您的位置: 专家智库 > >

国家自然科学基金(61233016)

作品数:16 被引量:475H指数:7
相关作者:曹军威陈震陆超高田谢涛更多>>
相关机构:清华大学深圳供电局有限公司北京工商大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划南方电网公司科技项目更多>>
相关领域:自动化与计算机技术电气工程电子电信更多>>

文献类型

  • 16篇期刊文章
  • 1篇会议论文

领域

  • 10篇自动化与计算...
  • 6篇电气工程
  • 3篇电子电信

主题

  • 3篇电能
  • 3篇电能质量
  • 3篇电网
  • 3篇网络
  • 3篇CLOUD_...
  • 2篇电池
  • 2篇电压
  • 2篇电压恢复
  • 2篇动态电压
  • 2篇动态电压恢复...
  • 2篇暂态
  • 2篇仿真
  • 2篇分布式
  • 2篇储能
  • 1篇电池储能
  • 1篇电池储能系统
  • 1篇电池管理
  • 1篇电池荷电状态
  • 1篇电力
  • 1篇电力系统

机构

  • 10篇清华大学
  • 4篇深圳供电局有...
  • 2篇北京工商大学
  • 1篇复旦大学
  • 1篇国家电网公司
  • 1篇清华信息科学...
  • 1篇浙江清华长三...

作者

  • 9篇曹军威
  • 2篇陈震
  • 2篇廉小亲
  • 2篇王淼
  • 2篇陆超
  • 2篇张少杰
  • 2篇高田
  • 2篇谢涛
  • 1篇钱瀚
  • 1篇卢暾
  • 1篇丁向华
  • 1篇林闯
  • 1篇孟坤
  • 1篇王继业
  • 1篇阳子婧
  • 1篇杨明博
  • 1篇万宇鑫
  • 1篇涂国煜
  • 1篇刘小非
  • 1篇夏艾瑄

传媒

  • 6篇Tsingh...
  • 2篇南方电网技术
  • 1篇计算机学报
  • 1篇计算机工程
  • 1篇计算机工程与...
  • 1篇电力系统保护...
  • 1篇中国科学:信...
  • 1篇集成技术
  • 1篇智能电网
  • 1篇智能电网(汉...

