The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communi...
详细信息
The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communication,the time-consuming peer-to-peer coordination of the droopfree control slows down the nodal convergence to global consensus,reducing the power-sharing efficiency as the number of nodes *** this end,this paper first proposes a local power-sharing droop-free control scheme to contain disturbances within nearby nodes,in order to reduce the number of nodes involved in the coordination and accelerate the convergence speed.A hybrid local-global power-sharing scheme is then put forward to leverage the merits of both schemes,which also enables the autonomous switching between local and global power-sharing modes according to the system *** guidance for key control parameter designs is derived via the optimal control methods,by optimizing the power-sharing distributions at the steady-state consensus as well as along the dynamic trajectory to *** system stability of the hybrid scheme is proved by the eigenvalue analysis and Lyapunov direct ***,simulation results validate that the proposed hybrid local-global power-sharing scheme performs stably against disturbances and achieves the expected control performance in local and global power-sharing modes as well as mode ***,compared with the classical global power-sharing scheme,the proposed scheme presents promising benefits in convergence speed and scalability.
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in...
详细信息
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,including scattering noise,low contrast,and limited resolution in ultrasound *** existing segmentation models have made progress,they still suffer from several limitations,such as high error rates,low generalizability,overfitting,limited feature learning capability,*** address these challenges,this paper proposes a Multi-level Relation Transformer-based U-Net(MLRT-UNet)to improve thyroid nodule *** MLRTUNet leverages a novel Relation Transformer,which processes images at multiple scales,overcoming the limitations of traditional encoding *** transformer integrates both local and global features effectively through selfattention and cross-attention units,capturing intricate relationships within the *** approach also introduces a Co-operative Transformer Fusion(CTF)module to combine multi-scale features from different encoding layers,enhancing the model’s ability to capture complex patterns in the ***,the Relation Transformer block enhances long-distance dependencies during the decoding process,improving segmentation *** results showthat the MLRT-UNet achieves high segmentation accuracy,reaching 98.2% on the Digital Database Thyroid Image(DDT)dataset,97.8% on the Thyroid Nodule 3493(TG3K)dataset,and 98.2% on the Thyroid Nodule3K(TN3K)*** findings demonstrate that the proposed method significantly enhances the accuracy of thyroid nodule segmentation,addressing the limitations of existing models.
Accurate local temperature measurement at micro and nanoscales requires thermometry with high resolution because of ultra-low thermal *** the various methods for measuring temperature,optical techniques have shown the...
详细信息
Accurate local temperature measurement at micro and nanoscales requires thermometry with high resolution because of ultra-low thermal *** the various methods for measuring temperature,optical techniques have shown the most precise temperature detection,with resolutions reaching(-10^(-9) K).In this work,we present a nanomechanical device with nano-Kelvin resolution(-10^(-9) K)at room temperature and 1 *** device uses a 20 nm thick silicon nitride(SiN)membrane,forming an air chamber as the sensing *** presented device has a temperature sensing area>1 mm^(2)for micro/nanoscale objects with reduced target placement constraints as the target can be placed anywhere on the>1 mm^(2)sensing *** temperature resolution of the SiN membrane device is determined by deflection at the center of the *** temperature resolution is inversely proportional to the membrane's stiffness,as detailed through analysis and measurements of stiffness and noise equivalent temperature(NET)in the pre-stressed SiN *** achievable heat flow resolution of the membrane device is 100 pW,making it suitable for examining thermal transport on micro and nanoscales.
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
In recent times, AI and UAV have progressed significantly in several applications. This article analyzes applications of UAV with modern green computing in various sectors. It addresses cutting-edge technologies such ...
详细信息
The presence of long-range interactions is crucial in distinguishing between abstract complex networks and wave *** photonics,because electromagnetic interactions between optical elements generally decay rapidly with ...
详细信息
The presence of long-range interactions is crucial in distinguishing between abstract complex networks and wave *** photonics,because electromagnetic interactions between optical elements generally decay rapidly with spatial distance,most wave phenomena are modeled with neighboring interactions,which account for only a small part of conceptually possible ***,we explore the impact of substantial long-range interactions in topological *** demonstrate that a crystalline structure,characterized by long-range interactions in the absence of neighboring ones,can be interpreted as an overlapped *** overlap model facilitates the realization of higher values of topological invariants while maintaining bandgap width in photonic topological *** breaking of topology-bandgap tradeoff enables topologically protected multichannel signal processing with broad *** practically accessible system parameters,the result paves the way to the extension of topological physics to network science.
Photo sensing capability of an artificial synaptic device make it more valuable for brain-inspired computing systems, which can conquer the von Neumann bottleneck. In this letter, Ba0.7 Sr0.3 TiO3 (BST) based single l...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
暂无评论