The fingerprinting-based approach using the wireless local area network(WLAN)is widely used for indoor localization.However,the construction of the fingerprint database is quite time-consuming.Especially when the posi...The fingerprinting-based approach using the wireless local area network(WLAN)is widely used for indoor localization.However,the construction of the fingerprint database is quite time-consuming.Especially when the position of the access point(AP)or wall changes,updating the fingerprint database in real-time is difficult.An appropriate indoor localization approach,which has a low implementation cost,excellent real-time performance,and high localization accuracy and fully considers complex indoor environment factors,is preferred in location-based services(LBSs)applications.In this paper,we proposed a fine-grained grid computing(FGGC)model to achieve decimeter-level localization accuracy.Reference points(RPs)are generated in the grid by the FGGC model.Then,the received signal strength(RSS)values at each RP are calculated with the attenuation factors,such as the frequency band,three-dimensional propagation distance,and walls in complex environments.As a result,the fingerprint database can be established automatically without manual measurement,and the efficiency and cost that the FGGC model takes for the fingerprint database are superior to previous methods.The proposed indoor localization approach,which estimates the position step by step from the approximate grid location to the fine-grained location,can achieve higher real-time performance and localization accuracy simultaneously.The mean error of the proposed model is 0.36 m,far lower than that of previous approaches.Thus,the proposed model is feasible to improve the efficiency and accuracy of Wi-Fi indoor localization.It also shows high-accuracy performance with a fast running speed even under a large-size grid.The results indicate that the proposed method can also be suitable for precise marketing,indoor navigation,and emergency rescue.展开更多
Powered by advanced information technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).In this context,computational experiments method has emerged as a nove...Powered by advanced information technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).In this context,computational experiments method has emerged as a novel approach for the design,analysis,management,control,and integration of CPSS,which can realize the causal analysis of complex systems by means of“algorithmization”of“counterfactuals”.However,because CPSS involve human and social factors(e.g.,autonomy,initiative,and sociality),it is difficult for traditional design of experiment(DOE)methods to achieve the generative explanation of system emergence.To address this challenge,this paper proposes an integrated approach to the design of computational experiments,incorporating three key modules:1)Descriptive module:Determining the influencing factors and response variables of the system by means of the modeling of an artificial society;2)Interpretative module:Selecting factorial experimental design solution to identify the relationship between influencing factors and macro phenomena;3)Predictive module:Building a meta-model that is equivalent to artificial society to explore its operating laws.Finally,a case study of crowd-sourcing platforms is presented to illustrate the application process and effectiveness of the proposed approach,which can reveal the social impact of algorithmic behavior on“rider race”.展开更多
The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Th...The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Therefore,this paper assesses the performance of a 51 kW PV solar power plant connected to a low-voltage grid to feed an administrative building in the 6th of October City,Egypt.The performance analysis of the considered grid-connected PV system is carried out using power system simulator for Engineering(PSS/E)software.Where the PSS/E program,monitors and uses the power analyzer that displays the parameters and measures some parameters such as current,voltage,total power,power factor,frequency,and current and voltage harmonics,the used inverter from the type of grid inverter for the considered system.The results conclude that when the maximum solar radiation is reached,the maximum current can be obtained from the solar panels,thus obtaining the maximum power and power factor.Decreasing total voltage harmonic distortion,a current harmonic distortion within permissible limits using active harmonic distortion because this type is fast in processing up to 300 microseconds.The connection between solar stations and the national grid makes the system more efficient.展开更多
This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara ci...This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara city was divided into 85 indexes based on 1 × 1 km<sup>2</sup> grid mapping system. The diversity and density of species in the indexes are determined. The influence of anthropogenic factors on the diversity of species in the indexes is determined.展开更多
Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the hig...Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%.展开更多
