Interactive reading is a new reading behavior in the age of intelligence. The dual-track development of new media and interactive technology has led to changes in both reading behavior and reading experience. This paper has discussed the information generation and information feedback of interactive reading, and analysed the important applications of projection technology, gesture recognition and QR code technology in interactive reading behavior from various projection interaction technologies. Through the development process of the interactive projection of the atlas series named “City Flowers of Beijing”, we aim to demonstrate the design of interactive and sustainable reading forms, deliver the multi-dimensional, multi-level and diversified reading information, create a reading experience that is both physiologically and psychologically satisfactory to the audience in the age of intelligence, and provide a new direction for the development of human-computer reading behavior in the new media age.
{"title":"Interactive projection information generation and feedback for reading behaviour","authors":"Dongna Cai, Hao Hao, Xinyu Hu, Boyuan Wang","doi":"10.3233/jcm-226770","DOIUrl":"https://doi.org/10.3233/jcm-226770","url":null,"abstract":"Interactive reading is a new reading behavior in the age of intelligence. The dual-track development of new media and interactive technology has led to changes in both reading behavior and reading experience. This paper has discussed the information generation and information feedback of interactive reading, and analysed the important applications of projection technology, gesture recognition and QR code technology in interactive reading behavior from various projection interaction technologies. Through the development process of the interactive projection of the atlas series named “City Flowers of Beijing”, we aim to demonstrate the design of interactive and sustainable reading forms, deliver the multi-dimensional, multi-level and diversified reading information, create a reading experience that is both physiologically and psychologically satisfactory to the audience in the age of intelligence, and provide a new direction for the development of human-computer reading behavior in the new media age.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"92 1","pages":"2009-2030"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zehui Liu, Rui Li, D. Ma, Weizhe Jing, Min Guo, Weixing Gao, Yun Ju
Power Internet of Things (IoT) is an important support for digital innovation service of power energy internet, covering all aspects of power system. Power IoT security defense system may have customer data information leakage during transmission because of the use of traditional means of isolation. This paper proposes a reliable transmission and application security architecture for power smart IoT based on energy interconnection, aiming to solve the reliable transmission and security authentication problems existing in power systems. The paper first analyzes the security risk of the grid wise IoT system, proposes an effective power IoT security transmission scheme, and evaluates the safe and reliable transmission of the grid wise IoT system. Then designed a safe and reliable transmission of the grid smart IoT system, to deal with the traditional power network transmission security and communication security problems. The final application is in the construction of the security transmission platform of the wisdom park of Shanxi Electric Power Company, which provides the corresponding security protection capability in the power IoT through the situational awareness security measures of each layer, and realizes the reliable transmission and security application of the source network load storage and other links in the power IoT environment.
{"title":"Research on reliable transmission and application security architecture of power IoT based on energy interconnection","authors":"Zehui Liu, Rui Li, D. Ma, Weizhe Jing, Min Guo, Weixing Gao, Yun Ju","doi":"10.3233/jcm-226748","DOIUrl":"https://doi.org/10.3233/jcm-226748","url":null,"abstract":"Power Internet of Things (IoT) is an important support for digital innovation service of power energy internet, covering all aspects of power system. Power IoT security defense system may have customer data information leakage during transmission because of the use of traditional means of isolation. This paper proposes a reliable transmission and application security architecture for power smart IoT based on energy interconnection, aiming to solve the reliable transmission and security authentication problems existing in power systems. The paper first analyzes the security risk of the grid wise IoT system, proposes an effective power IoT security transmission scheme, and evaluates the safe and reliable transmission of the grid wise IoT system. Then designed a safe and reliable transmission of the grid smart IoT system, to deal with the traditional power network transmission security and communication security problems. The final application is in the construction of the security transmission platform of the wisdom park of Shanxi Electric Power Company, which provides the corresponding security protection capability in the power IoT through the situational awareness security measures of each layer, and realizes the reliable transmission and security application of the source network load storage and other links in the power IoT environment.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"11 1","pages":"2141-2152"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82088113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Du, Zhiming Xiong, Xinggang Shen, Chao Wang, Jie Huang
