Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
AC optimal power flow (AC OPF) is a fundamental problem in power system operations. Accurately modeling the network physics via the AC power flow equations makes AC OPF a challenging nonconvex problem. To search for g...
详细信息
A numerical model of the bearing fault of a motor with a closed-slot rotor using the finite element method(FEM)is *** rotor’s radial motion can be regarded as static eccentric at the defect time points and healthy at...
详细信息
A numerical model of the bearing fault of a motor with a closed-slot rotor using the finite element method(FEM)is *** rotor’s radial motion can be regarded as static eccentric at the defect time points and healthy at other time *** frequency of the harmonic component is analyzed corresponding to bearing fault in stator current according to the radial movement of the motor ***,the relative permeability variation region is established to achieve the radial motion of the rotor with bearing ***,the relative permeability variation region is established in the health and static eccentric ***,the defect time points are estimated and the static eccentricity model by transient field is ***,the relative permeability of the variable region in the static eccentric model is imported into the variable region of the health model at the defect time *** simulation results show that the air gap flux density of the bearing fault model is different from that of the health model and static eccentric *** addition,the stator current contains harmonic components of the bearing *** analysis results prove the applicability of the proposed model.
The application of split-step parabolic equation methods for radio wave propagation across irregular terrains has gained widespread attention. However, the computational intensity of these methods limits their practic...
详细信息
Semi-supervised learning (SSL) aims to reduce reliance on labeled data. Achieving high performance often requires more complex algorithms, therefore, generic SSL algorithms are less effective when it comes to image cl...
详细信息
The development of DC custom power protection devices is still in infancy that confines the sensitive loads integrated into medium-voltage(MV) and low-voltage(LV) DC networks. Considering the DC doubly-fed induction g...
详细信息
The development of DC custom power protection devices is still in infancy that confines the sensitive loads integrated into medium-voltage(MV) and low-voltage(LV) DC networks. Considering the DC doubly-fed induction generator(DCDFIG) based wind energy conversion system(WECS), this paper proposes a dual active bridge(DAB) based DC unified power quality conditioner(DC-UPQC) with the integration of superconducting magnetic energy storage(SMES) to maintain the terminal voltage of DC-DFIG and regulate the current flow. The principle of the proposed DC-UPQC has three parts, i.e., parallel-side DAB(PDAB), series-side DAB(SDAB), and SMES,used for the voltage compensation, current and power regulation, and energy storage, respectively. The circuit principle of the PDAB and SDAB and the modeling of SMES are analyzed in this paper. A DC dual control strategy is also proposed to deal with the DC voltage oscillation generated by the AC-side asymmetrical fault. A case study of DC-DFIG interfaced with DC power grid is carried out, integrated with the proposed SMES-based DC-UPQC to verify the high-power applications of the proposed structure. Finally, an experiment is implemented, and the results demonstrate the correctness of the theoretical analysis and the feasibility of the proposed structure.
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in...
详细信息
Controlled islanding is an important approach to prevent instability in power *** this paper,a novel approach is proposed for power system separation,which consists of two steps:1)Finding multiple islanding scenarios;...
详细信息
Controlled islanding is an important approach to prevent instability in power *** this paper,a novel approach is proposed for power system separation,which consists of two steps:1)Finding multiple islanding scenarios;2)Choosing the best option to obtain the most desirable *** the first step,different islanding solutions are determined by a proposed hierarchical clustering *** this algorithm,which is based on a minimum active power flow disruption objective function,the generator coherency constraints are considered in the clustering *** the second step,the best separation scenario is chosen based on an arbitrary objective ***,in this paper,the amount of load shedding and the voltage profile deviation after separation are considered as the final criteria to select the best solution among available *** so doing,the degree of load importance is also taken into *** proposed two-step method is applied on an IEEE 9-bus test system and it is also evaluated on an IEEE 39-bus *** simulation results on the IEEE 39-bus grid and the comparative analysis with a state-of-the-art method confirm that the final islanding solution is more optimized based on the secondary criteria,which have not been addressed in the existing ***,the proposed method is computationally efficient and can be employed in real-scale power grids.
Granular segregation is widely observed in nature and *** research has focused on segregation caused by differences in the size and density of spherical ***,due to the fact that grains typically have different shapes,...
详细信息
Granular segregation is widely observed in nature and *** research has focused on segregation caused by differences in the size and density of spherical ***,due to the fact that grains typically have different shapes,the focus is shifting towards shape *** this study,experiments are conducted by mixing cubic and spherical *** results indicate that spherical grains gather at the center and cubic grains are distributed around them,and the degree of segregation is *** experiments,a structured analysis of local regions is conducted to explain the inability to form stable segregation patterns with obviously different geometric ***,through simulations,the reasons for the central and peripheral distributions are explained by comparing velocities and the number of collisions of the grains in the flow layer.
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
暂无评论