2019
DOI: 10.1049/iet-gtd.2019.0832
|View full text |Cite
|
Sign up to set email alerts
|

Research on quality problems management of electric power equipment based on knowledge–data fusion method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…In order to study the distribution of physical fusion system of safety information privacy, must first clear their wireless networks yuan frequent security threats, and then according to this system nodes show a massive sex and heterogeneity, on the analysis of the existing security mechanisms used to judge the performance of at the same time, reasonable use of lightweight key authentication algorithm, and the content of the quality and safety. [1][2][3][4] Table 1. Definition analysis of node parameters parameter Definition or Purpose Ts Service node election timeout P,q Two prime numbers large enough to generate the key space λ Maximum number of customers of the service node H Fault-tolerant crisis control mechanism Ps…”
Section: Security Threats and Responsementioning
confidence: 99%
“…In order to study the distribution of physical fusion system of safety information privacy, must first clear their wireless networks yuan frequent security threats, and then according to this system nodes show a massive sex and heterogeneity, on the analysis of the existing security mechanisms used to judge the performance of at the same time, reasonable use of lightweight key authentication algorithm, and the content of the quality and safety. [1][2][3][4] Table 1. Definition analysis of node parameters parameter Definition or Purpose Ts Service node election timeout P,q Two prime numbers large enough to generate the key space λ Maximum number of customers of the service node H Fault-tolerant crisis control mechanism Ps…”
Section: Security Threats and Responsementioning
confidence: 99%
“…At present, software packages that have developed a variety of functions have been developed for qualitative and quantitative research on fault trees, and the analysis methods of faulty trees have been widely adopted in the fields of nuclear industry, aviation, aerospace, machinery, electronics, weapons, ships, chemicals, etc. Product safety and reliability [1][2][3][4][5]. However, there are the following problems in the establishment and application of the electrical transformer failure tree:…”
Section: Introductionmentioning
confidence: 99%
“…The continuous expansion of power grids have witnessed exploding requirements to the intelligent operation and maintenance (O&M) of power equipment [1][2][3]. With the wide application of information technologies, massive data (both numerical and textual) is accumulated to support the security and stability of power equipment [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Conventional equipment O&M, mostly carried out from the policy perspective [3], rely heavily on expert experience. Hence, even with the assistance of data-driven models (e.g.…”
Section: Introductionmentioning
confidence: 99%