期刊文献+
共找到279篇文章
< 1 2 14 >
每页显示 20 50 100
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres 被引量:2
1
作者 Emil Pop Gabriel-Ioan Ilcea Ionut-Alin Popa 《Engineering(科研)》 2018年第3期75-84,共10页
In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety a... In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety and positive security, the first part of the paper describes the potential risk the workers are facing while working in dangerous environments like coal mining with “grisou” atmospheres and what the conditions of an unfortunate event to take place are. We presented the diagram and working principle for intrinsic safety equipment used in potential explosive areas based on which we modeled and simulated the intrinsic and positive security distance control in order to get a software solution for it. We created an algorithm and simulated the process in Matlab Simulink. The simulation results done in Matlab Simulink were then entered into a Moeller PLC using a ladder-type programming language. For protection against explosive atmospheres, the PLC is inserted into a metal housing with intrinsic protection and Positive Security. 展开更多
关键词 Fire TRIANGLE distance CONTROL POSITIVE security Explosion Risk INTRINSIC Safety
下载PDF
Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
2
作者 Wenshu Xu Mingwei Lin 《Computers, Materials & Continua》 SCIE EI 2023年第10期199-222,共24页
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform... Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better. 展开更多
关键词 Multi-criteria decision-making distance measure probabilistic linguistic term sets industrial control system information security assessment
下载PDF
Steady-state Voltage Security-constrained Optimal Frequency Control for Weak HVDC Sending-end AC Power Systems
3
作者 Qiangqiang Wang Liangzhong Yao +3 位作者 Jian Xu Yuping Zheng Wei Li Wei Wang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第2期658-669,共12页
Due to the fact that a high share of renewable energy sources(RESs)are connected to high-voltage direct current(HVDC)sending-end AC power systems,the voltage and frequency regulation capabilities of HVDC sending-end A... Due to the fact that a high share of renewable energy sources(RESs)are connected to high-voltage direct current(HVDC)sending-end AC power systems,the voltage and frequency regulation capabilities of HVDC sending-end AC power systems have diminished.This has resulted in potential system operating problems such as overvoltage and overfrequency,which occur simultaneously when block faults exist in the HVDC link.In this study,a steady-state voltage security-constrained optimal frequency control method for weak HVDC sending-end AC power systems is proposed.The integrated virtual inertia control of RESs is employed for system frequency regulation.Additional dynamic reactive power compensation