If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-...If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-dimensional tracer transport model that is computationally stable at large time-step sizes. The tracer model employs a finite-volume flux-form semiLagrangian transport scheme in the horizontal and an adaptively implicit algorithm in the vertical. The horizontal and vertical solvers are coupled via a straightforward operator-splitting technique. Both the finite-volume scheme's onedimensional slope-limiter and the adaptively implicit vertical solver's first-order upwind scheme enforce monotonicity. The tracer model permits a large time-step size and is inherently conservative and monotonic. Idealized advection test cases demonstrate that the three-dimensional transport model performs very well in terms of accuracy, stability, and efficiency. It is possible to use this robust transport model in a global atmospheric dynamical core.展开更多
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and int...With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.展开更多
Global gridded crop models(GGCMs) have been broadly applied to assess the impacts of climate and environmental change and adaptation on agricultural production. China is a major grain producing country, but thus far o...Global gridded crop models(GGCMs) have been broadly applied to assess the impacts of climate and environmental change and adaptation on agricultural production. China is a major grain producing country, but thus far only a few studies have assessed the performance of GGCMs in China, and these studies mainly focused on the average and interannual variability of national and regional yields. Here, a systematic national-and provincial-scale evaluation of the simulations by13 GGCMs [12 from the GGCM Intercomparison(GGCMI) project, phase 1, and CLM5-crop] of the yields of four crops(wheat, maize, rice, and soybean) in China during 1980–2009 was carried out through comparison with crop yield statistics collected from the National Bureau of Statistics of China. Results showed that GGCMI models generally underestimate the national yield of rice but overestimate it for the other three crops, while CLM5-crop can reproduce the national yields of wheat, maize, and rice well. Most GGCMs struggle to simulate the spatial patterns of crop yields. In terms of temporal variability, GGCMI models generally fail to capture the observed significant increases, but some can skillfully simulate the interannual variability. Conversely, CLM5-crop can represent the increases in wheat, maize, and rice, but works less well in simulating the interannual variability. At least one model can skillfully reproduce the temporal variability of yields in the top-10 producing provinces in China, albeit with a few exceptions. This study, for the first time, provides a complete picture of GGCM performance in China, which is important for GGCM development and understanding the reliability and uncertainty of national-and provincial-scale crop yield prediction in China.展开更多
Acoustic emission(AE)source localization is a fundamental element of rock fracture damage imaging.To improve the efficiency and accuracy of AE source localization,this paper proposes a joint method comprising a three-...Acoustic emission(AE)source localization is a fundamental element of rock fracture damage imaging.To improve the efficiency and accuracy of AE source localization,this paper proposes a joint method comprising a three-dimensional(3D)AE source localization simplex method and grid search scanning.Using the concept of the geometry of simplexes,tetrahedral iterations were first conducted to narrow down the suspected source region.This is followed by a process of meshing the region and node searching to scan for optimal solutions,until the source location is determined.The resulting algorithm was tested using the artificial excitation source localization and uniaxial compression tests,after which the localization results were compared with the simplex and exhaustive methods.The results revealed that the localization obtained using the proposed method is more stable and can be effectively avoided compared with the simplex localization method.Furthermore,compared with the global scanning method,the proposed method is more efficient,with an average time of 10%–20%of the global scanning localization algorithm.Thus,the proposed algorithm is of great significance for laboratory research focused on locating rupture damages sustained by large-sized rock masses or test blocks.展开更多
False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work u...False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams.Data-driven features,however,cannot effectively capture the differences between noisy data and attack samples.As a result,slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks.To address this problem,this paper designs a deep collaborative self-attention network to achieve robust FDIA detection,in which the spatio-temporal features of cascaded FDIA attacks are fully integrated.Firstly,a high-order Chebyshev polynomials-based graph convolution module is designed to effectively aggregate the spatio information between grid nodes,and the spatial self-attention mechanism is involved to dynamically assign attention weights to each node,which guides the network to pay more attention to the node information that is conducive to FDIA detection.Furthermore,the bi-directional Long Short-Term Memory(LSTM)network is introduced to conduct time series modeling and long-term dependence analysis for power grid data and utilizes the temporal selfattention mechanism to describe the time correlation of data and assign different weights to different time steps.Our designed deep collaborative network can effectively mine subtle perturbations from spatiotemporal feature information,efficiently distinguish power grid noise from FDIA attacks,and adapt to diverse attack intensities.Extensive experiments demonstrate that our method can obtain an efficient detection performance over actual load data from New York Independent System Operator(NYISO)in IEEE 14,IEEE 39,and IEEE 118 bus systems,and outperforms state-of-the-art FDIA detection schemes in terms of detection accuracy and robustness.展开更多
