期刊文献+
共找到208篇文章
< 1 2 11 >
每页显示 20 50 100
High Voltage Ride-through Control Strategy of Doubly Fed Induction Wind Generators Based on Virtual Impedance 被引量:2
1
作者 XIE Zhen ZHANG Xing +1 位作者 YANG Shuying SONG Haihua QU Tingyu 《中国电机工程学报》 EI CSCD 北大核心 2012年第27期I0001-I0001,共1页
With the rapid increase of wind farms,the grid code needs to be improved to meet the requirement of wind farms and enhance grid stability.Doubly-fed induction generators are largely used in wind turbines,but they are ... With the rapid increase of wind farms,the grid code needs to be improved to meet the requirement of wind farms and enhance grid stability.Doubly-fed induction generators are largely used in wind turbines,but they are very sensitive to grid disturbances.The voltage swell can be caused by switching on capacitor banks or switching off large loads,which may result in the reversal of the power flow in the grid convertor;the current may flow from the grid into the DC link,which may step up DC voltage,and result in large faults of rotor currents and instantaneous power oscillation.The grid reactive compensation devices can not have the automatic swithing function after the low voltage fault,which will result in local reactive power surplus,so some wind power generators will retreat from the grid under high voltage protection. 展开更多
关键词 wind power generator doubly fed induction generator(DFIG) virtual impedance high voltage ride through(HVRT)
在线阅读 下载PDF
An analytic electromagnetic calculation method for performance evolution of doubly fed induction generators for wind turbines 被引量:1
2
作者 张文娟 黄守道 +1 位作者 高剑 CHEN Zhe 《Journal of Central South University》 SCIE EI CAS 2013年第10期2763-2774,共12页
An analytic electromagnetic calculation method for doubly fed induction generator(DFIG) in wind turbine system was presented. Based on the operation principles, steady state equivalent circuit and basic equations of D... An analytic electromagnetic calculation method for doubly fed induction generator(DFIG) in wind turbine system was presented. Based on the operation principles, steady state equivalent circuit and basic equations of DFIG, the modeling for electromagnetic calculation of DFIG was proposed. The electromagnetic calculation of DFIG was divided into three steps: the magnetic flux calculation, parameters derivation and performance checks. For each step, the detailed numeric calculation formulas were all derived. Combining the calculation formulas, the whole electromagnetic calculation procedure was established, which consisted of three iterative calculation loops, including magnetic saturation coefficient, electromotive force and total output power. All of the electromagnetic and performance data of DIFG can be calculated conveniently by the established calculation procedure, which can be used to evaluate the new designed machine. A 1.5 MW DFIG designed by the proposed procedure was built, for which the whole type tests including no-load test, load test and temperature rising test were carried out. The test results have shown that the DFIG satisfies technical requirements and the test data fit well with the calculation results which prove the correctness of the presented calculation method. 展开更多
关键词 ELECTROMAGNETIC calculation DOUBLY fed INDUCTION generator(DFIG) wind TURBINE
在线阅读 下载PDF
Manipulation of vertical fence wake using passive vortex generators
3
作者 Kim Hyoung-Bum Kim Seoung-Jun +4 位作者 Tu Xin-Cheng Park Seung-Ha Kim Seoung-Jun Tu Xin-Cheng Park Seung-Ha 《排灌机械工程学报》 EI 北大核心 2014年第5期369-372,377,共5页
The effect of streamwise vortices generated from passive vortex generators was investigated to manipulate the separation bubble behind the vertical fence. The experiments were carried out in a circulating water channe... The effect of streamwise vortices generated from passive vortex generators was investigated to manipulate the separation bubble behind the vertical fence. The experiments were carried out in a circulating water channel and the velocity fields were measured using 2D and stereoscopic PIV method.The distance between the vortex generator and fence and the effect of the Reynolds number were investigated. In addition,the effect of boundary layer thickness was also investigated. The averaged recirculation lengths were compared with that of uncontrolled fence flow. The results showed the oscillatory variation of recirculation region appeared under the existence of vortex generators. The reduction of the separation bubble became larger when the fence was submerged in the thick boundary layer with increasing the distance between the generator and fence. When the boundary layer is thin,vortex generator can only suppress the separation bubble under the specific condition. 展开更多
关键词 vortex generator flow separation stereoscopic PIV EXPERIMENT
在线阅读 下载PDF
Weak generalized self-shrinking generators
4
作者 Dong Lihua Hu Yupu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期407-411,共5页
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security. 展开更多
关键词 CRYPTOGRAPHY Stream cipher Key recovery attacks Generalized self-shrinking sequence.