年份

  • 1篇2017
  • 2篇2016
  • 3篇2015
  • 3篇2014
  • 7篇2013
  • 1篇2012
16 条 记 录,以下是 1-10
排序方式:
电压不平衡跌落时动态电压恢复器的快速PLL策略被引量:1
2016年
传统的锁相环(PLL)算法不能满足动态电压恢复器(DVR)在三相电压不平衡故障时的快速准确锁相要求。在分析传统PLL的基础上,提出了dαβ-PLL和"推演顺接"相结合的锁相策略。新的锁相策略在电压跌落开始的第一个周波T(20 ms)内基于历史数据进行推演并锁定相位;一个周波之后采用dαβ-PLL来锁定相位。仿真结果与样机试验验证了新型PLL锁相策略在三相电压不平衡跌落故障时能够快速准确锁相,可以满足DVR的使用要求。
胡军曹军威张少杰杨洁袁仲达胡子珩姚森敬张华赢
关键词:动态电压恢复器软件锁相锁相环
智能电网信息系统体系结构研究被引量:241
2013年
智能电网在传统电网基础上,通过先进的信息技术手段实现能源和电力的进一步精密化调控.文中在总结智能电网的概念定义、国内外发展现状、主要技术难点和挑战的基础上,着重从信息技术的角度提出适合于智能电网发展的信息系统体系结构.该结构分为3个层次:基础设施层,包括电力系统基础设备及通信网络;支撑平台层,包括传感量测、数据存储、分析决策和控制执行4个支撑平台;应用体系层,包括电源侧、电网侧和用电侧3类应用;真正实现物理、信息与应用系统的融合互动,信息、能量与业务流的高度一体化.该文详细总结了该体系结构涉及到的各方面技术的发展现状,同时指出了未来可能带来突破的研究方向.
曹军威万宇鑫涂国煜张树卿夏艾瑄刘小非陈震陆超
关键词:智能电网传感网络数据存储
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining被引量:2
2013年
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.
Jianlin XuYifan YuZhen ChenBin CaoWenyu DongYu GuoJunwei Cao
关键词:安全评估恶意软件
QoS-Aware Virtual Machine Scheduling for Video Streaming Services in Multi-Cloud被引量:3
2013年
Video streaming services are trending to be deployed on cloud. Cloud computing offers better stability and lower price than traditional IT facilities. Huge storage capacity is essential for video streaming service. More and more cloud providers appear so there are increasing cloud platforms to choose. A better choice is to use more than one data center, which is called multi-cloud. In this paper a closed-loop approach is proposed for optimizing Quality of Service (QoS) and cost. Modules of monitoring and controlling data centers are required as well as the application feedback such as video streaming services. An algorithm is proposed to help choose cloud providers and data centers in a multi-cloud environment as a video service manager. Performance with different video service workloads are evaluated. Compared with using only one cloud provider, dynamically deploying services in multi-cloud is better in aspects of both cost and QoS. If cloud service costs are different among data centers, the algorithm will help make choices to lower the cost and keep a high QoS.
Wei ChenJunwei CaoYuxin Wan
关键词:流媒体服务
TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing被引量:7
2013年
Collaborative filtering solves information overload problem by presenting personalized content to individual users based on their interests, which has been extensively applied in real-world recommender systems. As a class of simple but efficient collaborative filtering method, similarity based approaches make predictions by finding users with similar taste or items that have been similarly chosen. However, as the number of users or items grows rapidly, the traditional approach is suffering from the data sparsity problem. Inaccurate similarities derived from the sparse user-item associations would generate the inaccurate neighborhood for each user or item. Consequently, its poor recommendation drives us to propose a Threshold based Similarity Transitivity (TST) method in this paper. TST firstly filters out those inaccurate similarities by setting an intersection threshold and then replaces them with the transitivity similarity. Besides, the TST method is designed to be scalable with MapReduce framework based on cloud computing platform. We evaluate our algorithm on the public data set MovieLens and a real-world data set from AppChina (an Android application market) with several well-known metrics including precision, recall, coverage, and popularity. The experimental results demonstrate that TST copes well with the tradeoff between quality and quantity of similarity by setting an appropriate threshold. Moreover, we can experimentally find the optimal threshold which will be smaller as the data set becomes sparser. The experimental results also show that TST significantly outperforms the traditional approach even when the data becomes sparser.
Feng XieZhen ChenHongfeng XuXiwei FengQi Hou
关键词:最优阈值TST个人用户
基于大数据分析的暂态电能质量综合评估方法被引量:21
2015年
运用基于大数据处理架构的Naive Bayes分类方法提出了暂态电能质量评估方法,将数据来源扩展至电网运行监测数据、电力用户数据和公共信息数据等方面,并将评估结果按严重程度分为暂态正常状态、短时电压暂降状态、短时深度电压暂降状态、短时电压失压状态。基于MapReduce架构,设计分布式Naive Bayes算法实现状态分类。在分类器训练阶段,对海量历史数据进行分布式学习,周期性地生成评估规则库并部署到所有评估节点。在状态评估阶段,各评估节点基于流处理框架快速生成实时评估样本,并根据当前规则库实时地得出评估结果。试验结果表明,所提出的基于大数据分析的暂态电能质量评估方法是可行,在准确率和处理速度上都取得了较好的效果。
张华赢朱正国姚森敬高田曹军威韩蓄王淼
关键词:大数据分布式数据挖掘
COMBAT:A New Bitmap Index Coding Algorithm for Big Data
2016年
Bitmap indexing has been widely used in various applications due to its speed in bitwise operations.However,it can consume large amounts of memory.To solve this problem,various bitmap coding algorithms have been proposed.In this paper,we present COMbining Binary And Ternary encoding(COMBAT),a new bitmap index coding algorithm.Typical algorithms derived from Word Aligned Hybrid(WAH)are COMPressed Adaptive inde X(COMPAX)and Compressed"n"Composable Integer Set(CONCISE),which can combine either two or three continuous words after WAH encoding.COMBAT combines both mechanisms and results in more compact bitmap indexes.Moreover,querying time of COMBAT can be faster than that of COMPAX and CONCISE,since bitmap indexes are smaller and it would take less time to load them into memory.To prove the advantages of COMBAT,we extend a theoretical analysis model proposed by our group,which is composed of the analysis of various possible bitmap indexes.Some experimental results based on real data are also provided,which show COMBAT’s storage and speed superiority.Our results demonstrate the advantages of COMBAT and codeword statistics are provided to solidify the proof.
Yinjun WuZhen ChenYuhao WenWenxun ZhengJunwei Cao
关键词:COMBATCONCISE
储能电池管理系统仿真平台的设计与实现被引量:1
2013年
本文提出了将计算机和互联网技术引入传统的基于模拟电路和微控制器的电池管理系统的想法,以此为电池系统带来更高的安全性和更长的寿命,降低电池端硬件的复杂度和成本。本文讨论了电池管理系统的详细设计和实现过程。系统通过MATLAB仿真工具Simulink对由多个电池单元组成的储能系统进行仿真,并通过计算机软件实现对仿真电池系统的监视与控制。在此基础上实现了在具体应用场景中通过Web页面对仿真电池系统进行控制,并通过Web页面以友好的方式展示控制过程中电池参数的变化。最后通过实验对本系统的功能进行了验证,证明了控制逻辑的正确性,并探讨了计算机软件控制周期的选择问题。
王淼曹军威魏超陆超
关键词:电池管理SIMULINK仿真计算机控制系统AJAX技术
基于虚拟组织的桌面云安全访问与共享机制研究被引量:3
2012年
采用云计算技术实现托管式的虚拟桌面一般被称为桌面云。近年来桌面云被认为是云计算最为成熟的应用之一,本文着重研究桌面云安全访问与共享机制。我们使用基于PKI的证书认证建立了虚拟组织,在其上重点研究了虚拟机的创建,远程桌面访问,共享等应用。证书认证等机制可以使得访问更加安全可靠。而通过虚拟组织的信任关系,多个用户可以共享同一个虚拟机。为了确保远程通道的安全,我们采用了OpenVPN来构建虚拟专用网络,对虚拟机的使用者进行认证并对通信进行加密保护。
陈伟曹军威钱瀚
关键词:虚拟机
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System被引量:8
2013年
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud-based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.
Zhen ChenFuye HanJunwei CaoXin JiangShuo Chen
关键词:网络安全管理系统分布式拒绝服务网络攻击网络事件
共2页<12>
聚类工具0