Photocatalysis,a critical strategy for harvesting sunlight to address energy demand and environmental concerns,is underpinned by the discovery of high-performance photocatalysts,thereby how to design photocatalysts is...Photocatalysis,a critical strategy for harvesting sunlight to address energy demand and environmental concerns,is underpinned by the discovery of high-performance photocatalysts,thereby how to design photocatalysts is now generating widespread interest in boosting the conversion effi-ciency of solar energy.In the past decade,computational technologies and theoretical simulations have led to a major leap in the development of high-throughput computational screening strategies for novel high-efficiency photocatalysts.In this viewpoint,we started with introducing the challenges of photocatalysis from the view of experimental practice,especially the inefficiency of the traditional“trial and error”method.Sub-sequently,a cross-sectional comparison between experimental and high-throughput computational screening for photocatalysis is presented and discussed in detail.On the basis of the current experimental progress in photocatalysis,we also exemplified the various challenges associated with high-throughput computational screening strategies.Finally,we offered a preferred high-throughput computational screening procedure for pho-tocatalysts from an experimental practice perspective(model construction and screening,standardized experiments,assessment and revision),with the aim of a better correlation of high-throughput simulations and experimental practices,motivating to search for better descriptors.展开更多
Aptamers are a type of single-chain oligonucleotide that can combine with a specific target.Due to their simple preparation,easy modification,stable structure and reusability,aptamers have been widely applied as bioch...Aptamers are a type of single-chain oligonucleotide that can combine with a specific target.Due to their simple preparation,easy modification,stable structure and reusability,aptamers have been widely applied as biochemical sensors for medicine,food safety and environmental monitoring.However,there is little research on aptamer-target binding mechanisms,which limits their application and development.Computational simulation has gained much attention for revealing aptamer-target binding mechanisms at the atomic level.This work summarizes the main simulation methods used in the mechanistic analysis of aptamer-target complexes,the characteristics of binding between aptamers and different targets(metal ions,small organic molecules,biomacromolecules,cells,bacteria and viruses),the types of aptamer-target interactions and the factors influencing their strength.It provides a reference for further use of simulations in understanding aptamer-target binding mechanisms.展开更多
The power grid is undergoing a transformation from synchronous generators(SGs) toward inverter-based resources(IBRs). The stochasticity, asynchronicity, and limited-inertia characteristics of IBRs bring about challeng...The power grid is undergoing a transformation from synchronous generators(SGs) toward inverter-based resources(IBRs). The stochasticity, asynchronicity, and limited-inertia characteristics of IBRs bring about challenges to grid resilience. Virtual power plants(VPPs) are emerging technologies to improve the grid resilience and advance the transformation. By judiciously aggregating geographically distributed energy resources(DERs) as individual electrical entities, VPPs can provide capacity and ancillary services to grid operations and participate in electricity wholesale markets. This paper aims to provide a concise overview of the concept and development of VPPs and the latest progresses in VPP operation, with the focus on VPP scheduling and control. Based on this overview, we identify a few potential challenges in VPP operation and discuss the opportunities of integrating the multi-agent system(MAS)-based strategy into the VPP operation to enhance its scalability, performance and resilience.展开更多
Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sour...Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sources,the detector response can reflect various types of information of the medium.The Monte Carlo method is one of the primary methods used to obtain nuclear detection responses in complex environments.However,this requires a computational process with extensive random sampling,consumes considerable resources,and does not provide real-time response results.Therefore,a novel fast forward computational method(FFCM)for nuclear measurement that uses volumetric detection constraints to rapidly calculate the detector response in various complex environments is proposed.First,the data library required for the FFCM is built by collecting the detection volume,detector counts,and flux sensitivity functions through a Monte Carlo simulation.Then,based on perturbation theory and the Rytov approximation,a model for the detector response is derived using the flux sensitivity function method and a one-group diffusion model.The environmental perturbation is constrained to optimize the model according to the tool structure and the impact of the formation and borehole within the effective detection volume.Finally,the method is applied to a neutron porosity tool for verification.In various complex simulation environments,the maximum relative error between the calculated porosity results of Monte Carlo and FFCM was 6.80%,with a rootmean-square error of 0.62 p.u.In field well applications,the formation porosity model obtained using FFCM was in good agreement with the model obtained by interpreters,which demonstrates the validity and accuracy of the proposed method.展开更多
Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical a...Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs.展开更多
When a line failure occurs in a power grid, a load transfer is implemented to reconfigure the network by changingthe states of tie-switches and load demands. Computation speed is one of the major performance indicator...When a line failure occurs in a power grid, a load transfer is implemented to reconfigure the network by changingthe states of tie-switches and load demands. Computation speed is one of the major performance indicators inpower grid load transfer, as a fast load transfer model can greatly reduce the economic loss of post-fault powergrids. In this study, a reinforcement learning method is developed based on a deep deterministic policy gradient.The tedious training process of the reinforcement learning model can be conducted offline, so the model showssatisfactory performance in real-time operation, indicating that it is suitable for fast load transfer. Consideringthat the reinforcement learning model performs poorly in satisfying safety constraints, a safe action-correctionframework is proposed to modify the learning model. In the framework, the action of load shedding is correctedaccording to sensitivity analysis results under a small discrete increment so as to match the constraints of line flowlimits. The results of case studies indicate that the proposed method is practical for fast and safe power grid loadtransfer.展开更多
Chinese named entity recognition(CNER)has received widespread attention as an important task of Chinese information extraction.Most previous research has focused on individually studying flat CNER,overlapped CNER,or d...Chinese named entity recognition(CNER)has received widespread attention as an important task of Chinese information extraction.Most previous research has focused on individually studying flat CNER,overlapped CNER,or discontinuous CNER.However,a unified CNER is often needed in real-world scenarios.Recent studies have shown that grid tagging-based methods based on character-pair relationship classification hold great potential for achieving unified NER.Nevertheless,how to enrich Chinese character-pair grid representations and capture deeper dependencies between character pairs to improve entity recognition performance remains an unresolved challenge.In this study,we enhance the character-pair grid representation by incorporating both local and global information.Significantly,we introduce a new approach by considering the character-pair grid representation matrix as a specialized image,converting the classification of character-pair relationships into a pixel-level semantic segmentation task.We devise a U-shaped network to extract multi-scale and deeper semantic information from the grid image,allowing for a more comprehensive understanding of associative features between character pairs.This approach leads to improved accuracy in predicting their relationships,ultimately enhancing entity recognition performance.We conducted experiments on two public CNER datasets in the biomedical domain,namely CMeEE-V2 and Diakg.The results demonstrate the effectiveness of our approach,which achieves F1-score improvements of 7.29 percentage points and 1.64 percentage points compared to the current state-of-the-art(SOTA)models,respectively.展开更多
In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open...In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.展开更多
This study developed a numerical model to efficiently treat solid waste magnesium nitrate hydrate through multi-step chemical reactions.The model simulates two-phase flow,heat,and mass transfer processes in a pyrolysi...This study developed a numerical model to efficiently treat solid waste magnesium nitrate hydrate through multi-step chemical reactions.The model simulates two-phase flow,heat,and mass transfer processes in a pyrolysis furnace to improve the decomposition rate of magnesium nitrate.The performance of multi-nozzle and single-nozzle injection methods was evaluated,and the effects of primary and secondary nozzle flow ratios,velocity ratios,and secondary nozzle inclination angles on the decomposition rate were investigated.Results indicate that multi-nozzle injection has a higher conversion efficiency and decomposition rate than single-nozzle injection,with a 10.3%higher conversion rate under the design parameters.The decomposition rate is primarily dependent on the average residence time of particles,which can be increased by decreasing flow rate and velocity ratios and increasing the inclination angle of secondary nozzles.The optimal parameters are injection flow ratio of 40%,injection velocity ratio of 0.6,and secondary nozzle inclination of 30°,corresponding to a maximum decomposition rate of 99.33%.展开更多
基金the Open Project of Sichuan Provincial Key Laboratory of Philosophy and Social Science for Language Intelligence in Special Education under Grant No.YYZN-2023-4the Ph.D.Fund of Chengdu Technological University under Grant No.2020RC002.
