The component aging has become a significant concern worldwide,and the frequent failures pose a serious threat to the reliability of modern power *** light of this issue,this paper presents a power system reliability ...
详细信息
The component aging has become a significant concern worldwide,and the frequent failures pose a serious threat to the reliability of modern power *** light of this issue,this paper presents a power system reliability evaluation method based on sequential Monte Carlo simulation(SMCS)to quantify system reliability considering multiple failure modes of ***,a three-state component reliability model is established to explicitly describe the state transition process of the component subject to both aging failure and random failure *** this model,the impact of each failure mode is decoupled and characterized as the combination of two state duration variables,which are separately modeled using specific probability ***,SMCS is used to integrate the three-state component reliability model for state transition sequence generation and system reliability ***,various reliability metrics,including the probability of load curtailment(PLC),expected frequency of load curtailment(EFLC),and expected energy not supplied(EENS),can be *** ensure the applicability of the proposed method,Hash table grouping and the maximum feasible load level judgment techniques are jointly adopted to enhance its computational *** studies are conducted on different aging scenarios to illustrate and validate the effectiveness and practicality of the proposed method.
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
In this article the legend of Fig. 6 was presented without a reference. The legend of Fig. 6 has been changed from "The general framework for knowledge distillation involving a teacher-student relationship&q...
Electroencephalogram (EEG) reveals the brain dynamics that are of a great value in clinical applications, e.g., epilepsy diagnosis, cognitive status, and other disorders. Intracranial Electroencephalogram (iEEG) is en...
详细信息
In modern power systems, renewable energy (RE) sources are increasingly integrated to reduce reliance on fossil-fuel-based generation. However, the uncertainties and lack of rotational inertia associated with renewabl...
详细信息
The variability of the output power of distributed renewable energy sources(DRESs)that originate from the fastchanging climatic conditions can negatively affect the grid ***,grid operators have incorporated ramp-rate ...
详细信息
The variability of the output power of distributed renewable energy sources(DRESs)that originate from the fastchanging climatic conditions can negatively affect the grid ***,grid operators have incorporated ramp-rate limitations(RRLs)for the injected DRES power in the grid *** the DRES penetration levels increase,the mitigation of high-power ramps is no longer considered as a system support function but rather an ancillary service(AS).Energy storage systems(ESSs)coordinated by RR control algorithms are often applied to mitigate these power ***,no unified definition of active power ramps,which is essential to treat the RRL as AS,currently *** paper assesses the various definitions for ramp-rate RR and proposes RRL method control for a central battery ESS(BESS)in distribution systems(DSs).The ultimate objective is to restrain high-power ramps at the distribution transformer level so that RRL can be traded as AS to the upstream transmission system(TS).The proposed control is based on the direct control of theΔP/Δt,which means that the control parameters are directly correlated with the RR requirements included in the grid *** addition,a novel method for restoring the state of charge(So C)within a specific range following a high ramp-up/down event is ***,a parametric method for estimating the sizing of central BESSs(BESS sizing for short)is *** BESS sizing is determined by considering the RR requirements,the DRES units,and the load mix of the examined *** BESS sizing is directly related to the constant RR achieved using the proposed ***,the proposed methodologies are validated through simulations in MATLAB/Simulink and laboratory tests in a commercially available BESS.
Load Forecast (LF) is an important task in the planning, control and application of public power systems. Accurate Short Term Load Forecast (STLF) is the premise of safe and economical operation of a power system. In ...
详细信息
The application of split-step parabolic equation methods for radio wave propagation across irregular terrains has gained widespread attention. However, the computational intensity of these methods limits their practic...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
When I started working on analog computing for neural network systems in the 1980s, the question everyone feared to be asked at the end of their presentation was "couldn't this be done on a DSP processor?&quo...
详细信息
暂无评论