Visible to the public Biblio

Filters: Keyword is Q measurement  [Clear All Filters]
2020-08-03
Huang, Xing-De, Fu, Chen-Zhao, Su, Lei, Zhao, Dan-Dan, Xiao, Rong, Lu, Qi-Yu, Si, Wen-Rong.  2019.  Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection System: The Software Development. 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). :671–675.
At present, the AE method has the advantages of live measurement, online monitoring and easy fault location, so it is very suitable for insulation defect detection of power equipments such as GIS, etc. In this paper, development of a data processing software for PD acoustic detection based on a general fast analysis algorithm model is introduced. With considering the signal flow chart of current acoustic detection system widely used in operation and maintenance of power system equipments, the main function of the developed PD AE signals analysis software was designed, including the detailed analysis of individual data file, identification with phase compensation based on 2D PRPD histograms, batch processing analysis of data files, management of discharge fingerprint library and display of typical defect discharge data. And all of the corresponding developed software pages are displayed.
Si, Wen-Rong, Huang, Xing-De, Xin, Zi, Lu, Bing-Bing, Bao, Hai-Long, Xu, Peng, Li, Jun-Hao.  2019.  Research on a General Fast Analysis Algorithm Model for PD Acoustic Detection System: Pattern Identification with Phase Compensation. 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). :288–292.
At present, the acoustic emission (AE) method has the advantages of live measurement and easy fault location, so it is very suitable for insulation defect detection of power equipments such as GIS, etc. While the conventional AE detection system or instruments always can't give a right discrimination result, because them always work based on the reference voltage or phase information from an auxiliary 220V voltage signal source rather than the operation high voltage (HV) with the real phase information corresponding to the detected AE pulsed signals. So there is a random phase difference between the reference phase and operation phase. The discharge fingerprint formed by the detected AE pulsed signals with reference phase using the same processing process is compared to the discharge fingerprint database formed in the HV laboratory with the real phase information, therefore, the system may not be able to discriminate the discharge mode of the field measured data from GIS in substation operation. In this paper, in order to design and develop a general fast analysis algorithm model for PD acoustic detection system to make an assistant diagnosis, the pattern identification with phase compensation was designed and applied. The results show that the method is effective and useful to deatl with AE signals meased in operation situation.
2020-06-02
Gagliano, Allison, Krawec, Walter O., Iqbal, Hasan.  2019.  From Classical to Semi-Quantum Secure Communication. 2019 IEEE International Symposium on Information Theory (ISIT). :1707—1711.

In this work we introduce a novel QKD protocol capable of smoothly transitioning, via a user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum communication resources on secure key distribution. We perform an information theoretic security analysis of this protocol to determine what level of "quantumness" is sufficient to achieve security, and we discover some rather interesting properties of this protocol along the way.

2020-01-21
Li, Shu, Tian, Jianwei, Zhu, Hongyu, Tian, Zheng, Qiao, Hong, Li, Xi, Liu, Jie.  2019.  Research in Fast Modular Exponentiation Algorithm Based on FPGA. 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). :79–82.
Modular exponentiation of large number is widely applied in public-key cryptosystem, also the bottleneck in the computation of public-key algorithm. Modular multiplication is the key calculation in modular exponentiation. An improved Montgomery algorithm is utilized to achieve modular multiplication and converted into systolic array to increase the running frequency. A high efficiency fast modular exponentiation structure is developed to bring the best out of the modular multiplication module and enhance the ability of defending timing attacks and power attacks. For 1024-bit key operands, the design can be run at 170MHz and finish a modular exponentiation in 4,402,374 clock cycles.
2018-05-09
Tsujii, Y., Kawakita, K. E., Kumagai, M., Kikuchi, A., Watanabe, M..  2017.  State Estimation Error Detection System for Online Dynamic Security Assessment. 2017 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT). :1–5.

Online Dynamic Security Assessment (DSA) is a dynamical system widely used for assessing and analyzing an electrical power system. The outcomes of DSA are used in many aspects of the operation of power system, from monitoring the system to determining remedial action schemes (e.g. the amount of generators to be shed at the event of a fault). Measurement from supervisory control and data acquisition (SCADA) and state estimation (SE) results are the inputs for online-DSA, however, the SE error, caused by sudden change in power flow or low convergence rate, could be unnoticed and skew the outcome. Therefore, generator shedding scheme cannot achieve optimum but must have some margin because we don't know how SE error caused by these problems will impact power system stability control. As a method for solving the problem, we developed SE error detection system (EDS), which is enabled by detecting the SE error that will impact power system transient stability. The method is comparing a threshold value and an index calculated by the difference between SE results and PMU observation data, using the distance from the fault point and the power flow value. Using the index, the reliability of the SE results can be verified. As a result, online-DSA can use the SE results while avoiding the bad SE results, assuring the outcome of the DSA assessment and analysis, such as the amount of generator shedding in order to prevent the power system's instability.

2018-03-19
Liang, G., Weller, S. R., Zhao, J., Luo, F., Dong, Z. Y..  2017.  False Data Injection Attacks Targeting DC Model-Based State Estimation. 2017 IEEE Power Energy Society General Meeting. :1–5.

The false data injection attack (FDIA) is a form of cyber-attack capable of affecting the secure and economic operation of the smart grid. With DC model-based state estimation, this paper analyzes ways of constructing a successful attacking vector to fulfill specific targets, i.e., pre-specified state variable target and pre-specified meter target according to the adversary's willingness. The grid operator's historical reading experiences on meters are considered as a constraint for the adversary to avoid being detected. Also from the viewpoint of the adversary, we propose to take full advantage of the dual concept of the coefficients in the topology matrix to handle with the problem that the adversary has no access to some meters. Effectiveness of the proposed method is validated by numerical experiments on the IEEE-14 benchmark system.

2017-03-08
Shen, M., Liu, F..  2015.  Query of Uncertain QoS of Web Service. 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associate. :1780–1785.

Quality of service (QoS) has been considered as a significant criterion for querying among functionally similar web services. Most researches focus on the search of QoS under certain data which may not cover some practical scenarios. Recent approaches for uncertain QoS of web service deal with discrete data domain. In this paper, we try to build the search of QoS under continuous probability distribution. We offer the definition of two kinds of queries under uncertain QoS and form the optimization approaches for specific distributions. Based on that, the search is extended to general cases. With experiments, we show the feasibility of the proposed methods.