文摘The fingerprinting-based approach using the wireless local area network(WLAN)is widely used for indoor localization.However,the construction of the fingerprint database is quite time-consuming.Especially when the position of the access point(AP)or wall changes,updating the fingerprint database in real-time is difficult.An appropriate indoor localization approach,which has a low implementation cost,excellent real-time performance,and high localization accuracy and fully considers complex indoor environment factors,is preferred in location-based services(LBSs)applications.In this paper,we proposed a fine-grained grid computing(FGGC)model to achieve decimeter-level localization accuracy.Reference points(RPs)are generated in the grid by the FGGC model.Then,the received signal strength(RSS)values at each RP are calculated with the attenuation factors,such as the frequency band,three-dimensional propagation distance,and walls in complex environments.As a result,the fingerprint database can be established automatically without manual measurement,and the efficiency and cost that the FGGC model takes for the fingerprint database are superior to previous methods.The proposed indoor localization approach,which estimates the position step by step from the approximate grid location to the fine-grained location,can achieve higher real-time performance and localization accuracy simultaneously.The mean error of the proposed model is 0.36 m,far lower than that of previous approaches.Thus,the proposed model is feasible to improve the efficiency and accuracy of Wi-Fi indoor localization.It also shows high-accuracy performance with a fast running speed even under a large-size grid.The results indicate that the proposed method can also be suitable for precise marketing,indoor navigation,and emergency rescue.
基金the National Key Research and Development Program of China(2021YFF0900800)the National Natural Science Foundation of China(61972276,62206116,62032016)+2 种基金the New Liberal Arts Reform and Practice Project of National Ministry of Education(2021170002)the Open Research Fund of the State Key Laboratory for Management and Control of Complex Systems(20210101)Tianjin University Talent Innovation Reward Program for Literature and Science Graduate Student(C1-2022-010)。
文摘Powered by advanced information technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).In this context,computational experiments method has emerged as a novel approach for the design,analysis,management,control,and integration of CPSS,which can realize the causal analysis of complex systems by means of“algorithmization”of“counterfactuals”.However,because CPSS involve human and social factors(e.g.,autonomy,initiative,and sociality),it is difficult for traditional design of experiment(DOE)methods to achieve the generative explanation of system emergence.To address this challenge,this paper proposes an integrated approach to the design of computational experiments,incorporating three key modules:1)Descriptive module:Determining the influencing factors and response variables of the system by means of the modeling of an artificial society;2)Interpretative module:Selecting factorial experimental design solution to identify the relationship between influencing factors and macro phenomena;3)Predictive module:Building a meta-model that is equivalent to artificial society to explore its operating laws.Finally,a case study of crowd-sourcing platforms is presented to illustrate the application process and effectiveness of the proposed approach,which can reveal the social impact of algorithmic behavior on“rider race”.
文摘The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Therefore,this paper assesses the performance of a 51 kW PV solar power plant connected to a low-voltage grid to feed an administrative building in the 6th of October City,Egypt.The performance analysis of the considered grid-connected PV system is carried out using power system simulator for Engineering(PSS/E)software.Where the PSS/E program,monitors and uses the power analyzer that displays the parameters and measures some parameters such as current,voltage,total power,power factor,frequency,and current and voltage harmonics,the used inverter from the type of grid inverter for the considered system.The results conclude that when the maximum solar radiation is reached,the maximum current can be obtained from the solar panels,thus obtaining the maximum power and power factor.Decreasing total voltage harmonic distortion,a current harmonic distortion within permissible limits using active harmonic distortion because this type is fast in processing up to 300 microseconds.The connection between solar stations and the national grid makes the system more efficient.
