首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36篇
  免费   0篇
电工技术   10篇
能源动力   4篇
无线电   15篇
自动化技术   7篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2006年   3篇
  2005年   3篇
  2004年   5篇
  2003年   1篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   5篇
  1996年   2篇
  1995年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有36条查询结果,搜索用时 15 毫秒
1.
Results of simulations, designed to illustrate the influence of power system stabilizers (PSS) on inter-area and local oscillations in interconnected power systems, are reported. It is shown that the PSS location and the voltage characteristics of the system loads are significant factors in the ability of a PSS to increase the damping of interarea oscillations. It is also shown that an interaction between modes in two distinct parts of a power system is possible, due to resonance, and that this might cause distortions in mode shape and participation factors  相似文献   
2.
Blind image deconvolution   总被引:7,自引:0,他引:7  
  相似文献   
3.
Voltage stability evaluation using modal analysis   总被引:3,自引:0,他引:3  
The authors discuss the voltage stability analysis of large power systems by using a modal analysis technique. The method computes, using a steady-state system model, a specified number of the smallest eigenvalues and the associated eigenvectors of a reduced Jacobian matrix. The eigenvalues, each of which is associated with a mode of voltage/reactive power variation, provide a relative measure of proximity to voltage instability. The eigenvectors are used to describe the mode shape and to provide information about the network elements and generators which participate in each mode. A simultaneous iteration method, which is well suited to applications involving large power systems, is used for selective calculation of appropriate eigenvalues. Results obtained using a 3700 bus test system are presented illustrating the applicability of the approach  相似文献   
4.
Advances In Peer-To-Peer Content Search   总被引:2,自引:0,他引:2  
Peer-to-peer (P2P) computer networks have recently received tremendous attention due to their inherent scalability and flexibility, which facilitates a broad spectrum of innovative multimedia applications. Such networks rely on the power of participant nodes of the network (called peers) for communications and computation. Traditional applications of P2P multimedia include decentralized file sharing and content distribution. Yet, the value of the virtually unlimited amount of data distributed in the P2P network will be sacrificed if effective and efficient ways to locate the content are missing. This challenge has stimulated extensive research in recent years, and many new P2P content search methods have been proposed. This paper provides a timely review of influential work in the area of peer-to-peer (P2P) content search. We begin with a survey of text-based P2P search mechanisms and continue with an exposition of content-based and semantic-based approaches followed by a discussion of future directions.  相似文献   
5.
A package of integrated programs for small-signal stability analysis of large interconnected power systems is described. The package has extensive modeling capability and uses alternative eigenvalue calculation techniques, making it suitable for the analysis of a wide range of stability and control problems. Results of eigenvalue calculations for three power systems of differing size and complexity are presented and the accuracy, consistency and convergence of the alternative calculation methods are discussed  相似文献   
6.
We study the performance of robust digital watermarking approaches in the presence of lossy compression by introducing practical analysis methodologies. Correlation expressions between the embedded watermark and the extracted watermark are derived to determine the optimal watermarking domain to maximize data hiding rates for spread spectrum and quantization watermarking. It is determined both theoretically and through simulations that the embedding strategy, in addition to the transform used for lossy compression, dictate the optimal transform for watermarking. Through analytic comparisons, we develop a novel hybrid watermarking algorithm that exploits the best of both approaches for greater resilience to JPEG compression.  相似文献   
7.
8.
We develop a novel video watermarking framework based on the collusion-resistant design rules formulated in a companion paper. We propose to employ a spatially-localized image dependent approach to create a watermark whose pairwise frame correlations approximate those of the host video. To characterize the spread of its spatially-localized energy distribution, the notion of a watermark footprint is introduced. Then we explain how a particular type of image dependent footprint structure, comprised of subframes centered around a set of visually significant anchor points, can lead to two advantageous results: pairwise watermark frame correlations that more closely match those of the host video for statistical invisibility, and the ability to apply image watermarks directly to a frame sequence without sacrificing collusion-resistance. In the ensuing overview of the proposed video watermark, two new ideas are put forward: synchronizing the subframe locations using visual content rather than structural markers and exploiting the inherent spatial diversity of the subframe-based watermark to improve detector performance. Simulation results are presented to show that the proposed scheme provides improved resistance to linear frame collusion, while still being embedded and extracted using relatively low complexity frame-based algorithms.  相似文献   
9.
Wireless Image Sensor Networks (WISNs) consisting of untethered camera nodes and sensors may be deployed in a variety of unattended and possibly hostile environments to obtain surveillance data. In such settings, the WISN nodes must perform reliable event acquisition to limit the energy, computation and delay drains associated with forwarding large volumes of image data wirelessly to a sink node. In this work we investigate the event acquisition properties of WISNs that employ various techniques at the camera nodes to distinguish between event and non-event frames in uncertain environments that may include attacks. These techniques include lightweight image processing, decisions from n sensors with/without cluster head fault and attack detection, and a combination approach relying on both lightweight image processing and sensor decisions. We analyze the relative merits and limitations of each approach in terms of the resulting probability of event detection and false alarm in the face of occasional errors, attacks and stealthy attacks.
Alexandra CzarlinskaEmail:
  相似文献   
10.
This paper presents a novel robust watermarking approach called FuseMark based on the principles of image fusion for copy protection or robust tagging applications. We consider the problem of logo watermarking in still images and employ multiresolution data fusion principles for watermark embedding and extraction. A human visual system model based on contrast sensitivity is incorporated to hide a higher energy hidden logo in salient image components. Watermark extraction involves both characterization of attacks and logo estimation using a rake-like receiver. Statistical analysis demonstrates how our extraction approach can be used for watermark detection applications to decrease the problem of false negative detection without increasing the false positive detection rate. Simulation results verify theoretical observations and demonstrate the practical performance of FuseMark.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号