Improving the flexibility of combined heat and power(CHP)units is an important way to solve the problem of wind power accommodation in northern ***,this paper analyzes the principle of an extraction-type CHP unit,calc...
详细信息
Improving the flexibility of combined heat and power(CHP)units is an important way to solve the problem of wind power accommodation in northern ***,this paper analyzes the principle of an extraction-type CHP unit,calculates its safe operation range,and analyzes its contradiction between heating and ***,the safe operation ranges of the CHP unit with several flexibility modifications are further calculated,which involve two-stage bypass,low-pressure cylinder(LPC)removal,heat storage tank,and electric ***,based on the safe operation ranges,their effects on improving the capabilities of deep peak shaving and wind power accommodation are compared,and their adaptabilities to different wind scenarios are *** results show that:①all flexibility modifications can improve the deep peak shaving capability of the CHP unit,especially for the two-stage bypass and the electric boiler;②LPC removal modification can accommodate wind power to some extent,but most of wind power is still abandoned;③heat storage tank modification is unstable in different wind scenarios,which is determined by the surplus heating capability during the daytime.
Due to the influence of objective factors such as scene noise and hardware equipment, compared to CAD modeling point clouds, the real point clouds collected by LiDAR often have strong non-uniformity and irregularity, ...
详细信息
Leakage accidents in natural gas pipelines bring huge property losses and pose serious safety risks. Therefore, faster and more accurate leakage localization is of great significance. In this paper, a new method based...
详细信息
In response to the security threats faced by multi-area interconnected power systems, particularly various potential attacks, a security protection scheme based on an extended state observer is proposed. The proposed ...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
In response to the security threats faced by multi-area interconnected power systems, particularly various potential attacks, a security protection scheme based on an extended state observer is proposed. The proposed approach extends the state vector by introducing new variables, allowing disturbances and attacks to be treated as additional state variables within the system. Through the utilization of the extended state observer, separate estimations of interference and external attacks can be obtained, thereby enhancing the power system resilience against potential threats. Based on this, a threshold-based attack detection algorithm is proposed. In simulation experiments, the model of the multi-area interconnected power system is studied under various attacks such as step attacks, ramp attacks, and periodic attacks using active disturbance rejection control(ADRC).Based on the performance comparison between traditional PI control and ADRC, it has been demonstrated that the ADRC method exhibits significant advantages in improving system response speed and enhancing control accuracy.
To Address the challenges of unclear entity delineations and insufficient utilization of Semantic data, This study introduces a novel fusion approach leveraging multiple features for dynamic integration. To enrich the...
详细信息
Generating novel molecules to satisfy specific properties is a challenging task in modern drug discovery,which requires the optimization of a specific objective based on satisfying chemical ***,we aim to optimize the ...
详细信息
Generating novel molecules to satisfy specific properties is a challenging task in modern drug discovery,which requires the optimization of a specific objective based on satisfying chemical ***,we aim to optimize the properties of a specific molecule to satisfy the specific properties of the generated *** Matched Molecular Pairs(MMPs),which contain the source and target molecules,are used herein,and logD and solubility are selected as the optimization *** main innovative work lies in the calculation related to a specific transformer from the perspective of a matrix *** intervals and state changes are then used to encode logD and solubility for subsequent *** the experiments,we screen the data based on the proportion of heavy atoms to all atoms in the groups and select 12365,1503,and 1570 MMPs as the training,validation,and test sets,*** models are compared with the baseline models with respect to their abilities to generate molecules with specific *** show that the transformer model can accurately optimize the source molecules to satisfy specific properties.
Intelligent Space(IS)is widely regarded as a promising paradigm for improving quality of life through using service task *** the field matures,various state-of-the-art IS architectures have been *** of the IS architec...
详细信息
Intelligent Space(IS)is widely regarded as a promising paradigm for improving quality of life through using service task *** the field matures,various state-of-the-art IS architectures have been *** of the IS architectures designed for service robots face the problems of fixedfunction modules and low scalability when performing service *** this end,we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture(SOA).Specifically,we first use the distributed deployment of functional modules to solve the problem of high computing resource ***,the Socket communication interface layer is designed to improve the calling efficiency of the function ***,the private cloud service knowledge base and the dataset for the home environment are used to improve the robustness and success rate of the robot when performing ***,we design and deploy an interactive system based on Browser/Server(B/S)architecture,which aims to display the status of the robot in real-time as well as to expand and call the robot *** system is integrated into the private cloud framework,which provides a feasible solution for improving the quality of ***,it also fully reveals how to actively discover and provide the robot service mechanism of service tasks in the right *** results of extensive experiments show that our cloud system provides sufficient prior knowledge that can assist the robot in completing service *** is an efficient way to transmit data and reduce the computational burden on the *** using our cloud detection module,the robot system can save approximately 25% of the averageCPUusage and reduce the average detection time by 0.1 s compared to the locally deployed system,demonstrating the reliability and practicality of our proposed architecture.
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was s...
详细信息
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was successfully applied against all SSCs in 2017 by Hamann et al. They suggested using not only key bits but also initial value (IV) bits continuously in the keystream generation phase to strengthen SSCs against TMDTO attacks. Then, Hamann and Krause proposed a construction based on using only IV bits continuously in the packet mode. They suggested an instantiation of an SSC and claimed that it is resistant to TMDTO attacks. We point out that accessing IV bits imposes an overhead on cryptosystems that might be unacceptable in some applications. More importantly, we show that the proposed SSC remains vulnerable to TMDTO attacks 1. To resolve this security threat, the current paper proposes constructions based on storing key or IV bits that are the first to provide full security against TMDTO attacks. Five constructions are proposed for different applications by considering efficiency. Designers can obtain each construction’s minimum volatile state length according to the desirable keystream, key and IV lengths.
In recent article Zhang, et al. 2023, the authors presented an efficient and verifiable multi-keyword attribute-based search scheme over cloud data. In this comment, we show that the key equation design in their schem...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelatedd...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelateddata in the face-to-face physical teaching environment is usually sparsity,and the sample size is *** makes building models to predict students’performance accurately in such an environment even *** paper proposes a Two-WayNeuralNetwork(TWNN)model based on the bidirectional recurrentneural network and graph neural network to predict students’next semester’s course performance using only theirprevious course *** experiments on a real dataset show that our model performs better thanthe baselines in many indicators.
暂无评论