在线阅读 下载PDF
Application of Fractal Technology in the Generative Design of Chaoshan Drawnwork Patterns
5
作者 CHEN Jia-jun ZHANG Ya CHEN Zhao-yang 《印刷与数字媒体技术研究》 北大核心 2025年第5期179-194,共16页
Chaoshan drawnwork handkerchief design exhibits self-similarity and fractal characteristics due to their grid-based structure,overall symmetry,and the way local motifs reflect the whole pattern.To explore the potentia... Chaoshan drawnwork handkerchief design exhibits self-similarity and fractal characteristics due to their grid-based structure,overall symmetry,and the way local motifs reflect the whole pattern.To explore the potential of fractals in traditional textile design,a fractal-based generative framework was proposed for efficiently creating drawnwork patterns suitable for practical handicraft production.The research was initiated with an analysis of the structural composition of center,skeleton,and filler motifs extracted from a pattern sample library.Based on this hierarchical classification,the box-counting method was employed to calculate their respective fractal dimensions.Building on fractal art theory,generative algorithms,and studies on the application of Ultra Fractal,a Chaoshan drawnwork fractal design model was established.Using this model,51 drawnwork fractal patterns and 153 handkerchief patterns were generated.These patterns were subsequently applied in real-world production to validate the feasibility and value of fractal techniques in textile design. 展开更多
关键词 Chaoshan drawnwork Fractal pattern Generative design Cultural heritage
在线阅读 下载PDF
Image Super-Resolution Reconstruction Model Based on SRGAN
6
作者 LU Xin-ya CHEN Jia-yi +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 北大核心 2025年第5期21-28,共8页
Image super-resolution reconstruction technology is currently widely used in medical imaging,video surveillance,and industrial quality inspection.It not only enhances image quality but also improves details and visual... Image super-resolution reconstruction technology is currently widely used in medical imaging,video surveillance,and industrial quality inspection.It not only enhances image quality but also improves details and visual perception,significantly increasing the utility of low-resolution images.In this study,an improved image superresolution reconstruction model based on Generative Adversarial Networks(SRGAN)was proposed.This model introduced a channel and spatial attention mechanism(CSAB)in the generator,allowing it to effectively leverage the information from the input image to enhance feature representations and capture important details.The discriminator was designed with an improved PatchGAN architecture,which more accurately captured local details and texture information of the image.With these enhanced generator and discriminator architectures and an optimized loss function design,this method demonstrated superior performance in image quality assessment metrics.Experimental results showed that this model outperforms traditional methods,presenting more detailed and realistic image details in the visual effects. 展开更多
关键词 Image super-resolution reconstruction Generative Adversarial Networks CSAB PatchGAN architecture
在线阅读 下载PDF
Temperature control for liquid-cooled fuel cells based on fuzzy logic and variable-gain generalized supertwisting algorithm
7
作者 CHEN Lin JIA Zhi-huan +1 位作者 DING Tian-wei GAO Jin-wu 《控制理论与应用》 北大核心 2025年第8期1596-1605,共10页
The liquid cooling system(LCS)of fuel cells is challenged by significant time delays,model uncertainties,pump and fan coupling,and frequent disturbances,leading to overshoot and control oscillations that degrade tempe... The liquid cooling system(LCS)of fuel cells is challenged by significant time delays,model uncertainties,pump and fan coupling,and frequent disturbances,leading to overshoot and control oscillations that degrade temperature regulation performance.To address these challenges,we propose a composite control scheme combining fuzzy logic and a variable-gain generalized supertwisting algorithm(VG-GSTA).Firstly,a one-dimensional(1D)fuzzy logic controler(FLC)for the pump ensures stable coolant flow,while a two-dimensional(2D)FLC for the fan regulates the stack temperature near the reference value.The VG-GSTA is then introduced to eliminate steady-state errors,offering resistance to disturbances and minimizing control oscillations.The equilibrium optimizer is used to fine-tune VG-GSTA parameters.Co-simulation verifies the effectiveness of our method,demonstrating its advantages in terms of disturbance immunity,overshoot suppression,tracking accuracy and response speed. 展开更多
