This paper proposes a novel fault location method for overhead feeders,which is based on the direct load flow *** method is developed in the phase domain to effectively deal with unbalanced network conditions,while it...
详细信息
This paper proposes a novel fault location method for overhead feeders,which is based on the direct load flow *** method is developed in the phase domain to effectively deal with unbalanced network conditions,while it can also handle any type of distributed generation(DG)units without requiring equivalent *** utilizing the line series parameters and synchronized or unsynchronized voltage and current phasor measurements taken from the sources,the method reliably identifies the most probable faulty *** the aid of an index,the exact faulty section among the multiple candidates is *** simulation studies for the IEEE 123-bus test feeder demonstrate that the proposed method accu-rately estimates the fault position under numerous short-circuit conditions with varying prefault system loading conditions,fault resistances,and measurement *** proposed method is promising for practical applications due to the limited number of required measurement devices as well as the short computation time.
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol...
详细信息
AC optimal power flow (AC OPF) is a fundamental problem in power system operations. Accurately modeling the network physics via the AC power flow equations makes AC OPF a challenging nonconvex problem. To search for g...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB),which is high-dimensional,non-convex,and non-linear,presents a significant *** address this problem,this paper proposes a method for approximating the SSRB in power systems using the feature non-linear converter and improved oblique decision ***,to better characterize the SSRB,boundary samples are generated using the proposed sampling *** samples are distributed within a limited distance near the ***,to handle the high-dimensionality,non-convexity and non-linearity of the SSRB,boundary samples are converted from the original power injection space to a new fea-ture space using the designed feature non-linear ***-sequently,in this feature space,boundary samples are linearly separated using the proposed information gain rate based weighted oblique decision ***,the effectiveness and generality of the proposed sampling method are verified on the WECC 3-machine 9-bus system and IEEE 118-bus system.
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo...
详细信息
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user ***, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models.
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these proce...
详细信息
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse *** examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse *** also consider the distribution characteristics of the average coordination number and average velocity for the moving *** results support that the polydisperse particle systems are more stable in the T2 stage.
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to bal...
详细信息
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to balance energy supplies and demands under uncertain weather *** proposed online scheduling algorithm aims at minimizing the overall energy cost by performing actions such as load shifting and peak shaving through carefully scheduled BESS charging/discharging *** scheduling algorithm is developed by using deep deterministic policy gradient(DDPG),a deep reinforcement learning(DRL)algorithm that can deal with continuous state and action *** of the main contributions of this work is a new DDPG reward function,which is designed based on the unique behaviors of energy *** new reward function can guide the scheduler to learn the appropriate behaviors of load shifting and peak shaving through a balanced process of exploration and *** new scheduling algorithm is tested through case studies using real world data,and the results indicate that it outperforms existing algorithms such as Deep *** online algorithm can efficiently learn the behaviors of optimum non-casual off-line algorithms.
Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,...
详细信息
Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,area,and time efficiencies of neuromorphic computing *** study is primarily focused on the development of a single sensing-storage-processing node based on a two-terminal solution-processable MoS2 metal-oxide-semiconductor(MOS)charge-trapping memory structure—the basic structure for charge-coupled devices(CCD)—and showing its suitability for in-memory light sensing and artificial visual *** memory window of the device increased from 2.8 V to more than 6V when the device was irradiated with optical lights of different wavelengths during the program ***,the charge retention capability of the device at a high temperature(100 ℃)was enhanced from 36 to 64%when exposed to a light wavelength of 400 *** larger shift in the threshold voltage with an increasing operating voltage confirmed that more charges were trapped at the Al_(2)O_(3)/MoS_(2) interface and in the MoS_(2) layer.A small convolutional neural network was proposed to measure the optical sensing and electrical programming abilities of the *** array simulation received optical images transmitted using a blue light wavelength and performed inference computation to process and recognize the images with 91%*** study is a significant step toward the development of optoelectronic MOS memory devices for neuromorphic visual perception,adaptive parallel processing networks for in-memory light sensing,and smart CCD cameras with artificial visual perception capabilities.
暂无评论