引入模糊聚类方法识别电力系统同调机群。首先对原有的基于模糊相关自组织数据分析算法(iterativese lf-organ iz ing data ana lys is techn iques a lgorithm,ISODATA)的同调机群识别法的各个控制参数的选取问题进行了大量仿真实验,...引入模糊聚类方法识别电力系统同调机群。首先对原有的基于模糊相关自组织数据分析算法(iterativese lf-organ iz ing data ana lys is techn iques a lgorithm,ISODATA)的同调机群识别法的各个控制参数的选取问题进行了大量仿真实验,给出了优化参数取值的一些经验值。特别在如何确定最优分类数的问题上引入了模糊F统计量的方法,并根据电力系统同调识别的特点改进了模糊相关自组织数据分析算法的同调机群识别算法,使其更能适用于工程应用。最后用EPR I_36节点纯交流系统的仿真计算验证了该方法的有效性。展开更多
It is important to segment image correctly to extract guidance information for automatic agriculture vehicle. If we can make the computer know where the crops are, we can extract the guidance line easily. Images were ...It is important to segment image correctly to extract guidance information for automatic agriculture vehicle. If we can make the computer know where the crops are, we can extract the guidance line easily. Images were divided into some rec-tangle small windows, then a pair of 1-D arrays was constructed in each small windows. The correlation coefficients of every small window constructed the features to segment images. The results showed that correlation analysis is a potential approach for processing complex farmland for guidance system, and more correlation analysis methods must be researched.展开更多
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho...The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy.展开更多
文摘引入模糊聚类方法识别电力系统同调机群。首先对原有的基于模糊相关自组织数据分析算法(iterativese lf-organ iz ing data ana lys is techn iques a lgorithm,ISODATA)的同调机群识别法的各个控制参数的选取问题进行了大量仿真实验,给出了优化参数取值的一些经验值。特别在如何确定最优分类数的问题上引入了模糊F统计量的方法,并根据电力系统同调识别的特点改进了模糊相关自组织数据分析算法的同调机群识别算法,使其更能适用于工程应用。最后用EPR I_36节点纯交流系统的仿真计算验证了该方法的有效性。
文摘It is important to segment image correctly to extract guidance information for automatic agriculture vehicle. If we can make the computer know where the crops are, we can extract the guidance line easily. Images were divided into some rec-tangle small windows, then a pair of 1-D arrays was constructed in each small windows. The correlation coefficients of every small window constructed the features to segment images. The results showed that correlation analysis is a potential approach for processing complex farmland for guidance system, and more correlation analysis methods must be researched.
基金supported in part by National Natural Science Foundation of China Project(Grant No.60873216) Scientific and Technological Research Priority Projects of Sichuan Province(Grant No. 2012GZ0017)
文摘The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy.