Seismic disaster would cause overall performance degradation or even failure of public communication networks. To analyze the security performance of networks responding to seismic disasters scenarios, a nodes-lines e...
详细信息
ISBN:
(数字)9798350363760
ISBN:
(纸本)9798350363777
Seismic disaster would cause overall performance degradation or even failure of public communication networks. To analyze the security performance of networks responding to seismic disasters scenarios, a nodes-lines evaluation model is proposed based on graph theory and Monte Carlo method, which clarifies the mathematical probability relationship between seismic parameter and performance of the networks. And then, we present a post-disaster route reconfiguration algorithm with optimal recovery time as objective function considering social dimensions. Finally, two cases analysis are given which verify the feasibility of the proposed evaluation model and route algorithm respectively. This research provides effective methodologies for seismic security evaluation and rapid post-disaster recovery of public communication networks.
Susceptibility inversion of near-field magnetic sources has played an increasingly important role in the field of magnetic target detection in recent years. In this paper, the GBO algorithm, an objective optimization ...
详细信息
ISBN:
(数字)9798350350326
ISBN:
(纸本)9798350350333
Susceptibility inversion of near-field magnetic sources has played an increasingly important role in the field of magnetic target detection in recent years. In this paper, the GBO algorithm, an objective optimization algorithm that combines Newton's iterative method with genetic algorithm, is used to find the optimal objective function. At the same time, we improved the setup conditions for the initial populations so that their priori information could be more fully utilized. In this study, the simulation software was used to generate the magnetic anomaly data for four models, which were then inverted with promising results, demonstrating the significant role of the GBO optimization algorithm in the physical inversion of magnetic targets. Finally, an experimental platform is built to realistically measure the magnetic target to be measured, proving the effectiveness of the GBO algorithm in magnetization rate inversion.
Airborne radar deployment optimization signifi-cantly enhances the utilization ratio of resources such as flight loss and strengthens the target detection capability. This article investigates a deployment optimizatio...
详细信息
ISBN:
(数字)9798350329209
ISBN:
(纸本)9798350329216
Airborne radar deployment optimization signifi-cantly enhances the utilization ratio of resources such as flight loss and strengthens the target detection capability. This article investigates a deployment optimization method of airborne dis-tributed multiple input multiple output (MIMO) radar for task reinforecement. In order to improve detection ability and reduce flight loss, we use effective coverage rate and total flight cost as objective functions and develop a multi-objective optimization model. Considering that the problem has more than one objective and dimension, we propose a multi-objective particle swarm optimization with dynamic weight relative crowding distance (MOPSO-DWRCD) algorithm. Compared to traditional MOPSO, MOPSO-DWRCD exhibits better performance in global optimal solution selection in each iteration. Finally, simulation results are provided to verify the effectiveness of the proposed algorithm.
This study proposes a novel method based on K-means and the Logistic Chaotic JAYA algorithm (LCJAYA) to resolve the ORPD problem for real power loss minimization, voltage deviation minimization and voltage stability e...
详细信息
ISBN:
(数字)9798350349351
ISBN:
(纸本)9798350349368
This study proposes a novel method based on K-means and the Logistic Chaotic JAYA algorithm (LCJAYA) to resolve the ORPD problem for real power loss minimization, voltage deviation minimization and voltage stability enhancement. Firstly, the K-means method is introduced to cluster the setting of control variables including the generation voltage magnitude, the tap changing transformers and the reactive power of the compensation devices. Then, the LCJAYA is used to determine the cluster centers. The proposed algorithm uses at first, a Logistic Chaotic to enhance the population diversity and to improve the exploration search areas. Then, a chaotic mutation strategy to improve the exploration and the exploitation. IEEE 57 Bus system is used to validate the proposed algorithm. The optimization algorithm is general and can be used to solve other power system optimization problems
Multi-infeed short circuit ratio (MISCR) is an important index for evaluating the AC system capability interconnecting HVDC systems. With a view to analyzing the influence of the margin of MISCR on DC access, based on...
详细信息
ISBN:
(数字)9798350387759
ISBN:
(纸本)9798350387766
Multi-infeed short circuit ratio (MISCR) is an important index for evaluating the AC system capability interconnecting HVDC systems. With a view to analyzing the influence of the margin of MISCR on DC access, based on the MISCR established by the multi-infeed interaction factor (MIIF) based on the reduced Jacobian matrix. First, proposes the multi-infeed SCR margin index and the multi-infeed SCR margin interference index. Then, based on the method of constructing a weighted objective function, a method for evaluating multi-infeed SCR margin with consideration of DC terminal location selection is presented, and the procedure for applying this method to select the DC terminal location is provided. Ultimately, the proposed method's effectiveness is confirmed through simulation analysis of a 3-infeed 11-bus system. The findings indicate that the assessment approach suggested in this paper has the capability to quantitatively evaluate the multi-infeed SCR margin of the system and can be effectively applied to the selection of DC terminal location.
Anticipation for 6G's arrival comes with growing concerns about increased energy consumption in computing and networking. The expected surge in connected devices and resource-demanding applications presents unprec...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
Anticipation for 6G's arrival comes with growing concerns about increased energy consumption in computing and networking. The expected surge in connected devices and resource-demanding applications presents unprecedented challenges for energy resources. While sustainable resource allocation strategies have been discussed in the past, these efforts have primarily focused on single-domain orchestration or ignored the unique requirements posed by 6G. To address this gap, we investigate the joint problem of service instance placement and assignment, path selection, and request prioritization, dubbed PIRA. The objective function is to maximize the system's overall profit as a function of the number of concurrently supported requests while simultaneously minimizing energy consumption over an extended period of time. In addition, end-to-end latency requirements and resource capacity constraints are considered for computing and networking resources, where queuing theory is utilized to estimate the Age of Information (AoI) for requests. After formulating the problem in a non-linear fashion, we prove its NP-hardness and propose a method, denoted ORIENT. This method is based on the Double Dueling Deep Q-Learning (D3QL) mechanism and leverages Graph Neural Networks (GNNs) for state encoding. Extensive numerical simulations demonstrate that ORIENT yields near-optimal solutions for varying system sizes and request counts.
The rapid growth of Low-Power and Lossy Networks (LLN s) in the Internet of Things (IoT) has brought significant advancements in connectivity and automation, particularly in environments with constrained resources and...
详细信息
ISBN:
(数字)9798331528539
ISBN:
(纸本)9798331528546
The rapid growth of Low-Power and Lossy Networks (LLN s) in the Internet of Things (IoT) has brought significant advancements in connectivity and automation, particularly in environments with constrained resources and unstable communication links. However, this widespread adoption also exposes LLN s to various security threats, including rank, version number, and neighbor attacks, which can severely disrupt network operations and compromise data integrity. This paper proposes an Intrusion Detection System (IDS) tailored for Routing Protocol for Low-Power and Lossy Networks (RPL), aimed at detecting and mitigating these specific attacks. The proposed hybrid-trust-based IDS (H-TIDS) employs a multi-faceted approach, incorporating enhanced rank verification mechanisms within the energy-efficient Objective Function (OF) and utilizing version numbers and timestamps to ensure the freshness and integrity of routing information. The IDS effectively identifies and neutralizes malicious activities by monitoring and analyzing the consistency of rank values, detecting anomalies in version number updates, and validating the authenticity of neighboring nodes. Extensive simulations demonstrate the efficacy of the proposed work in maintaining efficiency, network stability, and security, thereby reinforcing the resilience of RPL-based LLNs against sophisticated attacks. The performance of the proposed approach is analyzed and compared with existing work in terms of energy efficiency and increased network throughput. The results show that the proposed approach outperforms the existing methods.
This study addresses a multi-objective optimization problem in the planning of an uncertainty-aware sequence and motion for mechanical products with intricate structures and numerous contact areas. To generate an opti...
详细信息
ISBN:
(数字)9798350358513
ISBN:
(纸本)9798350358520
This study addresses a multi-objective optimization problem in the planning of an uncertainty-aware sequence and motion for mechanical products with intricate structures and numerous contact areas. To generate an optimized sequence and motion that satisfies multiple conditions under mandatory requirements, we use a multi-objective optimization algorithm inspired by Non-Dominated Sorting Genetic Algorithm III, along with contact-rich robotic assembly-oriented constraints and objective functions. The proposed pipeline takes as input the CAD models of robot hardware, workspace, and assembled parts, conducts 3D geometrical and physical simulations of assembly motions, and then optimizes the assembly plan, including parts order, object placement pose, state transition, grasp, and trajectory for the real robot to execute. To obtain the uncertainty-aware sequence and motion, we incorporated a Contingent Contact-Exploring Rapidly-exploring Random Trees (ConCERRT)-based state transition planner and an objective function to evaluate the uncertainty in the multi-objective optimization algorithm. Our experiments on assembly planning for a chainsaw product demonstrated that the proposed method can generate constraint-satisfied assembly plans with a success rate of 99.2% while lowering the uncertainty in the simulations.
The physical layer (PHY) security is a key technology for constant modulus (CM) massive MIMO systems. In this paper, we consider using an intelligent reflecting surface (IRS) to provide the system with additional degr...
详细信息
ISBN:
(数字)9798350304053
ISBN:
(纸本)9798350304060
The physical layer (PHY) security is a key technology for constant modulus (CM) massive MIMO systems. In this paper, we consider using an intelligent reflecting surface (IRS) to provide the system with additional degrees of freedom, thus enhancing its performance. We approach the problem from an optimization perspective, aiming to maximize the security rate. The optimization problem presents significant challenges due to highly coupled variables, non-convex constraints and the non-concave objective function. To tackle these challenges, we propose an efficient alternating optimization (AO) method. This method guarantees convergence to a Karush-Kuhn-Tucker (KKT) point and separately optimizes the CM beamforming and phase shift coefficients at the IRS as two sub-problems. Both sub-problems are solved using similar frameworks of the Dinkelbach method and the alternating direction method of multipliers (ADMM). Simulation results show that the proposed method outperforms many other related methods.
This paper examines a special class of nonlinear programming problems. The problem is characterized by 1) nonlinearity of the objective function and functions defining constraints of the equality type; 2) large dimens...
详细信息
ISBN:
(数字)9798350353099
ISBN:
(纸本)9798350353105
This paper examines a special class of nonlinear programming problems. The problem is characterized by 1) nonlinearity of the objective function and functions defining constraints of the equality type; 2) large dimension of optimized variables; 3) sparseness of the Jacobian matrix of equality type constraints. By applying graph theory to the problem of obtaining constructive formulas for the gradient of the objective function. The obtained formulas made it possible to propose a gradient projection method for a numerical solution.
暂无评论