提出了基于纵联比较原理的广域继电保护算法。
A wide area relaying protection algorithm based on longitudinal comparison principle is proposed.
主要介绍该装置的功能配置、硬件结构和保护算法。
Its functional configuration, hardware structure and protection algorithm are introduced in this paper.
在单节点保护算法的基础上,提出双节点保护算法。
We also present the proof of the single node protection algorithm.
主要介绍该装置的功能配置、硬件结构和保护算法。
Therefore, the function configuration for the physiological monitor should be different accordingly.
即单节点保护算法可以保护除失效节点之外的其余组播群成员。
The single node protection algorithm can protect every group member except the failure member.
电机智能保护器保护算法的研究杭军政1,李生民2,孙旭霞2。
The research of intelligent protector arithmetic on motor HANG Junzheng1, li Shengmin2, SUN xuxia2.
本课题仿真计算的保护算法用于实现高压线路微机距离保护的反时限。
The algorithms of microprocessor distance protection emulated and calculated in this paper are used to realize the inverse time characteristic of microprocessor distance protection.
针对WDM(波分复用)光网络光层保护问题,提出了两种新的保护算法。
Against the protection problem of optical layer in WDM networks, two new protection algorithms are proposed.
提出了一种基于双端电压暂态信号小波变换的高压输电线路快速保护算法。
A new high speed protection criterion for high voltage transmission line based on the wavelet transform of transient voltage signals from the two ends of the line is presented.
从介绍谐波对电动机发热的影响出发,分析了相应的微机保护算法及有关问题。
Proceeding from the effect of harmonic wave on the heating of electric motors , the author analyses the corresponding microcomputer protection algorithm and some relevant questions.
系统功能由数字滤波试验,保护算法试验和保护元件动作特性试验三大块组成。
The whole system is composed of number wave filter experiment module, protection measurement experiment module and protective component action characteristic experiment module.
提出一种高容错性的广域后备保护算法,用于变电站间分布式广域后备保护系统。
A wide area backup protection algorithm with high fault-tolerance performance is proposed to implement the distributed wide area backup protection system.
并根据各算法的估计性能特点,提出了一种具有反时限特性的距离保护算法的实现方案。
According to the characteristics of different algorithms, an implementation scheme of distance protection with inverse time characteristic is brought forward.
介绍以DSP为核心芯片电动机保护智能仪表中的软件设计,保证智能保护算法的有效运行。
This article presents a software design on intelligent meters for motor protection based on DSP chips in order to guarantee the intelligent protection algorithm function efficiently.
该系统利用双端口ram (DPRAM)实现两处理器的通信,运用递推最小二乘法实现保护算法。
This system USES Dual Port Random Access Memory (DPRAM) to realize the communication between two processors and chooses the recursive least error squares (RLES) algorithm.
本文围绕将小波变换应用到变压器的微机保护算法中,为保护算法提取所需的电气特征量方面进行了探讨。
This paper mainly focuses on the implement of wavelet to the Microcomputer-based protection for power transformer, especially to extract some useful information for the protection algorithms.
在分析双绕组变压器的差动保护算法的基础上,提出了适用于三相三绕组变压器的比率制动式算法,并对判据进行了简化。
Based on the analysis of the differential protection of the double winding transformer, the paper presents a simplified ratio restraint algorithms for the three phase, three winding transformer.
与传统保护算法相比,基于MG 的TBDP具有更高的可靠性和较少的计算量,同时具有更快的故障响应能力和更高的灵敏性。
The MG based TBDP scheme has higher reliability and less computational complexity, and provides higher sensitivity together with faster fault response as compared with traditional protection schemes.
本论文对电力系统微机保护算法和测控算法进行了详细的分析和比较,对本系统中用到的各种继电保护方法的微机实现作了详细的阐述。
This dissertation analyses and compares the microprocessor based protection and measurement algorithms used in power system. And expounds how to realize each protection method by microprocessor.
批评人士称,该公司既未充分保护自己的服务器,采用的数据加密算法又易遭破解。
Critics say that it did not protect its servers sufficiently and used algorithms to encrypt data that can be easily cracked.
用于保护数据的加密算法
因此,第2部分还将说明为什么需要进行规范化和摘要算法,以保护对Web服务的无线访问。
Therefore Part 2 also teaches you why you need canonicalization and digest algorithms to secure wireless access to your Web services.
这保护了其独特的搜索算法和扫描项目的机密性,所以图书馆员不知道已经完成的工作或其已经有多少内容了。
It protects its proprietary search algorithms and keeps its scanning projects confidential, so librarians don't know what has been completed or how large the content base has become.
这两个评论的一个共同点是一种轻蔑,其对象是任何在谷歌的搜索算法面前想要隐藏私生活信息和保护知识产权的人。
The thing that unites these two remarks is the disdain they imply for anyone wanting to hide details of their private lives, or protect their intellectual property, from Google's algorithms.
文章对网状拓扑中的虚环保护机制进行了研究,并对一种基于生成树的虚环构成算法进行了分析。
This paper studied the protection mechanism for virtual ring in mesh topology, and analyzed a construction algorithm for a virtual ring based on spanning tree.
实验结果表明该算法能够很好地实现数字图像版权保护、篡改检测和定位。
The experimental result shows this algorithm can realize copyright protection, tamper detection and localization well.
实验结果表明该算法能够很好地实现数字图像版权保护、篡改检测和定位。
The experimental result shows this algorithm can realize copyright protection, tamper detection and localization well.
应用推荐