[1] 江翼, 刘正阳, 王文瑞, 等. 基于边云协同的变电设备多状态量监测系统研究[J]. 电力系统保护与控制, 2021, 49(6): 138–144 JIANG Yi, LIU Zhengyang, WANG Wenrui, et al. Research on multi-state monitoring system of substation equipment based on edge-cloud collaboration[J]. Power System Protection and Control, 2021, 49(6): 138–144 [2] MAO Y Y, YOU C S, ZHANG J, et al. A survey on mobile edge computing: the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017, 19(4): 2322–2358. [3] WANG Y, TAO X F, ZHANG X F, et al. Cooperative task offloading in three-tier mobile computing networks: an ADMM framework[J]. IEEE Transactions on Vehicular Technology, 2019, 68(3): 2763–2776. [4] 耿治, 张建忠, 陈昊. 智能变电站保护装置自动测试系统分析与设计[J]. 电力系统保护与控制, 2017, 45(11): 121–125 GENG Zhi, ZHANG Jianzhong, CHEN Hao. Research and design of automatic test system for protection device in intelligent substation[J]. Power System Protection and Control, 2017, 45(11): 121–125 [5] 陈飞建, 吕元双, 樊国盛, 等. 基于信息融合的智能变电站继电保护设备自动测试系统[J]. 电力系统保护与控制, 2020, 48(5): 158–163 CHEN Feijian, LÜ Yuanshuang, FAN Guosheng, et al. Automatic test system of relay protection device for smart substation based on information fusion technology[J]. Power System Protection and Control, 2020, 48(5): 158–163 [6] 刘大伟, 宋爽, 马泉. 基于云策略和MMS协议的智能变电站继电保护设备自动测试系统[J]. 电力系统保护与控制, 2019, 47(12): 159–164 LIU Dawei, SONG Shuang, MA Quan. Automatic test system of relay protection device for intelligent substation based on cloud strategy and MMS protocol[J]. Power System Protection and Control, 2019, 47(12): 159–164 [7] 温东旭, 杨辉, 王旭宁, 等. 电力保护装置保障性自动测试方案研究与实践[J]. 电力系统保护与控制, 2015, 43(10): 135–138 WEN Dongxu, YANG Hui, WANG Xuning, et al. Research and practice on the scheme of automatic testing of power protection device security[J]. Power System Protection and Control, 2015, 43(10): 135–138 [8] 陈潇, 刘庆海, 陈旺, 等. 用数据库技术实现的继保自动测试模板管理[J]. 通信电源技术, 2020, 37(10): 102–104 CHEN Xiao, LIU Qinghai, CHEN Wang, et al. Management for relay protection auto-testing template in the use of database technology[J]. Telecom Power Technologies, 2020, 37(10): 102–104 [9] 李保恩. 智能变电站继电保护装置自动测试平台的研究和应用[J]. 电力系统保护与控制, 2017, 45(7): 131–135 LI Baoen. Research and application of automatic test platform for intelligent substation relay protection device[J]. Power System Protection and Control, 2017, 45(7): 131–135 [10] 彭桂喜, 袁思遥, 孙昊, 等. 继电保护装置检验测试智能体的研究与实现[J]. 电力系统保护与控制, 2022, 50(3): 174–179 PENG Guixi, YUAN Siyao, SUN Hao, et al. Study and implementation of a test agent for relay protection devices[J]. Power System Protection and Control, 2022, 50(3): 174–179 [11] 高磊, 刘玙, 袁宇波, 等. 基于二维码的智能变电站光缆标签系统设计和实现[J]. 电力自动化设备, 2015, 35(10): 169–173 GAO Lei, LIU Yu, YUAN Yubo, et al. Design and implementation of optical cable label system based on QR code for smart substation[J]. Electric Power Automation Equipment, 2015, 35(10): 169–173 [12] RUAN L N, YAN Y, GUO S Y, et al. Priority-based residential energy management with collaborative edge and cloud computing[J]. IEEE Transactions on Industrial Informatics, 2020, 16(3): 1848–1857. [13] TANG J E, ZHOU Z B, XUE X, et al. Using collaborative edge-cloud cache for search in Internet of Things[J]. IEEE Internet of Things Journal, 2020, 7(2): 922–936. [14] GU J, XIE D, GU C H, et al. Location of low-frequency oscillation sources using improved D-S evidence theory[J]. International Journal of Electrical Power & Energy Systems, 2021, 125: 106444. [15] WASIK S, ANTCZAK M, BADURA J, et al. A survey on online judge systems and their applications[J]. ACM Computing Surveys, 2018, 51(1): 3.1–3.34. [16] DAI J, LI Z Q, PAN S H, et al. Deutsch-Jozsa algorithm realization based on IBM Q[J]. Chinese Journal of Quantum Electronics, 2020, 37(2): 202–209. [17] KAR A, PRAMANIK S, CHAKRABORTY A, et al. LMZMPM: local modified zernike moment per-unit mass for robust human face recognition[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 495–509. [18] JADHAV S, MOHITE V. A data hiding techniques based on length of English text using DES and attacks[J]. International Journal of Research in Computer Science, 2012, 2(4): 23–29. [19] 陈红, 张雷, 张海阔, 等. 基于RSA算法的域名保护系统的研究与设计[J]. 计算机工程与设计, 2020, 41(7): 2096–2100, F0003 CHEN Hong, ZHANG Lei, ZHANG Haikuo, et al. Research and design of domain name protection system based on RSA[J]. Computer Engineering and Design, 2020, 41(7): 2096–2100, F0003 [20] KANNAMMAL A, SUBHA RANI S. DICOM image authentication and encryption based on RSA and AES algorithms[M]//Communications in Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012: 349–360. [21] 高新成, 王莉利, 李苏龙. 基于RSA算法的图像加密系统设计与实现[J]. 长江大学学报(自科版), 2016, 13(25): 14–19, 3–4 GAO Xincheng, WANG Lili, LI Sulong. Design and implementation of image encryption system based on RSA algorithm[J]. Journal of Yangtze University (Natural Science Edition), 2016, 13(25): 14–19, 3–4 [22] 鞠博. 访问控制策略研究进展[J]. 电声技术, 2020, 44(12): 78–80 JU Bo. Access control policy research progress[J]. Audio Engineering, 2020, 44(12): 78–80 [23] HAO X H, REN W, FEI Y Y, et al. A blockchain-based cross-domain and autonomous access control scheme for Internet of Things[J]. IEEE Transactions on Services Computing, 2023, 16(2): 773–786. [24] CHO C, SEONG Y, WON Y. Mandatory access control method for windows embedded OS security[J]. Electronics, 2021, 10(20): 2478. [25] BLUNDO C, CIMATO S, SINISCALCHI L. Managing constraints in role based access control[J]. IEEE Access, 2020, 8: 140497–140511.
|