文摘This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara city was divided into 85 indexes based on 1 × 1 km<sup>2</sup> grid mapping system. The diversity and density of species in the indexes are determined. The influence of anthropogenic factors on the diversity of species in the indexes is determined.
基金a grant from the Center of Excellence in Information Assurance(CoEIA),KSU.
文摘Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%.
基金jointly supported by the National Natural Science Foundation of China (Grant No.42075153)the Young Scientists Fund of the Earth System Modeling and Prediction Centre (Grant No. CEMC-QNJJ-2022014)。
文摘If an explicit time scheme is used in a numerical model, the size of the integration time step is typically limited by the spatial resolution. This study develops a regular latitude–longitude grid-based global three-dimensional tracer transport model that is computationally stable at large time-step sizes. The tracer model employs a finite-volume flux-form semiLagrangian transport scheme in the horizontal and an adaptively implicit algorithm in the vertical. The horizontal and vertical solvers are coupled via a straightforward operator-splitting technique. Both the finite-volume scheme's onedimensional slope-limiter and the adaptively implicit vertical solver's first-order upwind scheme enforce monotonicity. The tracer model permits a large time-step size and is inherently conservative and monotonic. Idealized advection test cases demonstrate that the three-dimensional transport model performs very well in terms of accuracy, stability, and efficiency. It is possible to use this robust transport model in a global atmospheric dynamical core.
基金This work was supported by Natural Science Foundation of China(Nos.62303126,62362008,62066006,authors Zhenyong Zhang and Bin Hu,https://www.nsfc.gov.cn/,accessed on 25 July 2024)Guizhou Provincial Science and Technology Projects(No.ZK[2022]149,author Zhenyong Zhang,https://kjt.guizhou.gov.cn/,accessed on 25 July 2024)+1 种基金Guizhou Provincial Research Project(Youth)forUniversities(No.[2022]104,author Zhenyong Zhang,https://jyt.guizhou.gov.cn/,accessed on 25 July 2024)GZU Cultivation Project of NSFC(No.[2020]80,author Zhenyong Zhang,https://www.gzu.edu.cn/,accessed on 25 July 2024).
文摘With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.
基金co-supported by the Guangdong Major Project of Basic and Applied Basic Research (Grant No. 2021B0301030007)the National Key Research and Development Program of China (Grant Nos. 2017YFA0604302 and 2017YFA0604804)+1 种基金the National Natural Science Foundation of China (Grant No. 41875137)the National Key Scientific and Technological Infrastructure project “Earth System Science Numerical Simulator Facility” (Earth Lab)。
文摘Global gridded crop models(GGCMs) have been broadly applied to assess the impacts of climate and environmental change and adaptation on agricultural production. China is a major grain producing country, but thus far only a few studies have assessed the performance of GGCMs in China, and these studies mainly focused on the average and interannual variability of national and regional yields. Here, a systematic national-and provincial-scale evaluation of the simulations by13 GGCMs [12 from the GGCM Intercomparison(GGCMI) project, phase 1, and CLM5-crop] of the yields of four crops(wheat, maize, rice, and soybean) in China during 1980–2009 was carried out through comparison with crop yield statistics collected from the National Bureau of Statistics of China. Results showed that GGCMI models generally underestimate the national yield of rice but overestimate it for the other three crops, while CLM5-crop can reproduce the national yields of wheat, maize, and rice well. Most GGCMs struggle to simulate the spatial patterns of crop yields. In terms of temporal variability, GGCMI models generally fail to capture the observed significant increases, but some can skillfully simulate the interannual variability. Conversely, CLM5-crop can represent the increases in wheat, maize, and rice, but works less well in simulating the interannual variability. At least one model can skillfully reproduce the temporal variability of yields in the top-10 producing provinces in China, albeit with a few exceptions. This study, for the first time, provides a complete picture of GGCM performance in China, which is important for GGCM development and understanding the reliability and uncertainty of national-and provincial-scale crop yield prediction in China.
