CASCADING

作品数:96被引量:172H指数:8
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张昕然王如刚赵力徐新洲黄程韦更多>>
相关机构:东南大学盐城工学院福建工程学院国家电网公司更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家重点基础研究发展计划(973Program)x
条 记 录,以下是1-3
视图:
排序:
Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems被引量:9
《Journal of Modern Power Systems and Clean Energy》2018年第5期944-957,共14页Yuqi HAN Chuangxin GUO Shiying MA Dunwen SONG 
supported by the National Natural Science Foundation of China(No.51537010);the National Key Basic Research Program(973 Program)(No.2013CB228206);the project of ‘‘The up layer design for DC-AC hybrid grids system protection’’(No.XT71-16-053)
This paper presents a model of cascading failures in cyber-physical power systems(CPPSs) based on an improved percolation theory, and then proposes failure mitigation strategies. In this model, the dynamic development...
关键词:CYBER physical power system CASCADING failure Improved PERCOLATION theory Interdependent network MITIGATION strategy 
Cascading failure analysis of power flow on wind power based on complex network theory被引量:12
《Journal of Modern Power Systems and Clean Energy》2014年第4期411-421,共11页Yushu SUN Xisheng TANG 
This work was financially supported by a grant from the National Basic Research Program of China(973 Program)(No.2012CB215204);the Key Project of the CAS Knowledge Innovation Program“Research and demonstration of the coordinated control system based on multi-complementary energy storage”(No.KGCX2-EW-330).
Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a...
关键词:Complex network theory(CNT) Cascading failure Wind power Power flow analysis model Defense strategies 
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme被引量:1
《Science China Mathematics》2013年第7期1385-1401,共17页CHEN Yu CHEN LiQun LIN DongDai 
supported by National Natural Science Foundation of China(Grant No.60970152);IIE's Research Project on Cryptography(Grant No.Y3Z0011102);the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA06010701);National Key Basic Research Program of China(973 Program)(Grant No.2011CB302400)
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func...
关键词:identity-based encryption Fujisaki-Okamoto transformation provable security cascading reduction 
检索报告 对象比较 聚类工具 使用帮助 返回顶部