devices are utilized to control the voltage of all nodes meet voltage security constraints.Then,an optimization model that simultaneously considers the frequency and steady-state voltage security constraints for weak HVDC sending-end AC power systems is established.The optimal control scheme with the minimum total cost of generation tripping and additional dynamic reactive power compensation required is obtained through the optimization solution.Simulations are conducted on a modified IEEE 9-bus test system and practical Qing-Yu line commutated converter based HVDC(LCC-HVDC)sending-end AC power system to verify the effectiveness of the proposed method. 展开更多
关键词 Renewable energy source(RES) high-voltage direct current(HVDC) AC power system optimal frequency control steady-state voltage security dynamic reactive power compensation
原文传递
A long-distance quantum key distribution scheme based on pre-detection of optical pulse with auxiliary state 被引量:1
4
作者 权东晓 朱畅华 +1 位作者 刘世全 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期252-256,共5页
We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be ch... We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution (QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively. 展开更多
关键词 quantum key distribution PRE-DETECTION secure communication distance decoy state
下载PDF
Study on the Technology of Supplying Water Safely by Long-Distance Pipeline 被引量:3
5
作者 CHEN Yanbo YU Taipin +1 位作者 LIU Junhua ZHAO Hongbin 《Journal of Northeast Agricultural University(English Edition)》 CAS 2008年第3期80-85,共6页
The extensively built long-distance water transmission pipelines have become the main water sources for urban areas. To ensure the reliability and safety of the water supply, from the viewpoint of overall management, ... The extensively built long-distance water transmission pipelines have become the main water sources for urban areas. To ensure the reliability and safety of the water supply, from the viewpoint of overall management, it would be necessary to establish a system of information management for the pipeline. The monitoring, calculating and analyzing functions of the system serve to give controlling instructions and safe operating rules to the automatic equipment and technician, making sure the resistance coefficient distribution along the pipeline is reasonable; the hydraulic state transition is smooth when operating conditions change or water supply accidents occur, avoiding the damage of water hammer. This paper covered the composition structures of the information management system of long-distance water transmission pipelines and the functions of the subsystems, and finally elaborated on the approaches and steps of building a mathematics model for the analysis of dynamic hydraulic status. 展开更多
