排序方式: 共有36条查询结果,搜索用时 15 毫秒
1.
Results of simulations, designed to illustrate the influence of power system stabilizers (PSS) on inter-area and local oscillations in interconnected power systems, are reported. It is shown that the PSS location and the voltage characteristics of the system loads are significant factors in the ability of a PSS to increase the damping of interarea oscillations. It is also shown that an interaction between modes in two distinct parts of a power system is possible, due to resonance, and that this might cause distortions in mode shape and participation factors 相似文献
2.
Blind image deconvolution 总被引:7,自引:0,他引:7
3.
Voltage stability evaluation using modal analysis 总被引:3,自引:0,他引:3
The authors discuss the voltage stability analysis of large power systems by using a modal analysis technique. The method computes, using a steady-state system model, a specified number of the smallest eigenvalues and the associated eigenvectors of a reduced Jacobian matrix. The eigenvalues, each of which is associated with a mode of voltage/reactive power variation, provide a relative measure of proximity to voltage instability. The eigenvectors are used to describe the mode shape and to provide information about the network elements and generators which participate in each mode. A simultaneous iteration method, which is well suited to applications involving large power systems, is used for selective calculation of appropriate eigenvalues. Results obtained using a 3700 bus test system are presented illustrating the applicability of the approach 相似文献
4.
Advances In Peer-To-Peer Content Search 总被引:2,自引:0,他引:2
Madjid Merabti Zhu Liu Heather Yu Deepa Kundur 《Journal of Signal Processing Systems》2010,59(3):309-318
Peer-to-peer (P2P) computer networks have recently received tremendous attention due to their inherent scalability and flexibility,
which facilitates a broad spectrum of innovative multimedia applications. Such networks rely on the power of participant nodes
of the network (called peers) for communications and computation. Traditional applications of P2P multimedia include decentralized
file sharing and content distribution. Yet, the value of the virtually unlimited amount of data distributed in the P2P network
will be sacrificed if effective and efficient ways to locate the content are missing. This challenge has stimulated extensive
research in recent years, and many new P2P content search methods have been proposed. This paper provides a timely review
of influential work in the area of peer-to-peer (P2P) content search. We begin with a survey of text-based P2P search mechanisms
and continue with an exposition of content-based and semantic-based approaches followed by a discussion of future directions. 相似文献
5.
Kundur P. Rogers G.J. Wong D.Y. Wang L. Lauby M.G. 《Power Systems, IEEE Transactions on》1990,5(4):1076-1083
A package of integrated programs for small-signal stability analysis of large interconnected power systems is described. The package has extensive modeling capability and uses alternative eigenvalue calculation techniques, making it suitable for the analysis of a wide range of stability and control problems. Results of eigenvalue calculations for three power systems of differing size and complexity are presented and the accuracy, consistency and convergence of the alternative calculation methods are discussed 相似文献
6.
Analysis and design of watermarking algorithms for improved resistance to compression 总被引:8,自引:0,他引:8
We study the performance of robust digital watermarking approaches in the presence of lossy compression by introducing practical analysis methodologies. Correlation expressions between the embedded watermark and the extracted watermark are derived to determine the optimal watermarking domain to maximize data hiding rates for spread spectrum and quantization watermarking. It is determined both theoretically and through simulations that the embedding strategy, in addition to the transform used for lossy compression, dictate the optimal transform for watermarking. Through analytic comparisons, we develop a novel hybrid watermarking algorithm that exploits the best of both approaches for greater resilience to JPEG compression. 相似文献
7.
8.
We develop a novel video watermarking framework based on the collusion-resistant design rules formulated in a companion paper. We propose to employ a spatially-localized image dependent approach to create a watermark whose pairwise frame correlations approximate those of the host video. To characterize the spread of its spatially-localized energy distribution, the notion of a watermark footprint is introduced. Then we explain how a particular type of image dependent footprint structure, comprised of subframes centered around a set of visually significant anchor points, can lead to two advantageous results: pairwise watermark frame correlations that more closely match those of the host video for statistical invisibility, and the ability to apply image watermarks directly to a frame sequence without sacrificing collusion-resistance. In the ensuing overview of the proposed video watermark, two new ideas are put forward: synchronizing the subframe locations using visual content rather than structural markers and exploiting the inherent spatial diversity of the subframe-based watermark to improve detector performance. Simulation results are presented to show that the proposed scheme provides improved resistance to linear frame collusion, while still being embedded and extracted using relatively low complexity frame-based algorithms. 相似文献
9.
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments 总被引:1,自引:1,他引:0
Alexandra Czarlinska Deepa Kundur 《Multidimensional Systems and Signal Processing》2009,20(2):135-164
Wireless Image Sensor Networks (WISNs) consisting of untethered camera nodes and sensors may be deployed in a variety of unattended
and possibly hostile environments to obtain surveillance data. In such settings, the WISN nodes must perform reliable event
acquisition to limit the energy, computation and delay drains associated with forwarding large volumes of image data wirelessly
to a sink node. In this work we investigate the event acquisition properties of WISNs that employ various techniques at the
camera nodes to distinguish between event and non-event frames in uncertain environments that may include attacks. These techniques
include lightweight image processing, decisions from n sensors with/without cluster head fault and attack detection, and a combination approach relying on both lightweight image
processing and sensor decisions. We analyze the relative merits and limitations of each approach in terms of the resulting
probability of event detection and false alarm in the face of occasional errors, attacks and stealthy attacks.
相似文献
Alexandra CzarlinskaEmail: |
10.
This paper presents a novel robust watermarking approach called FuseMark based on the principles of image fusion for copy protection or robust tagging applications. We consider the problem of logo watermarking in still images and employ multiresolution data fusion principles for watermark embedding and extraction. A human visual system model based on contrast sensitivity is incorporated to hide a higher energy hidden logo in salient image components. Watermark extraction involves both characterization of attacks and logo estimation using a rake-like receiver. Statistical analysis demonstrates how our extraction approach can be used for watermark detection applications to decrease the problem of false negative detection without increasing the false positive detection rate. Simulation results verify theoretical observations and demonstrate the practical performance of FuseMark. 相似文献