The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy storage technology is an important measure for power output of new energy generation system. T-type three-level structure is adopt as the topology of energy storage inverter. Mathematical model of grid-connected operation in ABC coordinate system and dq coordinate system is built. A double closed loop control strategy of which inner loop current and outer loop power control is proposed. The...
Conventional finite control set model predictive control (FCS-MPC) for multilevel converters can realize multi-objective control and contain the nonlinear characteristics. However, conventional FCS-MPC may lead to high computational complexity and unwanted switching transition, which is not easy to implement. To solve the issues of computational burden and unwanted switching transition, this paper...
We investigate the problem of person search in the wild in this work. Instead of comparing the query against all candidate regions generated in a query-blind manner, we propose to recursively shrink the search area from the whole image till achieving precise localization of the target person, by fully exploiting information from the query and contextual cues in every recursive search step. We develop...
Automatic malware categorization plays an important role in combating the current large volume of malware and aiding the corresponding forensics. Generally, there are lot of sample information could be extracted with the static tools and dynamic sandbox for malware analysis. Combine these obtained features effectively for further analysis would provides us a better understanding. On the other hand,...
The study of low voltage ride through of photovoltaic power generation system mainly focuses on the two aspects: the appropriate control strategy and the addition of external hardware devices. In this paper, a hybrid control method is proposed to improve the low voltage ride through (LVRT) capability. Fault conditions, rapid suppression of voltage fluctuation of photovoltaic power generation system...
The primary researches are mainly of two measures focused on a suitable control strategy and an additional hard-ware circuit to enhance the LVRT capability of photovoltaic (PV) system. In this paper, according to the Grid Integration Technical Regulation of PV station published by state grid crop, a hybrid control method composed of software and hardware are presented to enhance the capacity of low-voltage...
As the amount of crimes involving the digital dimension grows, an ever increasing number of digital artifacts collected from a forensic investigation needs plenty of resources to process in a forensically sound manner. Digital forensic triage provides a way to deal with this scalability problem, as it is tailored to maximize the utilization of resources based on a priority system. Unfortunately, the...
The ever-growing malware threats in the cyber spacecalls for techniques that are more effective than widely deployedsignature-based detection system. To counter large volumes ofmalware variants, machine learning techniques have been appliedfor automated malware classification. Despite these efforts haveachieved a certain success, the accuracy and efficiency stillremained inadequate to meet demand,...
Recently, email spam is noticed as a covert communication platform for criminals. Yet, discovering incriminating information from spam emails is one of the most tedious tasks due to characteristics of email spam. In this paper, we proposed a systematic content-based analysis method to discover suspicious messages in the spam folder. It is applied to the initial stage of investigation, in which investigator...
Because of the rapid increasing of malware, one of the main challenges in malware detection is how to do malware classification automatically. Although there are many automatic classification methods recently, their results still get high false positive rate. Since the base number of malware samples is huge, a very small false positive can cause a big number of false alarms. Essentially, high false...
A novel slice-layer double-step rate control (SLDSRC) scheme for H.264 is proposed. It not only resolves the problem of inter-dependency between rate-distortion (R-D) optimization (RDO) and rate control (RC), but also improves control accuracy by introducing double-step mechanism, new source rate prediction model, header-bit prediction method. The new rate-quantization (R-Q) model distributes bit...
Introduction In recent years, with the development of network technology and multimedia technology, multimedia data, especially video data, are used more and more widely in human society. Some multimedia data applied in entertainment, politics, economics, militaries, industries or education, etc., are necessary to be protected by providing confidentiality, integrity, and ownership or identity. To...
In this paper, a Particle Swarms Cooperative Optimization is proposed to solve Coalition Generation Problem in parallel manner with each Agent taking part in several different coalitions and each coalition turning its hand to several different tasks. With a novel two-dimensional binary encoding approach, the algorithm performs well on coalition parallel generation. An adaptive disturbance factor is...
In large-scale, complicated Wireless Sensor Networks, the cooperation among sensor nodes is a key topic, and has been receiving more and more attention. The dynamic coalition mechanism in Multi-Agent System is an important method for this topic, and then an energy-efficient coalition formation algorithm is needed since the energy resource of WSN is restricted. This paper proposes a WSN coalition formation...
In view of the problems in the theory of support vector machine (SVM) and intrusion detection model, a new method of multi-classification intrusion detection model based on relevance vector machine (RVM) is proposed. Because RVM is based on Bayesian framework, a priori knowledge of the penalty term is introduced. The RVM algorithm needs less relevance vectors (RVs) (support vectors (SVs) in SVM) and...
In order to overcome many inherent defects of support vector machine (SVM), for example, the kernel function must satisfy the Mercer condition, relevance vector machine (RVM) was proposed to avoid these shortcomings of SVM This study concerns with the performance of RVM and SVM for regression and classification problem. Because RVM is based on Bayesian framework, a priori knowledge of the penalty...
This paper presents a layered and structured analytical method to develop the state-space model of a modular multilevel matrix converter (M3C) system. This method firstly divides the modeling task into the current modeling layer and the energy modeling layer and then decomposes each layer to the corresponding terminal and internal dynamics. The terminal currents of an M3C are applied to control the...
Static synchronous compensator (STATCOM) based on three-level neutral point clamped (NPC) converter is presented. A simple equivalent circuit of three-level converter is analyzed to predict the deviation of node voltages, and the capacitor voltage imbalance mechanism of three-level NPC converter is analyzed. An optimization algorithm of space vector pulse width modulation ( SVPWM ) for capacitor voltage...
With the popularity of monitoring devices, huge amount of surveillance data is generated in every minute. The technique for automatic analysis of monitoring videos is in urgent demand. As an extension of background subtraction, behavior subtraction succeeds in detecting the changes of scenes dynamics instead of its photometric properties. In this paper, we first propose a new algorithm in improving...
This paper presents a strategy to solve the fuzzy coalition formulation problem, which is a difficult topic in multi-agent system (MAS). Based on the grey relational theory, a grey relational grade sequence has been firstly established to describe the relationship between agent capability and task requirement. Then a strategy for fuzzy coalition formation, which combines a stimulation mechanism with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.