In the realm of coal mining, safety and risk management stand as paramount challenges, underscored by the inherent perils like structural failures and the presence of hazardous gases such as methane. Recognizing the u...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(M...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(MILP)are popular approaches to solving ***,with many binary unit commitment variables,LR suffers from slow convergence and MILP presents heavy computation *** proposed data-driven variable reduction approach consists of offline and online calculations to accelerate computational performance of the MILP-based large-scale TCUC problems.A database including multiple nodal net load intervals and the corresponding TCUC solutions is first built offline via the data-driven and all-scenario-feasible(ASF)approaches,which is then leveraged to efficiently solve new TCUC instances ***/off statuses of considerable units can be fixed in the online calculation according to the database,which would reduce the computation burden while guaranteeing good solution quality for new TCUC instances.A feasibility proposition is proposed to promptly check the feasibility of the new TCUC instances with fixed binary variables,which can be used to dynamically tune parameters of binary variable fixing strategies and guarantee the existence of feasible UC solutions even when system structure *** tests illustrate the efficiency of the proposed approach.
Privacy-preserving k-nearest neighbor (PPkNN) classification for multiple clouds enables categorizing queried data into a class in keeping with data privacy, where the database and key servers jointly perform cryptogr...
详细信息
This paper presents the development of improved synergetic current control for the injected current of an inverter in the grid-connected microgrid and the distributed generation system(DGS). This paper introduces new ...
详细信息
This paper presents the development of improved synergetic current control for the injected current of an inverter in the grid-connected microgrid and the distributed generation system(DGS). This paper introduces new formulas of the macro-variable functions for integral synergetic control(SC)and integral fast terminal SC, which both have an integral term to guarantee zero steady-state error. The proposed integral SC and integral fast terminal SC achieve a seamless performance such as the fast convergence, minimal overshoot, zero steady-state error, and chattering-free operation. To demonstrate the meritorious performance of the proposed scheme for injected current control, it is compared with the performance of a proportional-integral(PI) controller and advanced exponential sliding mode control(SMC). Finally, the practicality of the proposed scheme is justified by experimental results obtained through rapid control prototyping(RCP) using the dSPACESCALEXIO platform.
In this paper, a new block diagonal chaotic model (BDC) is investigated due to higher necessity of advanced secure data transmission method in wireless medium and considerable limitation on computational storage space...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user could access the personal information on the phone through the automotive head unit with minimum distraction while ***,such connectivity introduces a possibility for privacy ***,performing an in-depth analysis of the system with privacy constraints is extremely important to prevent unauthorized access to personal *** this work,we perform a systematic analysis of the Bluetooth network of an automotive infotainment unit to exploit security and privacy-related *** model the identifed threat with respect to privacy constraints of the system,emphasize the severity of attacks through a standardized rating metric and then provide potential countermeasures to prevent the *** perform System Theoretic Process Analysis for Privacy as a part of the systematic analysis and use the Common Vulnerability Scoring System to derive attack *** identifed vulnerabilities are due to design flaws and assumptions on Bluetooth protocol implementation on automotive infotainment *** then elicit the vulnerability by performing a privacy attack on the Automotive system in an actual *** use Android Open-Source Project to report our findings and propose defense strategies.
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
Assistive lower limb exoskeleton robot has been developed to help paraplegic patients walk again.A gait planning method of this robot must be able to plan a gait based on gait parameters,which can be changed during th...
详细信息
Assistive lower limb exoskeleton robot has been developed to help paraplegic patients walk again.A gait planning method of this robot must be able to plan a gait based on gait parameters,which can be changed during the stride according to human intention or walking *** gait is usually planned in cartesian space,which has shortcomings such as singularities that may occur in inverse kinematics equations,and the angular velocity of the joints cannot be entered into the ***,it is vital to have a gait planning method in the joint *** this paper,a minimum-time and minimum-jerk planner is proposed for the robot *** do so,a third-order system is defined,and the cost function is introduced to minimize the jerk of the joints throughout the *** minimum time required is calculated to keep the angular velocity trajectory within the range specified by the motor’s maximum *** conditions of the joints are determined to secure backward balance and fulfill gait ***,the proposed gait planning method is tested by its implementation on the Exoped®exoskeleton.
In the Internet of Things (IoT), optimizing machine performance through data analysis and improved connectivity is pivotal. Addressing the growing need for environmentally friendly IoT solutions, we focus on "gre...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
暂无评论