In order to explore the mechanical response characteristics of coarse-grained soil in waste dump under different consolidation stress conditions, the isobaric consolidation drained triaxial test and K0 consolidation drainage triaxial test under different confining pressures are performed, and the test data of stress-strain and volume deformation of soil are compared and analysed. The results show that the initial stress of soil under K0 consolidation condition is not zero. The shear stress-strain curves of soil with different consolidation conditions show hardening characteristics. When confining pressure increases, the shear stress of isobaric consolidated soil increases rapidly, and its failure shear stress increases significantly compared with K0 consolidated soil. Shear expansion of coarse-grained soil under low confining pressure and shear shrinkage under high confining pressure. Under low confining pressure, K0 consolidated soil is more prone to shear expansion, and the amount of shear expansion is greater than that of isobaric consolidated soil. Under medium and high confining pressure, the volume compression change of isobaric consolidated soil is greater than that of K0 consolidated soil. The initial tangent Poisson’s ratio of coarse-grained soil under different consolidation stress conditions decreases with the increase of confining pressure, and changes in a power function with the confining pressure. The cohesion of soil under isobaric consolidation stress condition, while the difference of internal friction angle of soil under different consolidation stress condition is small. The strength and deformation characteristics of soil are closely related to the initial stress state of soil. The triaxial test is used to obtain the shear strength index of soil, and the isobaric consolidation condition should not be used instead of K0 consolidation condition.
{"title":"Triaxial compression test of coarse-grained soil in waste dump under different consolidation stresses conditions","authors":"Jun Du, Zhiming Xiong, Xinggang Shen, Chao Wang, Jie Huang","doi":"10.3233/jcm-226742","DOIUrl":"https://doi.org/10.3233/jcm-226742","url":null,"abstract":"In order to explore the mechanical response characteristics of coarse-grained soil in waste dump under different consolidation stress conditions, the isobaric consolidation drained triaxial test and K0 consolidation drainage triaxial test under different confining pressures are performed, and the test data of stress-strain and volume deformation of soil are compared and analysed. The results show that the initial stress of soil under K0 consolidation condition is not zero. The shear stress-strain curves of soil with different consolidation conditions show hardening characteristics. When confining pressure increases, the shear stress of isobaric consolidated soil increases rapidly, and its failure shear stress increases significantly compared with K0 consolidated soil. Shear expansion of coarse-grained soil under low confining pressure and shear shrinkage under high confining pressure. Under low confining pressure, K0 consolidated soil is more prone to shear expansion, and the amount of shear expansion is greater than that of isobaric consolidated soil. Under medium and high confining pressure, the volume compression change of isobaric consolidated soil is greater than that of K0 consolidated soil. The initial tangent Poisson’s ratio of coarse-grained soil under different consolidation stress conditions decreases with the increase of confining pressure, and changes in a power function with the confining pressure. The cohesion of soil under isobaric consolidation stress condition, while the difference of internal friction angle of soil under different consolidation stress condition is small. The strength and deformation characteristics of soil are closely related to the initial stress state of soil. The triaxial test is used to obtain the shear strength index of soil, and the isobaric consolidation condition should not be used instead of K0 consolidation condition.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"7 1","pages":"2031-2043"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91542516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang
The metering accuracy and stability of the power grid transformer devices are of great concern to all parties of the power grid, power plants and large users, as well as the relevant government departments, with the further deepening of the electric power system reform and the gradual establishment of the electric power spot trading market. The outcomes demonstrate the viability and efficacy of the employed diagnosis method. The completed research can serve as a reference point for China’s development of a capacitive voltage transformer line monitoring system.
{"title":"Studies on the use of genetic algorithms to improve radial basis neural networks to monitor capacitive voltage transformers online","authors":"Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang","doi":"10.3233/jcm-226756","DOIUrl":"https://doi.org/10.3233/jcm-226756","url":null,"abstract":"The metering accuracy and stability of the power grid transformer devices are of great concern to all parties of the power grid, power plants and large users, as well as the relevant government departments, with the further deepening of the electric power system reform and the gradual establishment of the electric power spot trading market. The outcomes demonstrate the viability and efficacy of the employed diagnosis method. The completed research can serve as a reference point for China’s development of a capacitive voltage transformer line monitoring system.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"116 1","pages":"1971-1983"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79172249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weizhe Jing, D. Ma, Hua Yang, Min Guo, Qiang Xue, W. Liu, Yanyan Zhang, Yun Ju
Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.
