Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Security

China Simulation Federation

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian Jun 2023

Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian

Journal of System Simulation

A new state estimation algorithm is proposed to improve the accuracy to obtain the optimal state estimation of distribution network against FDI attack. In the case of phasor measurement units being attacked and the measurement results being altered,the optimal Kalman estimate can be decomposed into a weighted sum of local state estimates. Focusing on the insecurity of the weighted sum method,a convex optimization based on local estimation is proposed to replace the method and combine the local estimation into a secure state estimation. The simulation results show that the proposed estimator is consistent with the Kalman …


Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li Jun 2020

Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li

Journal of System Simulation

Abstract: As an emerging sample theory, compressive sensing attracts wide attention because it breaks through the Nyquist sampling theorem. , Two different methods of watermark embedding and extraction are presented by measuring the carrier image and watermark image respectively based on compressive sensing. Moreover, the attack tests, such as the Gaussian noise, pepper and salt noise, filtering, compression, and cropping, are implemented to watermarked images. Experiment results show that although the two different methods for image watermarking have different processing procedure, both can guarantee the robustness and security of embedded digital watermark.