳,在最大风载荷作用下可正常工作,实现了综合最优的设计目标。 展开更多
关键词 防护装置 遗传算法 多目标优化
下载PDF
基于动作时限曲线拟合思想的含DG型配电网后备保护新方法
14
作者 黄景光 赵珩 +5 位作者 李浙栋 张宇鹏 梅诺男 孙佳航 张员宁 翁汉琍 《电网技术》 EI CSCD 北大核心 2024年第5期2199-2206,I0115,共9页
分布式电源(distributed generation,DG)的接入可能会改变电力系统的短路电流特性,从而影响到反时限过流保护的选择性和配合关系。为此,提出一种基于动作时限曲线拟合思想的含DG型配电网后备保护新方法。从配电网主保护和后备保护的动... 分布式电源(distributed generation,DG)的接入可能会改变电力系统的短路电流特性,从而影响到反时限过流保护的选择性和配合关系。为此,提出一种基于动作时限曲线拟合思想的含DG型配电网后备保护新方法。从配电网主保护和后备保护的动作时间差入手,建立曲线拟合模型,并运用梯度下降法对反时限过流保护的动作时限曲线进行优化。通过在优化整定计算中考虑保护的选择性以及DG接入所带来的影响,使优化参数适用于配电网中各分段位置。然后,在配电网中设置两相、三相短路故障,并根据故障位置、类型进行整定参数再调整,最终得到参数的全局最优解。基于PSCAD/EMTDC仿真软件进行仿真分析,验证了所提方法的有效性和实用性。 展开更多
关键词 反时限过流保护 分布式电源 梯度下降算法 曲线拟合 速动性 选择性
下载PDF
基于相邻争夺算法的无人机多架次植保作业路径规划
15
作者 沈跃 张凌飞 +2 位作者 沈亚运 储金城 刘慧 《农业工程学报》 EI CAS CSCD 北大核心 2024年第16期44-51,共8页
为了提高植保无人机作业效率,减少无人机作业损耗,该研究针对传统粒子群优化(particle swarm optimization,PSO)算法在规划植保作业路径时容易陷入局部最优,能耗最优方案的搜索能力低下等问题,该研究提出一种基于相邻争夺(adjacent comp... 为了提高植保无人机作业效率,减少无人机作业损耗,该研究针对传统粒子群优化(particle swarm optimization,PSO)算法在规划植保作业路径时容易陷入局部最优,能耗最优方案的搜索能力低下等问题,该研究提出一种基于相邻争夺(adjacent competition, AC)算法的植保无人机作业路径规划算法。首先,对所有粒子设置作业距离范围,以防止单次作业距离过长或过短的极端情况;其次,在作业距离范围内随机分配每个粒子的作业距离,作为搜索的初始值;最后,相邻粒子相互争夺作业距离间接改变各架次作业距离,搜索出最优路径。相邻争夺算法保证了植保无人机作业总距离一定,对搜索方向进行先验且保证特殊点不被遗漏,避免算法陷入局部最优解。使用Matlab软件对420 m×200 m的模拟植保场地进行算法仿真验证,传统粒子群算法常陷入局部最优解,在10次规划中相较于遍历出的能耗最优规划方案增加了16.16%~38.14%的能耗,本文提出的相邻争夺算法规划结果的能耗远低于传统粒子群算法,算法具有更强的搜索能力。使用RflySim仿真平台搭建植保无人机模型和420 m×200 m的作业场地,在虚拟环境下比较传统粒子群算法与相邻争夺算法规划结果的模拟跟踪情况,相邻争夺算法规划结果的能耗相较传统粒子群算法减少了25.15%。420 m×200 m作业场地实际飞行试验中,相邻争夺算法规划结果的能耗相较传统粒子群算法减少了34.48%,更适应多架次植保作业。 展开更多
关键词 植保 无人机 粒子群算法 相邻争夺算法 搜索能力 能耗最优
下载PDF
数据引流下异构传感器网络能量空洞防护算法
16
作者 王宗意 王玥 刘杨平 《计算机仿真》 2024年第4期368-372,共5页
异构传感器网络在工作时,靠近传感器基站位置的节点会由于接收转发次数较多而出现能量空洞现象。为有效对此现象实施防护,保障网络安全运行,提出数据引流下异构传感器网络能量空洞防护算法。构建网络节点部署模型,对传感器网络节点实施... 异构传感器网络在工作时,靠近传感器基站位置的节点会由于接收转发次数较多而出现能量空洞现象。为有效对此现象实施防护,保障网络安全运行,提出数据引流下异构传感器网络能量空洞防护算法。构建网络节点部署模型,对传感器网络节点实施节点优化部署;计算网络节点能耗对网络实施能量均衡控制,获取异构传感器网络节点的簇内传输跳数;结合获取的节点簇内跳数以及能量均衡结果开展节点接收数据的的引流分配,平衡传感器网络层内节点能量消耗,实现传感器网络的能量空洞防护。实验结果表明,使用上述方法开展传感器网络能量空洞防护时,数据转发接收能耗较低,防护方法性能高,防护效果好。 展开更多
关键词 数据引流 异构传感器网络 能量空洞 防护算法 节点部署优化
下载PDF
基于有限元法的油气田集输管网阴极保护布局优化
17
作者 曾维国 李曙华 +3 位作者 余文正 徐东 刘博宇 范峥 《腐蚀与防护》 CAS CSCD 北大核心 2024年第3期88-93,共6页
在利用有限元法建立外加电流阴极保护模型的基础上,借助Sobol灵敏度分析,确定了显著影响某油气田集输管网阴极保护效果的关键参数,并通过粒子群优化(PSO)算法对其系统布局进行优化。结果表明:由于外加电流阴极保护模型的模拟电位与测试... 在利用有限元法建立外加电流阴极保护模型的基础上,借助Sobol灵敏度分析,确定了显著影响某油气田集输管网阴极保护效果的关键参数,并通过粒子群优化(PSO)算法对其系统布局进行优化。结果表明:由于外加电流阴极保护模型的模拟电位与测试桩的测定电位误差较小,故该模型能够较好地反映出油气田集输管网的电位分布现状;改变防护涂层电阻率等一阶敏感性系数较高的因素会对阴极保护效果产生较大影响,土壤电阻率、防护涂层电阻率以及管道埋深与其他参数之间可能存在明显交互作用;当利用PSO算法对油气田集输管网的阴极保护效果进行全局寻优时,该模型经过47700次粒子进化迭代后的最佳阴极保护系统有效覆盖率高达99.14%,优化效果显著。 展开更多
关键词 油气田集输管网 阴极保护 有限元法 Sobol灵敏度分析 PSO算法 优化
下载PDF
基于深度强化学习和隐私保护的群智感知动态任务分配策略
18
作者 傅彦铭 陆盛林 +1 位作者 陈嘉元 覃华 《信息网络安全》 CSCD 北大核心 2024年第3期449-461,共13页
在移动群智感知(Mobile Crowd Sensing,MCS)中,动态任务分配的结果对提高系统效率和确保数据质量至关重要。然而,现有的大部分研究在处理动态任务分配时,通常将其简化为二分匹配模型,该简化模型未充分考虑任务属性与工人属性对匹配结果... 在移动群智感知(Mobile Crowd Sensing,MCS)中,动态任务分配的结果对提高系统效率和确保数据质量至关重要。然而,现有的大部分研究在处理动态任务分配时,通常将其简化为二分匹配模型,该简化模型未充分考虑任务属性与工人属性对匹配结果的影响,同时忽视了工人位置隐私的保护问题。针对这些不足,文章提出一种基于深度强化学习和隐私保护的群智感知动态任务分配策略。该策略首先通过差分隐私技术为工人位置添加噪声,保护工人隐私;然后利用深度强化学习方法自适应地调整任务批量分配;最后使用基于工人任务执行能力阈值的贪婪算法计算最优策略下的平台总效用。在真实数据集上的实验结果表明,该策略在不同参数设置下均能保持优越的性能,同时有效地保护了工人的位置隐私。 展开更多
关键词 群智感知 深度强化学习 隐私保护 双深度Q网络 能力阈值贪婪算法
下载PDF
改进巴氏距离算法下混合级联直流输电纵联阻抗保护优化
19
作者 王书征 李沛林 +3 位作者 杨军炜 张金华 施渊 刘康礼 《西安工程大学学报》 CAS 2024年第2期9-17,共9页
为提高纵联保护在LCC-MMC混合级联高压直流输电系统中的鲁棒性,提出一种基于纵联阻抗和改进巴氏距离算法的高压直流输电纵联保护方案。该方案将巴氏距离算法与纵联阻抗保护相结合,对被保护线路首末两端电气量的差异进行量化,并通过量化... 为提高纵联保护在LCC-MMC混合级联高压直流输电系统中的鲁棒性,提出一种基于纵联阻抗和改进巴氏距离算法的高压直流输电纵联保护方案。该方案将巴氏距离算法与纵联阻抗保护相结合,对被保护线路首末两端电气量的差异进行量化,并通过量化后的数据,进行区内外故障的判定,然后基于能量函数构建了故障选极判据,保证了保护的可靠性;在此基础上,通过分形维数构建了改进的自适应滑窗,提高了保护的速动性。最后,基于Matlab与PSCAD/EMTDC平台建立了“白江工程”±800 kV LCC-MMC混合级联高压直流输电系统模型,并对所提改进后的保护方案进行验证。仿真结果表明所提保护方案能够快速可靠地判别区内外故障并正确完成故障选极,且有着较好的耐受过渡电阻能力。 展开更多
关键词 混合级联直流输电 故障特性 纵联保护 纵联阻抗 巴氏距离算法 分形理论
下载PDF
基于全同态加密优化的云数据隐私保护方法
20
作者 王雪飞 王鹏 佟良 《计算机仿真》 2024年第5期522-526,共5页
为了提升云数据的安全性,改善数据加密时间长以及加密效果较差等问题,提出一种基于全同态加密优化的云数据隐私保护方法。通过生成对抗网络模型学习原始数据中的重要特征,确保合成的数据和初始数据之间具有较高的相似度,使其能够满足差... 为了提升云数据的安全性,改善数据加密时间长以及加密效果较差等问题,提出一种基于全同态加密优化的云数据隐私保护方法。通过生成对抗网络模型学习原始数据中的重要特征,确保合成的数据和初始数据之间具有较高的相似度,使其能够满足差分隐私特征。引入PKI对数据所有者和用户身份认证处理,完成密钥的产生和分发,根据差分隐私特征将用户所有者的数据划分为不同类型,获取用户访问特征向量。构建全同态加密机制,同时引入代理重加密机制,通过密钥转换完成数据加密处理,最终实现云数据全同态加密优化。实验对比结果表明,上述加密方案能够快速完成数据加密处理,有效确保数据的安全性。 展开更多
关键词 云数据 隐私保护 全同态加密算法 对抗网络生成 代理重加密机制
下载PDF
上一页 1 2 65 下一页 到第
使用帮助 返回顶部