Quantum power flow(QPF)offers an inspiring direction for overcoming the computation challenge of power flow through quantum ***,the practical implementation of existing QPF algorithms in today’s noisy-intermediate-sc...
详细信息
Quantum power flow(QPF)offers an inspiring direction for overcoming the computation challenge of power flow through quantum ***,the practical implementation of existing QPF algorithms in today’s noisy-intermediate-scale quantum(NISQ)era remains limited because of their sensitivity to *** paper establishes an NISQ-QPF algorithm that enables power flow computation on noisy quantum *** main contributions include:(1)a variational quantum circuit(VQC)-based alternating current(AC)power flow formulation,which enables QPF using short-depth quantum circuits;(2)NISQ-compatible QPF solvers based on the variational quantum linear solver(VQLS)and modified fast decoupled power flow;and(3)an error-resilient QPF scheme to relieve the QPF iteration deviations caused by noise;(3)a practical NISQ-QPF framework for implementable and reliable power flow analysis on noisy quantum *** simulation tests validate the accuracy and generality of NISQ-QPF for solving practical power flow on IBM’s real,noisy quantum computers.
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial im...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems(CPPSs).This paper presents a comprehensive review of some of the latest attack detection and defense ***,the vulnerabilities brought by some new information and communication technologies(ICTs)are analyzed,and their impacts on the security of CPPSs are *** malicious cyber-attacks on cyber and physical layers are then analyzed within CPPSs framework,and their features and negative impacts are ***,two current mainstream attack detection methods including state estimation based and machine learning based methods are analyzed,and their benefits and drawbacks are ***,two current mainstream attack defense methods including active defense and passive defense methods are comprehensively ***,the trends and challenges in attack detection and defense strategies in CPPSs are provided.
An ultra-wideband (UWB) slotted compact Vivaldi antenna with a microstrip line feed was evaluated for microwave imaging (MI) applications. The recommended FR4 substrate-based Vivaldi antenna is 50×50×1.5 mm3...
详细信息
This paper presents an innovative method for the mathematical modeling of Permanent Magnet Synchronous Motors (PMSMs) using quaternion space. Traditional modeling methods typically assume a balanced three-phase voltag...
详细信息
Lung disease, especially Tuberculosis (TBC), placed the highest death rate in Indonesia. Tuberculosis (TB) in Indonesia is ranked second after India. Therefore, it is important to reduce or early detection of the lung...
详细信息
Blood cancer cell diagnosis is crucial in medical diagnostics. It demands accurate classification of blood cell images. Proper classification of blood cancer cells is fundamental for accurately diagnosing the specific...
详细信息
— The direct pulsewidth modulation (PWM) ac–ac converters are seeing rapid development due to their single-stage power conversion with reduced footprints, due to the elimination of intermediate dc-link capacitor. Ho...
详细信息
In recent advancements within wireless sensor networks(WSN),the deployment of unmanned aerial vehicles(UAVs)has emerged as a groundbreaking strategy for enhancing routing efficiency and overall network *** research in...
详细信息
In recent advancements within wireless sensor networks(WSN),the deployment of unmanned aerial vehicles(UAVs)has emerged as a groundbreaking strategy for enhancing routing efficiency and overall network *** research introduces a sophisticated framework,driven by computational intelligence,that merges clustering techniques with UAV mobility to refine routing strategies in *** proposed approach divides the sensor field into distinct sectors and implements a novel weighting system for the selection of cluster heads(CHs).This system is primarily aimed at reducing energy consumption through meticulously planned routing and path *** a greedy algorithm for inter-cluster dialogue,our framework orchestrates CHs into an efficient communication *** comparative analysis,the proposed model demonstrates a marked improvement over traditional methods such as the cluster chain mobile agent routing(CCMAR)and the energy-efficient cluster-based dynamic algorithms(ECCRA).Specifically,it showcases an impressive 15%increase in energy conservation and a 20%reduction in data transmission time,highlighting its advanced ***,this paper investigates the impact of various network parameters on the efficiency and robustness of the WSN,emphasizing the vital role of sophisticated computational strategies in optimizing network operations.
Four designs (D1-D4) of flexible triboelectric nanogenerators (TENGs) were successfully fabricated in three different configurations for energy harvesting applications. Typically, TENG consists of anode layer, cathode...
详细信息
Lie detection has gained importance and is now extremely significant in a variety of fields. It plays an important role in several domains, including law enforcement, criminal investigations, national security, workpl...
详细信息
Lie detection has gained importance and is now extremely significant in a variety of fields. It plays an important role in several domains, including law enforcement, criminal investigations, national security, workplace ethics, and personal relationships. As advances in lie detection continue to develop, real-time approaches such as voice stress technology have emerged as a feasible alternative to traditional methods such as polygraph testing. Polygraph testing, a historical and generally established approach, may be enhanced or replaced by these revolutionary real-time techniques. Traditional lie detection procedures, such as polygraph testing, have been challenged for their lack of reliability and validity. Newer techniques, such as brain imaging and machine learning, might offer better outcomes, although they are still in their early phases and require additional testing. This project intends to explore a deception-detection module based on sophisticated speech-stress analysis techniques that might be applied in a real-time deception system. The purpose is to study stress and other articulation cues in voice patterns, to establish their precision and reliability in detecting deceit, by building upon previous knowledge and applying state-of-the-art architecture. The performance and accuracy of the system and its audio aspects will be thoroughly analyzed. The ultimate purpose is to contribute to the advancement of more accurate and reliable lie-detection systems, by addressing the limitations of old techniques and proposing practical solutions for varied applications. This paper proposes an efficient feature-selection strategy, which uses random forest (RF) to select only the significant features for training when a real-life trial dataset consisting of audio files is employed. Next, utilizing the RF as a classifier, an accuracy of 88% is reached through comprehensive evaluation, thereby confirming its reliability and precision for lie-detection in real-time scena
暂无评论