关键词 liquid-cooled fuel cell temperature control generalized supertwisting algorithm fuzzy control equilibrium optimizer
在线阅读 下载PDF
Ramsey numbers of edge-critical graphs versus large generalized fans
8
作者 Taiping Jiang Xinmin Hou 《中国科学技术大学学报》 北大核心 2025年第5期62-66,61,I0002,共7页
Given two graphs G and H,the Ramsey number R(G,H)is the smallest positive integer N such that every 2-coloring of the edges of K_(N)contains either a red G or a blue H.Let K_(N-1)■K_(1,k)be the graph obtained from K_... Given two graphs G and H,the Ramsey number R(G,H)is the smallest positive integer N such that every 2-coloring of the edges of K_(N)contains either a red G or a blue H.Let K_(N-1)■K_(1,k)be the graph obtained from K_(N-1)by adding anew vertexνconnecting k vertices of K_(N-1).A graph G withχ(G)=k+1 is called edge-critical if G contains an edge e such thatχ(G-e)=k.A considerable amount of research has been conducted by previous scholars on Ramsey numbers ofgraphs.In this study,we show that for an edge-critical graph G with x(G)=k+1,when k≥2,1≥2,and n is sufficiently large,R(G,K_(1)+nK_(t))=knt+1 and r,(G,K_(1)+nK_(t))=(k-1)nt+1. 展开更多
关键词 Ramsey number color critical graph generalized fan
在线阅读 下载PDF
Quantum Cryptanalysis of Lightweight Block Cipher TWINE-80
9
作者 SUN Ying WANG Chen-Xi +1 位作者 XIE Hui-Qin WANG Ke 《密码学报(中英文)》 北大核心 2025年第4期945-960,共16页
The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel s... The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel structure.By constructing a round function,a new 7-round quantum distinguisher for TWINE-80 is identified.Leveraging the reuse characteristics of round keys in the algorithm,three pairs of repeated round keys are discovered during the 5-round transformation process.Using Grover’s algorithm to search for partial round keys,a 17-round quantum key recovery attack on TWINE-80 is successfully implemented,with a time complexity of 296 and requiring 327 qubits.Compared to similar studies,this work reduces the time complexity by 26 and slightly decreases the required quantum resources by 12 qubits. 展开更多
关键词 generalized Feistel structure quantum key recovery attack TWINE algorithm
在线阅读 下载PDF
An improved model of the Pasternak foundation beam umbrella arch considering the generalized shear force
10
作者 CHEN Lei JIA Chao-jun +3 位作者 LEI Ming-feng HE Yan-chun SHI Cheng-hua LI Ao 《Journal of Central South University》 2025年第4期1503-1519,共17页
The existing analytical models for umbrella arch method(UAM)based on elastic foundation beams often overlook the influence of the surrounding soil beyond the beam edges on the shear stresses acting on the beam.Consequ... The existing analytical models for umbrella arch method(UAM)based on elastic foundation beams often overlook the influence of the surrounding soil beyond the beam edges on the shear stresses acting on the beam.Consequently,such models fail to adequately reflect the continuity characteristics of soil deformation.Leveraging the Pasternak foundation-Euler beam model,this study considers the generalized shear force on the beam to account for the influence of soil outside the beam ends on the shear stress.An analytical model for the deformation and internal forces of finite-length beams subjected to arbitrary loads is derived based on the initial parameter method under various conditions.The mechanical model of the elastic foundation beam for advanced umbrella arch under typical tunnel excavation cycles is established,yielding analytical solutions for the longitudinal response of the umbrella arch.The reliability of the analytical model is verified with the existing test data.The improved model addresses anomalies in existing models,such as abnormal upward deformation in the loosened segment and maximum deflection occurring within the soil mass.Additionally,dimensionless characteristic parameters reflecting the relative stiffness between the umbrella arch structure and the foundation soil are proposed.Results indicate that the magnitude of soil characteristic parameters significantly influences the deformation and internal forces of the umbrella arch.Within common ranges of soil values,the maximum deformation and internal forces of the umbrella arch under semi-logarithmic coordinates exhibit nearly linear decay with decreasing soil characteristic parameters.The impact of tunnel excavation height on the stress of unsupported sections of the umbrella arch is minor,but it is more significant for umbrella arch buried within the soil mass.Conversely,the influence of tunnel excavation advance on the umbrella arch is opposite. 展开更多