关键词 LONG-distance water transmission pipeline water supply security information management water hammer MODELING
下载PDF
DISTINIT:Data poISoning atTacks dectectIon usiNg optIized jaCcard disTance
6
作者 Maria Sameen Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第12期4559-4576,共18页
Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverag... Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverage this loophole and design data poisoning attacks against ML systems.Data poisoning attacks are a type of attack in which an adversary manipulates the training dataset to degrade the ML system’s performance.Data poisoning attacks are challenging to detect,and even more difficult to respond to,particularly in the Internet of Things(IoT)environment.To address this problem,we proposed DISTINIT,the first proactive data poisoning attack detection framework using distancemeasures.We found that Jaccard Distance(JD)can be used in the DISTINIT(among other distance measures)and we finally improved the JD to attain an Optimized JD(OJD)with lower time and space complexity.Our security analysis shows that the DISTINIT is secure against data poisoning attacks by considering key features of adversarial attacks.We conclude that the proposed OJD-based DISTINIT is effective and efficient against data poisoning attacks where in-time detection is critical for IoT applications with large volumes of streaming data. 展开更多
关键词 Data poisoning attacks detection framework jaccard distance(JD) optimized jaccard distance(OJD) security analysis
下载PDF
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
7
作者 Chen Ping Ji Yimu +2 位作者 Wang Ruchuan Huang Haiping Zhang Dan 《Journal of Electronics(China)》 2013年第2期190-197,共8页
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. 展开更多
关键词 secure multi-party computation PRIVACY-PRESERVING Euclid-distance protocol Wireless Sensor Networks (WSNs) Density-Based Clustering Protocol (DBCP)
下载PDF
动态安全智能评估中故障位置特征表达的电气坐标距离保持
8
作者 齐航 任喆 +1 位作者 李常刚 刘玉田 《中国电机工程学报》 EI CSCD 北大核心 2024年第12期4615-4625,I0003,共12页
电力系统动态安全性与故障位置密切相关,故障位置特征的准确表达是构建数据驱动动态安全评估模型的关键。该文基于电气坐标形式的故障位置特征表达方法,提出故障位置特征严格距离保持概念,构建计及故障位置特征距离保持的动态安全评估... 电力系统动态安全性与故障位置密切相关,故障位置特征的准确表达是构建数据驱动动态安全评估模型的关键。该文基于电气坐标形式的故障位置特征表达方法,提出故障位置特征严格距离保持概念,构建计及故障位置特征距离保持的动态安全评估模型。首先,证明全维电气坐标在切比雪夫距离度量下满足严格距离保持要求。然后,分析切比雪夫距离度量下电气坐标的距离保持能力与电气坐标维数间的关系。最后,基于K近邻算法构建计及电气坐标距离保持能力的暂态稳定极限切除时间评估模型。以某省级电网为例,验证故障位置电气坐标距离保持能力对动态安全评估精度的贡献。 展开更多
关键词 故障位置特征表达 数据驱动的动态安全评估 电气坐标 距离保持 切比雪夫距离
下载PDF
我国粮食安全水平测度及影响因素研究——基于2012—2022年31个省级面板数据 被引量:1
9
作者 徐明 陈斯洁 《河南社会科学》 CSSCI 北大核心 2024年第6期67-77,共11页
基于中国2012—2022年31个省区市面板数据,综合采用全局熵值法、TOPSIS距离函数法和灰色关联分析法,实证研究了中国粮食安全水平及影响因素。研究结果显示,2012—2022年我国大部分省区市粮食安全水平呈先下降后上升的趋势。从分维度指... 基于中国2012—2022年31个省区市面板数据,综合采用全局熵值法、TOPSIS距离函数法和灰色关联分析法,实证研究了中国粮食安全水平及影响因素。研究结果显示,2012—2022年我国大部分省区市粮食安全水平呈先下降后上升的趋势。从分维度指标综合指数的时间演化趋势来看,大部分省份的粮食供给安全、粮食生产稳定性安全、粮食生产持续性安全维度综合指数呈上升趋势,粮食生产持续性安全维度综合指数的变动较大。灰色关联分析结果显示,单位面积产量、耕地面积比例、农业机械总动力、人均粮食占有量、粮食生产波动系数等因素与粮食安全水平关联度较大。未来,应增强耕地生产能力,确保耕地面积的基本稳定;加强农业基础设施建设,持续提升粮食供给保障能力;促进农业产业化发展,优化粮食生产结构和布局;加强农业风险管理,推动农业科技创新和应用。 展开更多