基金supported by the Natural Science Foundation of Henan Province(No.222300420596)China Railway Science and Technology Innovation Program Funded Project(CZ02-Special-03)Science and Technology Innovation Project funded by China Railway Tunnel Group(Tunnel Research 2021-03)。
文摘Acoustic emission(AE)source localization is a fundamental element of rock fracture damage imaging.To improve the efficiency and accuracy of AE source localization,this paper proposes a joint method comprising a three-dimensional(3D)AE source localization simplex method and grid search scanning.Using the concept of the geometry of simplexes,tetrahedral iterations were first conducted to narrow down the suspected source region.This is followed by a process of meshing the region and node searching to scan for optimal solutions,until the source location is determined.The resulting algorithm was tested using the artificial excitation source localization and uniaxial compression tests,after which the localization results were compared with the simplex and exhaustive methods.The results revealed that the localization obtained using the proposed method is more stable and can be effectively avoided compared with the simplex localization method.Furthermore,compared with the global scanning method,the proposed method is more efficient,with an average time of 10%–20%of the global scanning localization algorithm.Thus,the proposed algorithm is of great significance for laboratory research focused on locating rupture damages sustained by large-sized rock masses or test blocks.
基金supported in part by the Research Fund of Guangxi Key Lab of Multi-Source Information Mining&Security(MIMS21-M-02).
文摘False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams.Data-driven features,however,cannot effectively capture the differences between noisy data and attack samples.As a result,slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks.To address this problem,this paper designs a deep collaborative self-attention network to achieve robust FDIA detection,in which the spatio-temporal features of cascaded FDIA attacks are fully integrated.Firstly,a high-order Chebyshev polynomials-based graph convolution module is designed to effectively aggregate the spatio information between grid nodes,and the spatial self-attention mechanism is involved to dynamically assign attention weights to each node,which guides the network to pay more attention to the node information that is conducive to FDIA detection.Furthermore,the bi-directional Long Short-Term Memory(LSTM)network is introduced to conduct time series modeling and long-term dependence analysis for power grid data and utilizes the temporal selfattention mechanism to describe the time correlation of data and assign different weights to different time steps.Our designed deep collaborative network can effectively mine subtle perturbations from spatiotemporal feature information,efficiently distinguish power grid noise from FDIA attacks,and adapt to diverse attack intensities.Extensive experiments demonstrate that our method can obtain an efficient detection performance over actual load data from New York Independent System Operator(NYISO)in IEEE 14,IEEE 39,and IEEE 118 bus systems,and outperforms state-of-the-art FDIA detection schemes in terms of detection accuracy and robustness.
基金The authors are grateful for financial support from the National Key Projects for Fundamental Research and Development of China(2021YFA1500803)the National Natural Science Foundation of China(51825205,52120105002,22102202,22088102,U22A20391)+1 种基金the DNL Cooperation Fund,CAS(DNL202016)the CAS Project for Young Scientists in Basic Research(YSBR-004).
文摘Photocatalysis,a critical strategy for harvesting sunlight to address energy demand and environmental concerns,is underpinned by the discovery of high-performance photocatalysts,thereby how to design photocatalysts is now generating widespread interest in boosting the conversion effi-ciency of solar energy.In the past decade,computational technologies and theoretical simulations have led to a major leap in the development of high-throughput computational screening strategies for novel high-efficiency photocatalysts.In this viewpoint,we started with introducing the challenges of photocatalysis from the view of experimental practice,especially the inefficiency of the traditional“trial and error”method.Sub-sequently,a cross-sectional comparison between experimental and high-throughput computational screening for photocatalysis is presented and discussed in detail.On the basis of the current experimental progress in photocatalysis,we also exemplified the various challenges associated with high-throughput computational screening strategies.Finally,we offered a preferred high-throughput computational screening procedure for pho-tocatalysts from an experimental practice perspective(model construction and screening,standardized experiments,assessment and revision),with the aim of a better correlation of high-throughput simulations and experimental practices,motivating to search for better descriptors.