关键词 elastic foundation beam Pasternak foundation generalized shear umbrella arch analytical model
在线阅读 下载PDF
Generalized multiple-mode prolate spheroidal wave functions multi-carrier waveform with index modulation
11
作者 XU Zhichao LU Faping +5 位作者 ZHANG Lifan YANG Dongkai LIU Chuanhui KANG Jiafang AN Qi ZHANG Zhilin 《Journal of Systems Engineering and Electronics》 2025年第2期311-322,共12页
A generalized multiple-mode prolate spherical wave functions (PSWFs) multi-carrier with index modulation approach is proposed with the purpose of improving the spectral efficiency of PSWFs multi-carrier systems. The p... A generalized multiple-mode prolate spherical wave functions (PSWFs) multi-carrier with index modulation approach is proposed with the purpose of improving the spectral efficiency of PSWFs multi-carrier systems. The proposed method,based on the optimized multi-index modulation, does not limit the number of signals in the first and second constellations and abandons the concept of limiting the number of signals in different constellations. It successfully increases the spectrum efficiency of the system while expanding the number of modulation symbol combinations and the index dimension of PSWFs signals. The proposed method outperforms the PSWFs multi-carrier index modulation method based on optimized multiple indexes in terms of spectrum efficiency, but at the expense of system computational complexity and bit error performance. For example, with n=10 subcarriers and a bit error rate of 1×10^(-5),spectral efficiency can be raised by roughly 12.4%. 展开更多
关键词 prolate spherical wave function(PSWF) generalized multiple-mode index modulation spectral efficiency.
在线阅读 下载PDF
PM_(2.5) probabilistic forecasting system based on graph generative network with graph U-nets architecture
12
作者 LI Yan-fei YANG Rui +1 位作者 DUAN Zhu LIU Hui 《Journal of Central South University》 2025年第1期304-318,共15页
Urban air pollution has brought great troubles to physical and mental health,economic development,environmental protection,and other aspects.Predicting the changes and trends of air pollution can provide a scientific ... Urban air pollution has brought great troubles to physical and mental health,economic development,environmental protection,and other aspects.Predicting the changes and trends of air pollution can provide a scientific basis for governance and prevention efforts.In this paper,we propose an interval prediction method that considers the spatio-temporal characteristic information of PM_(2.5)signals from multiple stations.K-nearest neighbor(KNN)algorithm interpolates the lost signals in the process of collection,transmission,and storage to ensure the continuity of data.Graph generative network(GGN)is used to process time-series meteorological data with complex structures.The graph U-Nets framework is introduced into the GGN model to enhance its controllability to the graph generation process,which is beneficial to improve the efficiency and robustness of the model.In addition,sparse Bayesian regression is incorporated to improve the dimensional disaster defect of traditional kernel density estimation(KDE)interval prediction.With the support of sparse strategy,sparse Bayesian regression kernel density estimation(SBR-KDE)is very efficient in processing high-dimensional large-scale data.The PM_(2.5)data of spring,summer,autumn,and winter from 34 air quality monitoring sites in Beijing verified the accuracy,generalization,and superiority of the proposed model in interval prediction. 展开更多
关键词 PM_(2.5)interval forecasting graph generative network graph U-Nets sparse Bayesian regression kernel density estimation spatial-temporal characteristics
在线阅读 下载PDF
基于System Generator的卷积加速结构设计与实现
13
作者 成鸿群 刘宜成 +2 位作者 涂海燕 徐金鹏 王广泰 《计算机应用与软件》 北大核心 2024年第4期224-227,274,共5页
为解决卷积神经网络中卷积运算耗时长、运算复杂的问题,针对卷积运算的并行性特征,提出一种基于分块的流水线加速方法,并基于该方法在System Generator上进行了电路设计。通过在FPGA(Field-programmable Gate Array)上进行实验验证,该... 为解决卷积神经网络中卷积运算耗时长、运算复杂的问题,针对卷积运算的并行性特征,提出一种基于分块的流水线加速方法,并基于该方法在System Generator上进行了电路设计。通过在FPGA(Field-programmable Gate Array)上进行实验验证,该设计模型能正确输出卷积运算结果;在结构和输入数据相同的情况下,该设计模型在计算速度上相比于普通CPU最高可加速258倍,相比于服务器级CPU提高了近40倍,具有良好的加速效果。 展开更多
关键词 卷积神经网络 卷积运算 SYSTEM GENERATOR 现场可编程门阵列
在线阅读 下载PDF
Uncertainty quantification of mechanism motion based on coupled mechanism—motor dynamic model for ammunition delivery system 被引量:1
14
作者 Jinsong Tang Linfang Qian +3 位作者 Longmiao Chen Guangsong Chen Mingming Wang Guangzu Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期125-133,共9页