关键词 粮食安全水平 影响因素 全局熵值法 TOPSIS距离函数法 灰色关联分析法
下载PDF
Trust-based Intelligent Scheme for Mitigating Black Hole Attacks in IoT
10
作者 Feroz Khan A.B Weslin D +1 位作者 Dilli Babu M Mohammed Muzaffar Hussain 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第3期39-50,共12页
Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.... Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT. 展开更多
关键词 Mobile ad-hoc network(MANET) routing Ad hoc On-demand Multipath distance Vector(AOMDV) trust model security
下载PDF
国家地下水监测工程(水利部分)数据交换关键技术
11
作者 刘杰 王卓然 《水利信息化》 2024年第4期71-74,共4页
以水利行业典型的四级(水利部—流域—省—地市)交换应用场景,以及水利部和自然资源部两部地下水监测数据实时交换共享的应用场景为基础,针对水利行业复杂网络条件下海量数据长距离实时和跨部委海量异构数据可信等交换需求,提出多源数... 以水利行业典型的四级(水利部—流域—省—地市)交换应用场景,以及水利部和自然资源部两部地下水监测数据实时交换共享的应用场景为基础,针对水利行业复杂网络条件下海量数据长距离实时和跨部委海量异构数据可信等交换需求,提出多源数据长距离传输适配对接、海量数据交换分布式协同调度、基于安全隔离网闸双向可信交换和两部海量异构数据融合共享等4项技术,从核心结构和原理层面对技术进行总结,并基于实际运行经验提出下一步升级建议。目前,4项技术在国家地下水监测工程(水利部分)中普遍应用及推广,应用结果表明:数据交换关键技术可实现复杂条件下的数据交换与共享,以及两部国家地下水监测数据的实时汇集、上报、共享和交换,并为地方地下水监测站数据汇交至流域分中心和国家中心提供技术支撑。 展开更多
关键词 地下水监测工程 数据交换 安全可信交换 跨网长距离交换 海量异构交换
下载PDF
基于XGBoost算法的医保信息系统入侵安全风险监测方法
12
作者 刘佩 《中国医疗设备》 2024年第5期61-65,共5页
目的针对常规的医保信息系统对入侵行为的判定过程较为繁杂、监测反应时间较长的问题,提出基于XGBoost算法的医保信息系统入侵安全风险监测方法。方法按照安全性影响因素的关系,对安全因素关联度修正强度进行计算与修正,并对修正后的安... 目的针对常规的医保信息系统对入侵行为的判定过程较为繁杂、监测反应时间较长的问题,提出基于XGBoost算法的医保信息系统入侵安全风险监测方法。方法按照安全性影响因素的关系,对安全因素关联度修正强度进行计算与修正,并对修正后的安全因素关联进行划分,得到划分的系统入侵安全信息关联度;根据划分关联度参数,基于XGBoost算法对入侵行为进行分级判定;按照结果,使用树编辑距离算法,对入侵行为信息进行匹配,并建立神经网络监测结构;根据匹配结果建立对应报警机制,实现对医保信息系统入侵安全风险的实时监测。结果实验结果表明,本文方法对医保信息系统入侵安全风险的监测平均反应时间小于3 s,反应时间较短,安全性较高。结论本文提出的基于XGBoost算法的医保信息系统入侵安全风险监测方法,能够有效监测医保信息系统的入侵安全风险,具有较高的应用价值。 展开更多
关键词 XGBoost算法 医保信息系统 入侵安全风险监测 行为识别 安全因素关联 树编辑距离算法
下载PDF
基于AODV协议的电力通信网络拥塞安全控制研究
13
作者 王超 舒畅 《通信电源技术》 2024年第19期182-184,共3页
电力通信网络传输阶段的路由缺乏对链路节点状态的分析,导致传输数据的投递率较低,因此提出基于无线自组网按需平面距离矢量路由(Ad hoc On-Demand Distance Vector Routing,AODV)协议的电力通信网络拥塞安全控制研究。通过构建AODV协... 电力通信网络传输阶段的路由缺乏对链路节点状态的分析,导致传输数据的投递率较低,因此提出基于无线自组网按需平面距离矢量路由(Ad hoc On-Demand Distance Vector Routing,AODV)协议的电力通信网络拥塞安全控制研究。通过构建AODV协议节点筛选机制,从位置维度初次筛选出满足通信传输范围的节点,从速度维度二次筛选出性能满足传输需求的节点,从方向维度确定与电力通信传输方向一致的节点集合。以负载均衡为目标函数,建立AODV协议的响应链路。经过实际测试,与对照组相比,发包速率并未对文章设计方法的投递率造成显著影响,具体的投递率始终在95%以上,在稳定性和有效性方面具有显著优势。 展开更多
关键词 无线自组网按需平面距离矢量路由(AODV) 网络拥塞 安全控制 节点筛选 负载均衡
下载PDF
弱电设备远距离供电探讨
14
作者 赵时昌 金超 李凡龙 《建筑电气》 2024年第6期16-20,共5页
针对离电源点较远的弱电设备取电较难、供电距离较长的问题,结合宽电压输入范围直流电源的实际电压输入需求、规范要求的电压降范围,在满足接地故障保护、短路保护等要求的前提下,进行计算和分析,提出远距离场所弱电设备低压供电距离的... 针对离电源点较远的弱电设备取电较难、供电距离较长的问题,结合宽电压输入范围直流电源的实际电压输入需求、规范要求的电压降范围,在满足接地故障保护、短路保护等要求的前提下,进行计算和分析,提出远距离场所弱电设备低压供电距离的观点。 展开更多
关键词 宽电压输入范围直流电源 电压损失 接地故障保护 短路保护 供电距离 热稳定校验 安防设备 直流电源
下载PDF
恶意模型下汉明距离的保密计算
15
作者 刘新 涂小芬 +3 位作者 胡翔瑜 徐刚 陈秀波 刘晓梦 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2023年第6期992-1000,共9页
