Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

91results about How to "Improve vulnerability" patented technology

Active power distribution network energy storage planning method based on fragility theory

The invention belongs to a power grid energy storage planning field, and particularly relates to an active power distribution network energy storage planning method based on a fragility theory. The active power distribution network energy storage planning method is characterized by comprising the following steps: firstly determining the parameter information and control variable of an AND energy storage planning model based on the fragility theory; then taking the initial set Omega g composed of all energy storage installation nodes to be selected in a determined representation system as the control variable of an energy storage configuration node range model, using comprehensive fragility variable delta R before and after system placement energy storage as an evaluation index, researching the fragility degree of each node in an active power distribution network, and determining the range of the energy storage installation nodes to be selected in the system; establishing the AND energy storage planning model based on the fragility theory; and finally carrying out iterative solving on the energy storage planning model by using a pre-defined algorithm. According to an energy storage location planning model based on the fragility theory provided by the invention, the two aspects of economical efficiency and improvement on system fragility can be taken into account comprehensively, and the obtained planning scheme has relatively high application value.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Method for improving element vulnerability of electricity-gas comprehensive energy system

The invention discloses a method for improving the element vulnerability of an electricity-gas comprehensive energy system. The method includes: inputting original data, and establishing an electricity-gas comprehensive energy system operation state model to obtain an operation result in an initial normal state; extracting a network topology structure of the comprehensive energy system, and performing processing to obtain structural vulnerability parameters of the elements; simulating an element fault to obtain an operation result of the system in a fault state; obtaining the gas flow distribution entropy of the natural gas system and the power flow distribution entropy of the power system, and obtaining the operation vulnerability parameter of the element; and calculating the weight of each parameter by using an optimal combination weight method to obtain the comprehensive vulnerability of the element. According to the method, key protection can be rapidly carried out on the element with high vulnerability, the reliability of the element is improved by thickening the power line and reinforcing the natural gas pipeline, the overall operation reliability and robustness of the systemare effectively improved, and the probability of large-area faults of the system is reduced.
Owner:ZHEJIANG UNIV

Image watermark embedding and extracting method combining ridgelet transformation and DCT (Discrete Cosine Transform)

The invention discloses an image watermark embedding and extracting method combining ridgelet transformation and DCT (Discrete Cosine Transform). The watermark embedding method comprises the following steps of transforming an image from an RGB (red, green and blue) space to a YIQ (Luminance and Chrominance) space; performing ridgelet transformation on the Y component; selecting an embedding frequency band and dividing into blocks; performing DCT, and adding watermark information to obtain a DCT factor matrix which contains the watermark information; performing IDCT (Inverse Discrete Cosine Transform) and inverse ridgelet transformation; and transforming the image from the YIQ space to the RGB space to obtain the image into which a watermark is embedded. The watermark method comprises the following steps of transforming the image from the RGB space to the YIQ space; performing ridgelet transformation on the Y component; selecting the embedding frequency band and dividing into blocks; performing DCT; extracting the watermark; and calculating a quantized value to obtain the watermark image. The robustness of the watermarking algorithm is enhanced, and the method has higher robustness and invisibility.
Owner:NORTH CHINA UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products