In this paper,a dynamic modeling method of motor driven electromechanical system is presented,and the uncertainty quantification of mechanism motion is investigated based on this method.The main contribution is to pro... In this paper,a dynamic modeling method of motor driven electromechanical system is presented,and the uncertainty quantification of mechanism motion is investigated based on this method.The main contribution is to propose a novel mechanism-motor coupling dynamic modeling method,in which the relationship between mechanism motion and motor rotation is established according to the geometric coordination of the system.The advantages of this include establishing intuitive coupling between the mechanism and motor,facilitating the discussion for the influence of both mechanical and electrical parameters on the mechanism,and enabling dynamic simulation with controller to take the randomness of the electric load into account.Dynamic simulation considering feedback control of ammunition delivery system is carried out,and the feasibility of the model is verified experimentally.Based on probability density evolution theory,we comprehensively discuss the effects of system parameters on mechanism motion from the perspective of uncertainty quantization.Our work can not only provide guidance for engineering design of ammunition delivery mechanism,but also provide theoretical support for modeling and uncertainty quantification research of mechatronics system. 展开更多
关键词 Ammunition delivery system Electromechanical coupling dynamics Uncertainty quantification Generalized probability density evolution
在线阅读 下载PDF
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
15
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 Intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Call for Papers:Special Issue of China Finance Review International Artificial Intelligence and Finance:Modern Approaches and Implications
16
《系统管理学报》 CSSCI CSCD 北大核心 2024年第1期276-277,共2页
Special Issue Guest Editors·Michael Gofman,Senior Lecturer in Finance at the Hebrew University of Jerusalem·Zhao Jin,Assistant Professor of Finance,CKGSB Special Issue Information Artificial intelligence(AI)... Special Issue Guest Editors·Michael Gofman,Senior Lecturer in Finance at the Hebrew University of Jerusalem·Zhao Jin,Assistant Professor of Finance,CKGSB Special Issue Information Artificial intelligence(AI)is becoming an increasingly important tool for fund managers,CFOs,regulators,traders,investors,and entrepreneurs.The generative AI revolution that started with the ChatGPT,has spurred a gale of creative destruction that poses risks and opportunities to most firms in the world. 展开更多
关键词 BECOMING GENERATIVE HAS
在线阅读 下载PDF
MTTSNet:Military time-sensitive targets stealth network via real-time mask generation
17
作者 Siyu Wang Xiaogang Yang +4 位作者 Ruitao Lu Zhengjie Zhu Fangjia Lian Qing-ge Li Jiwei Fan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期601-612,共12页
The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time... The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time-sensitive Targets Stealth Network via Real-time Mask Generation(MTTSNet).According to our knowledge,this is the first technology to automatically remove military targets in real-time from videos.The critical steps of MTTSNet are as follows:First,we designed a real-time mask generation network based on the encoder-decoder framework,combined with the domain expansion structure,to effectively extract mask images.Specifically,the ASPP structure in the encoder could achieve advanced semantic feature fusion.The decoder stacked high-dimensional information with low-dimensional information to obtain an effective mask layer.Subsequently,the domain expansion module guided the adaptive expansion of mask images.Second,a context adversarial generation network based on gated convolution was constructed to achieve background restoration of mask positions in the original image.In addition,our method worked in an end-to-end manner.A particular semantic segmentation dataset for military time-sensitive targets has been constructed,called the Military Time-sensitive Target Masking Dataset(MTMD).The MTMD dataset experiment successfully demonstrated that this method could create a mask that completely occludes the target and that the target could be hidden in real time using this mask.We demonstrated the concealment performance of our proposed method by comparing it to a number of well-known and highly optimized baselines. 展开更多