{"title":"Research on security encryption mechanism of physical Layer based on iterative quantization method","authors":"Weizhe Jing, D. Ma, Hua Yang, Min Guo, Qiang Xue, W. Liu, Yanyan Zhang, Yun Ju","doi":"10.3233/jcm-226746","DOIUrl":"https://doi.org/10.3233/jcm-226746","url":null,"abstract":"Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"10 1","pages":"1883-1895"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90774838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Guo, D. Ma, Feng Jing, Huiping Zheng, Xiaojie Liu, Penghui Liu, Yun Ju
In order to study the standard security access authentication mechanism of intelligent sensing terminals of massive power Internet of Things, In order to study the standard secure access authentication mechanism of intelligent sensing terminal of massive power Internet of Things, a new privacy protection method widely used in block chain is proposed to prove identity. The traditional power IoT cloud-side interaction security access MQTT protocol still has a lot of room for adaptation and optimization. First, the proposed non-interactive zero-knowledge proof identity authentication method reduces the time of traditional standard secure access authentication process; Second, it reduced the computing resources consumed in a large number of intelligent sensors access authentication. The comparison results show that, the access authentication time of this method is 30%∼50% less than that of the traditional secure access authentication process. The computing resources consumed during authentication are reduced by 20% to 30% compared with traditional security and secrecy mechanisms.
{"title":"Research on security access authentication mechanism of intelligent sensor based on non-interactive zero-knowledge proof method","authors":"Min Guo, D. Ma, Feng Jing, Huiping Zheng, Xiaojie Liu, Penghui Liu, Yun Ju","doi":"10.3233/jcm-226750","DOIUrl":"https://doi.org/10.3233/jcm-226750","url":null,"abstract":"In order to study the standard security access authentication mechanism of intelligent sensing terminals of massive power Internet of Things, In order to study the standard secure access authentication mechanism of intelligent sensing terminal of massive power Internet of Things, a new privacy protection method widely used in block chain is proposed to prove identity. The traditional power IoT cloud-side interaction security access MQTT protocol still has a lot of room for adaptation and optimization. First, the proposed non-interactive zero-knowledge proof identity authentication method reduces the time of traditional standard secure access authentication process; Second, it reduced the computing resources consumed in a large number of intelligent sensors access authentication. The comparison results show that, the access authentication time of this method is 30%∼50% less than that of the traditional secure access authentication process. The computing resources consumed during authentication are reduced by 20% to 30% compared with traditional security and secrecy mechanisms.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"69 1","pages":"1859-1867"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86748136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuo Wang, Huisheng Zeng, Jian Tang, Chenchen Wang, Lan Wang
Steady-state calculation and analysis are often inconsistent with actual conditions, because buildings are usually in unsteady heat transfer conditions; however, studies on heat transfer in the unsteady state usually adopt experiments and simulations, which do not allow consecutive analysis corresponding with the changes of the independent variable of construction. Therefore, the solution to the equation of heat transfer in the unsteady state is of great importance to the consecutive analysis of heat transfer condition in the unsteady state. Adopting the methods of both convolution calculation analysis of heat transfer in the unsteady state and experiments, the researchers ranked the four types of construction insulation performances of non-transparent enclosures of subtropical buildings in summer, including external thermal insulation, self-insulation, and two type of internal thermal insulation due to the change in the thickness of the insulation layer. As a result, the maximum value of indoor temperature in the actual condition is different from the one from the calculation of the steady steady-state but consistent with the one from convolution analysis of the unsteady state. Both the actual situation and the results of unsteady convolution calculation prove that we should not hastily draw the conclusion as to the “winner” between “inner heat preservation” and “outer heat preservation”. The unsteady convolution calculation enables us to better conduct a continuous and quantitative description and prediction of the insulation performance of the constructions in the working condition and their ranking along with the changes of construction layer.
