Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Xiong, Yan"'
Autor:
Zhi-Yong Xiong, Zhao-Xiong Yan
Publikováno v:
2021 International Conference on Machine Learning and Intelligent Systems Engineering (MLISE).
Autor:
Xianghua Zhao, Zhipeng He, Weihua Zhong, Liu Yang, Yuebin Zhou, Xiong Yan, Shukai Xu, Zhe Zhu
Publikováno v:
2020 4th International Conference on HVDC (HVDC).
This VSC-HVDC (Voltage Sourced Converter) has been widely applied all over the world owing to its unique advantages. Converter valve is the key equipment of VSCs, its losses are significant to the economically operation of VSC stations. Analysis and
Publikováno v:
2020 4th International Conference on HVDC (HVDC).
Over-modulation can increase the voltage RMS of the component with fundamental frequency produced by the voltage sourced converter based high voltage direct current (VSC-HVDC). It has economic and technical advantages since it can reduce the current
Publikováno v:
IEEE Transactions on Information Theory; Nov2021, Vol. 67 Issue 11, p7240-7252, 13p
Publikováno v:
2018 International Conference on Power System Technology (POWERCON).
Human error is still a major cause contributing to the incidents and accidents at nuclear power plant. Especially operators try to flexibly operate the plant system according to their experience or encounter unfamiliar situations, human errors may oc
Publikováno v:
2018 International Conference on Power System Technology (POWERCON).
Alarm cascades is one of the major problems of a main control room at nuclear power plant. This paper presents a functional modeling approach alarm analysis based on Multilevel Flow Models (MFM). The proposed alarm analysis method consists of an alar
Autor:
Xiong Yan
Publikováno v:
2018 11th International Conference on Intelligent Computation Technology and Automation (ICICTA).
How to build a hierarchical English Machine Translation model has become an urgent issue. Here in this thesis the author proposed a model building of hierarchical English Machine Translation depending on the intelligent fuzzy decision tree algorithm.
Publikováno v:
BigCom
With system crashes or power failures, state-continuity solutions ensure the state of protected modules, e.g., enclaves of Intel SGX, cannot be rolled back to a stale version. In this paper, we propose a general framework for formally modeling and ve
Publikováno v:
IEEE Transactions on Information Forensics & Security; 2021, Vol. 16, p1912-1927, 16p
Publikováno v:
2017 IEEE 17th International Conference on Communication Technology (ICCT).
This paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, the second is path searching betwee