关键词 Deep learning Military application Targets stealth network Mask generation Generative adversarial network
在线阅读 下载PDF
分布式电源内阻抗引发前推回代潮流发散的问题 被引量:9
18
作者 巨云涛 吴文传 +1 位作者 张伯明 孙宏斌 《中国电机工程学报》 EI CSCD 北大核心 2014年第34期6185-6190,共6页
大量种类繁多的分布式电源接入可能运行在三相不平衡状态的配电网。分布式电源种类繁多,控制方式多样,并网阻抗等值参数取值范围较宽。前退回代是用于配网潮流计算的重要方法之一。通过数值仿真计算发现,分布式电源三序稳态模型的负序... 大量种类繁多的分布式电源接入可能运行在三相不平衡状态的配电网。分布式电源种类繁多,控制方式多样,并网阻抗等值参数取值范围较宽。前退回代是用于配网潮流计算的重要方法之一。通过数值仿真计算发现,分布式电源三序稳态模型的负序和零序阻抗在一定的取值范围内,会引起前推回代潮流计算发散。进一步分析潮流发散的原理,发现造成发散的原因是前推回代格式的谱半径大于1,并提出一种等值负序和零序阻抗补偿方法解决这一问题。 展开更多
关键词 配电网 分布式发电 前推回代潮流 收敛性分析 distributed generators (DGs)
在线阅读 下载PDF
Multiple-model GLMB filter based on track-before-detect for tracking multiple maneuvering targets
19
作者 CAO Chenghu ZHAO Yongbo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1109-1121,共13页
A generalized labeled multi-Bernoulli(GLMB)filter with motion mode label based on the track-before-detect(TBD)strategy for maneuvering targets in sea clutter with heavy tail,in which the transitions of the mode of tar... A generalized labeled multi-Bernoulli(GLMB)filter with motion mode label based on the track-before-detect(TBD)strategy for maneuvering targets in sea clutter with heavy tail,in which the transitions of the mode of target motions are modeled by using jump Markovian system(JMS),is presented in this paper.The close-form solution is derived for sequential Monte Carlo implementation of the GLMB filter based on the TBD model.In update,we derive a tractable GLMB density,which preserves the cardinality distribution and first-order moment of the labeled multi-target distribution of interest as well as minimizes the Kullback-Leibler divergence(KLD),to enable the next recursive cycle.The relevant simulation results prove that the proposed multiple-model GLMB-TBD(MM-GLMB-TBD)algorithm based on K-distributed clutter model can improve the detecting and tracking performance in both estimation error and robustness compared with state-of-the-art algorithms for sea clutter background.Additionally,the simulations show that the proposed MM-GLMB-TBD algorithm can accurately output the multitarget trajectories with considerably less computational complexity compared with the adapted dynamic programming based TBD(DP-TBD)algorithm.Meanwhile,the simulation results also indicate that the proposed MM-GLMB-TBD filter slightly outperforms the JMS particle filter based TBD(JMSMeMBer-TBD)filter in estimation error with the basically same computational cost.Finally,the impact of the mismatches on the clutter model and clutter parameter is investigated for the performance of the MM-GLMB-TBD filter. 展开更多
关键词 generalized labeled multi-Bernoulli(GLMB) trackbefore-detect(TBD) jump Markovian system(JMS) K-DISTRIBUTION Kullback-Leibler divergence(KLD)
在线阅读 下载PDF
Underwater Image Enhancement Based on Multi-scale Adversarial Network
20
作者 ZENG Jun-yang SI Zhan-jun 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期70-77,共8页
In this study,an underwater image enhancement method based on multi-scale adversarial network was proposed to solve the problem of detail blur and color distortion in underwater images.Firstly,the local features of ea... In this study,an underwater image enhancement method based on multi-scale adversarial network was proposed to solve the problem of detail blur and color distortion in underwater images.Firstly,the local features of each layer were enhanced into the global features by the proposed residual dense block,which ensured that the generated images retain more details.Secondly,a multi-scale structure was adopted to extract multi-scale semantic features of the original images.Finally,the features obtained from the dual channels were fused by an adaptive fusion module to further optimize the features.The discriminant network adopted the structure of the Markov discriminator.In addition,by constructing mean square error,structural similarity,and perceived color loss function,the generated image is consistent with the reference image in structure,color,and content.The experimental results showed that the enhanced underwater image deblurring effect of the proposed algorithm was good and the problem of underwater image color bias was effectively improved.In both subjective and objective evaluation indexes,the experimental results of the proposed algorithm are better than those of the comparison algorithm. 展开更多
关键词 Underwater image enhancement Generative adversarial network Multi-scale feature extraction Residual dense block
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部