Entity

Time filter

Source Type

Henan’an, China

Nan G.,Sanmenxia Power Supply Company | Zhang S.,Sanmenxia Power Design Co. | Lin Y.,Sanmenxia Power Design Co. | Shao M.,Sanmenxia Power Design Co.
2011 International Conference on Multimedia Technology, ICMT 2011 | Year: 2011

This thesis analyzes the pilot project of intelligent power consumption information collection EPON system of power fiber to the home. It develops its research about the network technology solutions and principle, and discussed the Networking technology scheme from the technological superiority of the system, system structure, network model, installation principles, the requirements of ONU and OLT selection. It points out that information collection system cooperated with EPON technology use optical fiber to every meter and home, including some business about electricity information collection, intelligent power utilization"two-way" interaction, "three nets fusion" and so on. It is the inevitable requirement to construct strong power grid and the inevitable choice to promote social resources sharing. © 2011 IEEE. Source


Li W.-W.,China Three Gorges University | Wu X.-X.,China Three Gorges University | Huang J.,Sanmenxia Power Supply Company | Ma Q.,Fujian Electric Power Company | Guo X.-H.,Northeast China Grid Company
Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control | Year: 2013

Because of the uncertainty of the natural runoff of reservoir, a mid-long term reservoir operation stochastic optimization model is established for the hybrid pumping storage power station based on describing the stochastic process of runoff, which takes the maximum energy generating expectation as its objective. The stochastic dynamic programming algorithm has two control variables: water flow and pumping time. Case study of Baishan mixed pumped storage units shows the energy generating expectation of scheduling period increases from 2 165 million kW·h to 2 463 million kW·h, the guaranteed output increases by 12 MW, and the water level is slightly higher in all periods. At the same time, compared with the model established by the long series of law, the stochastic model obtains better results and the model can better reflect the randomness of the natural runoff, even more practical. Source


Li K.,Xidian University | Feng H.,Sanmenxia Power Supply Company | Li Y.,Aeronautics Computing Technique Research Institute | Zhang Z.,Xidian University
Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014 | Year: 2015

A new generation of avionics system has three major technical characteristics of high resource sharing, data integration and software intensive. However, in the cooperative combat environment, which has the problem of potential sensitive information leakage and tamper when the combat aircraft communicate with each other. In this paper, we are based on the single node of information flow control model, combined with PCS, proposed a distributed information flow control model in MILS, constructed the PCS information flow control strategy, and together with other trusted component of information flow control strategy that form the multi-level information flow control policy framework, which design an information flow control mechanism of PCS and realized the distributed information flow control in MILS. After analysis and verification, the design of the distributed information flow security control method in MILS can effectively ensure the confidentiality and integrity of the information among the nodes. © 2014 IEEE. Source


Li K.,Xidian University | Feng H.,Sanmenxia Power Supply Company | Li Y.,Aeronautics Computing Technique Research Institute | Zhang Z.,Xidian University
Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014 | Year: 2015

MILS (Multiple Independent Levels of Security) is a high-assurance architecture that protect different security levels information sharing. In order to provide guarantee for a variety of information sharing security, MILS allow software components that have multiple security levels or multiple data domain to run on a single processor. But in specific applications, in order to achieve multiple information interaction and sharing between partitions, the problem of which illegal authorization, unauthorized access and malicious disclosure of sensitive information between different levels of applications will be introduced. From the point of information flow control, the paper put forward a model and method of information flow security control strictly between MILS partitions based on trusted computing. We designed a model based on BLP and access control model of state transition strategy, the policies break the traditional BLP model rules ' read down, write up', which meet the needs of the security level for subjects and objects according to the changes of task requirements in MILS. After analyzing, the model can efficaciously protect confidentiality and integrity of the sensitive information, and improve the dependability of the whole system. © 2014 IEEE. Source


Peng J.-C.,Shenzhen University | Li C.-H.,Shenzhen University | Qi X.-H.,Sanmenxia Power Supply Company | Chen L.-B.,Shenzhen University | And 2 more authors.
Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control | Year: 2012

This paper presents a new method for loss estimation of distribution systems comprising overhead lines and power cables. It is based on fast independent component analysis (Fast ICA) and support vector regression (SVR). In the method, the length of over-head lines, length of power cable, active and reactive powers entering the sending end of the feeder are taken as the input characteristic parameters to estimate the loss of distribution network. The Fast ICA is employed to extract the independent components of the input characteristic parameters. The independent component of characteristic parameter and power loss are taken as the input and output of SVR to build the loss estimation relation of hybrid feeder. The simulation result of actual measurements shows that the proposed method is accurate, valid, and feasible. Source

Discover hidden collaborations