Computer Science ›› 2023, Vol. 50 ›› Issue (12): 123-129.doi: 10.11896/jsjkx.230700230
• Database & Big Data & Data Science • Previous Articles Next Articles
CHEN Xingtian1, XIONG Xiaofu2, BAI Yong1, HU Haiyang2
CLC Number:
[1]DL/T860.92-2006.Communication networks and systems insubstations-Part 9-2:Specific Communication Service Mapping(SCSM)-Sampled values over ISO/IEC 8802-3[S].Beijing:National Electric Power System Management and Information Exchange Standardization Technical Committee,2006. [2]FU G X,DAI C J.Integrated design and implementation of network analysis and fault recording for intelligent substation[J].Electric Power Automation Equipment,2013,33(5):163-167. [3]HOU A J,XIONG X F,SHEN Z J,et al.A reliability decisionmethod of CBM maintenance schedule for transmission equipment[J].Power System Protection and Control,2012,40(22):108-112. [4]LI L,XIONG W,LU D M,et al.Study on the prediction method for failure rate in the reliability evaluation of power transmission and transformation facility[J].Electrical Measurement & Instrumentation,2015,52(3):37-41. [5]TIAN L,XING J G.Discussion on making decision about electric equipment for condition based maintenance[J].Power System Technology,2004,28(16):60-63. [6]ZHAO M M,LIN S S,LI Q,et al.Reliability analysis of smart substation secondary equipment[J].Process Automation Instrumentation,2022,43(4):45-50. [7]WU X,WANG Y,YIN X G,et al.Development and application of power equipment status evaluation system[J].High Voltage Apparatus,2020,56(6):7-12. [8]CUI C,WANG M M,XU Y L,et al.Reliability Prediction ofElectronic Current Transformer Based on Rogowski Coil[J].Shandong Electric Power,2016,43(6):14-17,36. [9]Q/GDW 10715-2016,Technical Specification for Network Message Recording and Analysis Device of Intelligent Substation[S].Beijing:State Grid Corporation of China,2017. [10]WANG X A,DOU Z S,JIN H R,et al.The new realization of messages recorder and analyzer used in smart substation[J].Electrical Technology,2014(2):82-85. [11]ZIV J,LEMPLE A.A universal algorithm for sequential data compression[J].IEEE Transactions on Information Theory,1977,23(3):337-343. [12]ZIV J,LEMPLE A.Compression of individual sequences via va-riable-rate coding[J].IEEE Transactions on Information Theory,1978,24(5):530-536. [13]XI W,LI P,LI P,et al.Atwo-stage PMU data compressionmethod for edge computing devices of distribution networks[J].Power System Technology,2023,47(8):3184-3193. [14]YUE Q M,YU W Y,BAI C J,et al.Novel compression scheme of fault recording data in power systems based on lifting algorithm[J].Automation of Electric Power System,2005,29(5):74-78. [15]LI B,ZHANG,LIU Y.FPGA hardware implementation of the LZMA compression algorithm[J].Journal of Beijing University of Aeronautics and Astronautics,2015,41(3):375-382. [16]CHEN X J,LI B,ZHOU Q L.Implementation of RTL Scalable High-Performance Data Compression Method[J].Acta Electo-nica Sinica,2022,50(7):1548-1557. [17]HUFFMAN D A.A method for the construction of minimum-redundancy codes[J].Proceedings of the IRE,1952,40(9):1098-1101. [18]SHANNON C E.A mathematical theory of communication[J].The Bell System Technical Journal,1948,27(3):379-423. [19]Lempel-Ziv-Markov chain algorithm[EB/OL].https://infogalactic.com/info/Lempel-Ziv-Markov_chain_algorithm. [20]MA F Y,LI Q P,MA Z B,et al.The Research of Historical Data