针对如何在保密数据隐私的情况下计算出不同字符串的汉明距离问题,定义了0-1编码规则,基于椭圆曲线加密算法,设计了一个半诚实模型下保密计算汉明距离的安全协议。针对半诚实模型协议中可能的恶意行为,利用分割-选择和零知识证明方法,... 针对如何在保密数据隐私的情况下计算出不同字符串的汉明距离问题,定义了0-1编码规则,基于椭圆曲线加密算法,设计了一个半诚实模型下保密计算汉明距离的安全协议。针对半诚实模型协议中可能的恶意行为,利用分割-选择和零知识证明方法,设计了恶意模型下的汉明距离安全计算协议,利用理想-实际范例方法证明了协议的安全性。对两个协议与现有协议进行了效率分析及模拟实验,通过对比可知,两协议在半诚实模型和恶意模型下的效率均有所提升。 展开更多
关键词 汉明距离 安全多方计算 恶意模型 分割-选择方法 理想-实际范例
下载PDF
基于安全域的并网型微电网能量优化新方法
16
作者 肖峻 李瑾一 宋晨辉 《电力自动化设备》 EI CSCD 北大核心 2023年第6期62-70,共9页
提出一种基于安全域的并网型微电网能量优化新方法。提出并网型微电网安全域的定义与模型,分别对N-0安全与N-1安全的微电网安全域进行刻画;考虑微电网的安全性与经济性,以微电网经济效益与馈线安全距离为优化目标,建立一种基于安全域的... 提出一种基于安全域的并网型微电网能量优化新方法。提出并网型微电网安全域的定义与模型,分别对N-0安全与N-1安全的微电网安全域进行刻画;考虑微电网的安全性与经济性,以微电网经济效益与馈线安全距离为优化目标,建立一种基于安全域的微电网能量优化模型,在规划安全域范围内采用YALMIP工具箱与CPLEX求解器对模型进行求解。算例展示了微电网安全域,验证了能量优化模型的有效性。相较于现有方法,所提方法能够量化系统安全裕度,综合考虑微电网的安全裕度与经济效益。 展开更多
关键词 并网型微电网 安全域 能量优化 经济效益 安全距离
下载PDF
保护隐私的集合相似性度量协同计算协议 被引量:2
17
作者 逯绍锋 胡玉龙 逯跃锋 《计算机技术与发展》 2023年第1期137-143,共7页
集合相似性度量是机器学习领域的基本问题之一,研究如何在保护数据隐私的前提下计算两个集合间的相似性问题,在保护数据隐私的机器学习、图形识别、生物信息学等方面有着重要的理论意义与应用价值。在机器学习中估算不同样本集合之间的... 集合相似性度量是机器学习领域的基本问题之一,研究如何在保护数据隐私的前提下计算两个集合间的相似性问题,在保护数据隐私的机器学习、图形识别、生物信息学等方面有着重要的理论意义与应用价值。在机器学习中估算不同样本集合之间的相似性时,通常通过计算集合相似度来对样本之间的相似程度进行估算,这一类集合之间的相似度统称为集合距离。其中,最常用到的集合距离就是杰卡德距离。文中从集合间杰卡德距离入手,首先通过设计一种新的编码方法,对参与计算的数据进行位置数字编码,将相似性度量问题转化为求两集合间相同数字个数问题,进而结合异或思想,借助同态加密体制具体设计了可以保护隐私的集合杰卡德距离协同计算协议,从而解决了集合间相似性度量的隐私保护问题。模拟器证明该协议是安全的,结果分析表明协议可以高效安全地判定出两对象间集合数据的相似性,在保护隐私的集合相似性度量方面,该方法具备一定的普适性。 展开更多
关键词 隐私保护 安全多方计算 杰卡德距离 集合相似性度量 机器学习
下载PDF
露天深孔台阶爆破振动特征分析及安全控制 被引量:4
18
作者 崔年生 《中国矿业》 2023年第3期86-90,共5页
为了分析爆破振动作用下露天开采临近巷道稳定性问题,开展爆破振动监测试验。通过对矿山工程概况和爆破参数的调查,设计监测方案,统计分析监测结果。结果表明:最大爆破振速为3.53 cm/s,小于极限值5 cm/s;三个方向振速衰减方程可以较好... 为了分析爆破振动作用下露天开采临近巷道稳定性问题,开展爆破振动监测试验。通过对矿山工程概况和爆破参数的调查,设计监测方案,统计分析监测结果。结果表明:最大爆破振速为3.53 cm/s,小于极限值5 cm/s;三个方向振速衰减方程可以较好地描述振速衰减规律;爆破振动速度随着爆心距的增大而降低,爆破振速在垂直方向衰减最快,径向次之,水平方向衰减最慢;基于各监测点的主频率在20~100 Hz之间振频分布范围较广,最大值较高;在不考虑重复导致围岩爆破损伤积累的前提下,露天开挖爆破振动不会引起平硐的破坏。 展开更多
关键词 爆破振动 回归分析 频率 衰减规律 安全控制 爆心距
下载PDF
Security Region: An Intelligent Approach to Transportation Networks
19
作者 Jun Xiao Menghao Long +1 位作者 Guoqiang Zu Qisi Lin 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第4期1532-1539,共8页
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in... This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD. 展开更多
关键词 Boundary distance evolution security region transportation network TransCAD.
原文传递
国标GB 4793.1—2007中电气间隙和爬电距离的研究 被引量:1
20
作者 谢倍睦 谭嘉慧 《电子产品可靠性与环境试验》 2023年第3期103-108,共6页
电气间隙与爬电距离对电气产品的安全防护起着非常重要的作用。如果相关绝缘位置的距离不能满足要求,带电部件和可触及部件之间就存在短路的安全隐患,可能造成电气产品泄漏电流增加、电气强度下降、安全性能降低,从而使可触及部件带电,... 电气间隙与爬电距离对电气产品的安全防护起着非常重要的作用。如果相关绝缘位置的距离不能满足要求,带电部件和可触及部件之间就存在短路的安全隐患,可能造成电气产品泄漏电流增加、电气强度下降、安全性能降低,从而使可触及部件带电,直接威胁到使用人员或操作人员的生命安全。对电气间隙和爬电距离进行了分析与讨论,首先,介绍了影响电气间隙和爬电距离的因素;然后,阐述了电气间隙和爬电距离的测量方法,以期对相关产品的研发和设计提供一些借鉴作用。 展开更多
关键词 电气间隙 爬电距离 安全防护
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部