{"title":"A descriptive study on the convolution analysis of the insulation performance of non-transparent enclosures corresponding with the changes of the construction hierarchy","authors":"Shuo Wang, Huisheng Zeng, Jian Tang, Chenchen Wang, Lan Wang","doi":"10.3233/jcm-226766","DOIUrl":"https://doi.org/10.3233/jcm-226766","url":null,"abstract":"Steady-state calculation and analysis are often inconsistent with actual conditions, because buildings are usually in unsteady heat transfer conditions; however, studies on heat transfer in the unsteady state usually adopt experiments and simulations, which do not allow consecutive analysis corresponding with the changes of the independent variable of construction. Therefore, the solution to the equation of heat transfer in the unsteady state is of great importance to the consecutive analysis of heat transfer condition in the unsteady state. Adopting the methods of both convolution calculation analysis of heat transfer in the unsteady state and experiments, the researchers ranked the four types of construction insulation performances of non-transparent enclosures of subtropical buildings in summer, including external thermal insulation, self-insulation, and two type of internal thermal insulation due to the change in the thickness of the insulation layer. As a result, the maximum value of indoor temperature in the actual condition is different from the one from the calculation of the steady steady-state but consistent with the one from convolution analysis of the unsteady state. Both the actual situation and the results of unsteady convolution calculation prove that we should not hastily draw the conclusion as to the “winner” between “inner heat preservation” and “outer heat preservation”. The unsteady convolution calculation enables us to better conduct a continuous and quantitative description and prediction of the insulation performance of the constructions in the working condition and their ranking along with the changes of construction layer.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"3 1","pages":"2127-2140"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78362328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Li, Jia-Min Gu, Xiaoyuan Lu, Yan Ning, L. Zhang, Peiyi Shen, Chaochen Gu
Holistic scene understanding is a challenging problem in computer vision. Most recent researches in this field were focusing on the object detection, the semantic segmentation and the relationship detection tasks. The attribute can provide meaningful information for the object instance, thus the object instance can be expressed more detail in the scene understanding. However, most researches in this field have been limited to several special conditions. Such as, several researches were just focusing on the attribute of special object class, because their solutions were aimed at a limited-scenarios, their methods are hardly to generalize in other scenarios. We also find that most of the research for multi-attribute detection task were only regarding each attribute as binary class and simply use the multi-binary-classifier method for the attribute detection. But these strategies above not consider the relation between each pair of the attributes, they will fall into trouble in the “imperfect” attribute dataset (which is labeled with the missing and incomplete annotations), and they will have low performance in the long-tail attribute class (which has lower rank of annotation and more missing labels). In this paper, we focus on the multi-attribute detection for a variant of object classes and take the relation between attributes into consideration. We propose a GRU-based model to detect a variable-length attribute sequence with a customized loss compute method to solve the “imperfect” attribute dataset problem. Furthermore, we perform ablative studies to prove the effectiveness of each part of our method. Finally, we compare our model with several existed multi-attribute detection methods on VG (Visual Genome) and CUB200 bird datasets to prove the superior performance of the proposed model.