Compression and Storage Strategy in Power Dispatch SCADA System[J].Power System Technology,2014,38(4):1109-1114. [21]HUANG C,YANG S X,LIANG Y C,et al.Practical data compression method for power system fault records[J].Electric Power Automation Equipment,2014,34(6):162-167. [22]FEI M W,YUE Q M,ZHANG P C,et al.Wavelets Selection of Compression and Reconstruction Algorithm Based on Digital Recorded Data from a Faulted Power System[J].Automation of Electric Power Systems,2005(17):64-67,97. [23]HUANG T S,WANG Y,WU D,et al.Second generation wavelet-based data compression algorithm for power system fault recorder[J].Electric Power Automation Equipment,2004(3):59-62. [24]FU S Y,WANG L,CHENG Y D,et al.Synchrotron radiation source image compression method based on difference and neural network[J].Journal of National University of Defense Techno-logy,2022,44(5):53-62. |
[1] | AN Ziheng, XU Chao, FENG Bo, HAN Jubao. Endoscopic Image Enhancement Algorithm Based on Luminance Correction and Fusion Channel Prior [J]. Computer Science, 2023, 50(6A): 220300265-7. |
[2] | SU Yonghong, XIA Ting, WANG Xumei, QIAN Xiaohong. New Image Watermarking Algorithm Based on Quantum Wavelet Transform [J]. Computer Science, 2023, 50(6A): 220300034-8. |
[3] | LAI Teng-fei, ZHOU Hai-yang, YU Fei-hong. Real-time Extend Depth of Field Algorithm for Video Processing [J]. Computer Science, 2022, 49(6A): 314-318. |
[4] | SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440. |
[5] | HUANG Xiao-ling, ZHANG De-ping. Fault Diagnosis Based on Channel Splitting CLAHE and Adaptive Threshold Residual NetworkUnder Variable Operating Conditions [J]. Computer Science, 2022, 49(11A): 211100122-7. |
[6] | XU Kun-cai, FENG Bao, CHEN Ye-hang, LIU Yu, ZHOU Hao-yang, CHEN Xiang-meng. Thymoma CT Image Prediction Method Based on Deep Learning and Improved Extreme Learning Machine Ensemble Learning [J]. Computer Science, 2022, 49(11A): 211200097-6. |
[7] | ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45. |
[8] | LUO Ting-rui, JIA Jian, ZHANG Rui. Epileptic EEG Signals Detection Based on Tunable Q-factor Wavelet Transform and Transfer Learning [J]. Computer Science, 2020, 47(7): 199-205. |
[9] | WEN Hao, CHEN Hao. Tax Prediction Based on LSTM Recurrent Neural Network [J]. Computer Science, 2020, 47(11A): 437-443. |
[10] | ZHANG Yang-feng, WEI Shi-hong, DENG Na-na, WANG Wen-rui. Vibration Sensor Data Analysis Based on Wavelet Denoising [J]. Computer Science, 2019, 46(6A): 537-539. |
[11] | LI Kai, LUO Xiao-qing, ZHANG Zhan-cheng, WANG Jun. Image Fusion Using Quaternion Wavelet Transform and Copula Model [J]. Computer Science, 2019, 46(4): 293-299. |
[12] | LIU Jia-hui, WANG Yu-jie, LEI Yi. CSI Gesture Recognition Method Based on LSTM [J]. Computer Science, 2019, 46(11A): 283-288. |
[13] | WANG Qian, YU Lai-hang, CAO Yan, ZHANG Lei, QIN Jie, YE Hai-qin. Blind Watermarking Algorithm for Digital Image Based on Fibonacci Scrambling in Wavelet Domain [J]. Computer Science, 2018, 45(6): 135-140. |
[14] | YANG Yan-chun, LI Jiao, DANG Jian-wu and WANG Yang-ping. Multi-focus Image Fusion Based on Redundant Wavelet Transform and Guided Filtering [J]. Computer Science, 2018, 45(2): 301-305. |
[15] | LI Yi-ke and WANG Zhan. Hardware Implementation of Fast Huffman Coding Based on Different Sorting Methods [J]. Computer Science, 2017, 44(Z11): 476-479. |
|