{"title":"Variable-length sequence model for attribute detection in the image","authors":"Xin Li, Jia-Min Gu, Xiaoyuan Lu, Yan Ning, L. Zhang, Peiyi Shen, Chaochen Gu","doi":"10.3233/jcm-226762","DOIUrl":"https://doi.org/10.3233/jcm-226762","url":null,"abstract":"Holistic scene understanding is a challenging problem in computer vision. Most recent researches in this field were focusing on the object detection, the semantic segmentation and the relationship detection tasks. The attribute can provide meaningful information for the object instance, thus the object instance can be expressed more detail in the scene understanding. However, most researches in this field have been limited to several special conditions. Such as, several researches were just focusing on the attribute of special object class, because their solutions were aimed at a limited-scenarios, their methods are hardly to generalize in other scenarios. We also find that most of the research for multi-attribute detection task were only regarding each attribute as binary class and simply use the multi-binary-classifier method for the attribute detection. But these strategies above not consider the relation between each pair of the attributes, they will fall into trouble in the “imperfect” attribute dataset (which is labeled with the missing and incomplete annotations), and they will have low performance in the long-tail attribute class (which has lower rank of annotation and more missing labels). In this paper, we focus on the multi-attribute detection for a variant of object classes and take the relation between attributes into consideration. We propose a GRU-based model to detect a variable-length attribute sequence with a customized loss compute method to solve the “imperfect” attribute dataset problem. Furthermore, we perform ablative studies to prove the effectiveness of each part of our method. Finally, we compare our model with several existed multi-attribute detection methods on VG (Visual Genome) and CUB200 bird datasets to prove the superior performance of the proposed model.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"16 1","pages":"1913-1927"},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87456501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Finding the head of a traveling wave is challenging because an overhead line-cable hybrid transmission line’s wave impedance is not constant. Because of this, it is difficult to measure the hybrid transmission line precisely. This leads to the proposal of a hybrid transmission line fault location algorithm, which combines VMD energy entropy for training support vector machines and traveling wave law graphs. The VMD energy entropy is first used to train SVM to identify the faulty section. The method of traveling waves with a single end is utilized to precisely fix the fault distance within the faulty segment when the type of traveling wave has been identified. The simulation results demonstrate that the method provides precise measurements and is effective for hybrid transmission lines with a range of fault distances and grounding resistances.
{"title":"Fault location in hybrid transmission lines on the basis of VMD energy entropy and SVM","authors":"Min Zhao, Zhihui Kang","doi":"10.3233/jcm-226760","DOIUrl":"https://doi.org/10.3233/jcm-226760","url":null,"abstract":"Finding the head of a traveling wave is challenging because an overhead line-cable hybrid transmission line’s wave impedance is not constant. Because of this, it is difficult to measure the hybrid transmission line precisely. This leads to the proposal of a hybrid transmission line fault location algorithm, which combines VMD energy entropy for training support vector machines and traveling wave law graphs. The VMD energy entropy is first used to train SVM to identify the faulty section. The method of traveling waves with a single end is utilized to precisely fix the fault distance within the faulty segment when the type of traveling wave has been identified. The simulation results demonstrate that the method provides precise measurements and is effective for hybrid transmission lines with a range of fault distances and grounding resistances.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"68 1","pages":"2083-2099"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90465818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang
Transformers play a crucial role in ensuring the safety of power grids. It is of great value to diagnose faults using the large amount of power data generated by the grid. It is possible to detect internal latent faults in transformers in advance of their occurrence if the normal operating condition of the transformer is detected in a timely manner. To perform online fault diagnosis of grid current transformers, we combine the Transformer and BiGRU methods. There is a temporal component to the fault input sample sequences. By using Transformer’s multi-headed attention mechanism to extract deep features from fault input sample sequences, the temporal association between latent variables can be fully exploited. As a result of the extraction of features, BiGRU is used to generate fault category coding as an output. The experimental results indicate that using the proposed algorithm achieves better results than using a single model, which is useful for the study and application of fault diagnosis in power grids for current transformers.
{"title":"Research on online monitoring of grid current transformer based on transformers and BiGRU","authors":"Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang","doi":"10.3233/jcm-226763","DOIUrl":"https://doi.org/10.3233/jcm-226763","url":null,"abstract":"Transformers play a crucial role in ensuring the safety of power grids. It is of great value to diagnose faults using the large amount of power data generated by the grid. It is possible to detect internal latent faults in transformers in advance of their occurrence if the normal operating condition of the transformer is detected in a timely manner. To perform online fault diagnosis of grid current transformers, we combine the Transformer and BiGRU methods. There is a temporal component to the fault input sample sequences. By using Transformer’s multi-headed attention mechanism to extract deep features from fault input sample sequences, the temporal association between latent variables can be fully exploited. As a result of the extraction of features, BiGRU is used to generate fault category coding as an output. The experimental results indicate that using the proposed algorithm achieves better results than using a single model, which is useful for the study and application of fault diagnosis in power grids for current transformers.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"57 1","pages":"1137-1149"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80218908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}