文摘Aptamers are a type of single-chain oligonucleotide that can combine with a specific target.Due to their simple preparation,easy modification,stable structure and reusability,aptamers have been widely applied as biochemical sensors for medicine,food safety and environmental monitoring.However,there is little research on aptamer-target binding mechanisms,which limits their application and development.Computational simulation has gained much attention for revealing aptamer-target binding mechanisms at the atomic level.This work summarizes the main simulation methods used in the mechanistic analysis of aptamer-target complexes,the characteristics of binding between aptamers and different targets(metal ions,small organic molecules,biomacromolecules,cells,bacteria and viruses),the types of aptamer-target interactions and the factors influencing their strength.It provides a reference for further use of simulations in understanding aptamer-target binding mechanisms.
基金Department of Navy Awards N00014-22-1-2001 and N00014-23-1-2124 issued by the Office of Naval Research。
文摘The power grid is undergoing a transformation from synchronous generators(SGs) toward inverter-based resources(IBRs). The stochasticity, asynchronicity, and limited-inertia characteristics of IBRs bring about challenges to grid resilience. Virtual power plants(VPPs) are emerging technologies to improve the grid resilience and advance the transformation. By judiciously aggregating geographically distributed energy resources(DERs) as individual electrical entities, VPPs can provide capacity and ancillary services to grid operations and participate in electricity wholesale markets. This paper aims to provide a concise overview of the concept and development of VPPs and the latest progresses in VPP operation, with the focus on VPP scheduling and control. Based on this overview, we identify a few potential challenges in VPP operation and discuss the opportunities of integrating the multi-agent system(MAS)-based strategy into the VPP operation to enhance its scalability, performance and resilience.
基金This work is supported by National Natural Science Foundation of China(Nos.U23B20151 and 52171253).
文摘Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sources,the detector response can reflect various types of information of the medium.The Monte Carlo method is one of the primary methods used to obtain nuclear detection responses in complex environments.However,this requires a computational process with extensive random sampling,consumes considerable resources,and does not provide real-time response results.Therefore,a novel fast forward computational method(FFCM)for nuclear measurement that uses volumetric detection constraints to rapidly calculate the detector response in various complex environments is proposed.First,the data library required for the FFCM is built by collecting the detection volume,detector counts,and flux sensitivity functions through a Monte Carlo simulation.Then,based on perturbation theory and the Rytov approximation,a model for the detector response is derived using the flux sensitivity function method and a one-group diffusion model.The environmental perturbation is constrained to optimize the model according to the tool structure and the impact of the formation and borehole within the effective detection volume.Finally,the method is applied to a neutron porosity tool for verification.In various complex simulation environments,the maximum relative error between the calculated porosity results of Monte Carlo and FFCM was 6.80%,with a rootmean-square error of 0.62 p.u.In field well applications,the formation porosity model obtained using FFCM was in good agreement with the model obtained by interpreters,which demonstrates the validity and accuracy of the proposed method.
基金supported by the National Nature Science Foundation of China under 62203376the Science and Technology Plan of Hebei Education Department under QN2021139+1 种基金the Nature Science Foundation of Hebei Province under F2021203043the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network,Nanjing Institute of Technology under No.XTCX202203.
文摘Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs.
基金the Incubation Project of State Grid Jiangsu Corporation of China“Construction and Application of Intelligent Load Transferring Platform for Active Distribution Networks”(JF2023031).
文摘When a line failure occurs in a power grid, a load transfer is implemented to reconfigure the network by changingthe states of tie-switches and load demands. Computation speed is one of the major performance indicators inpower grid load transfer, as a fast load transfer model can greatly reduce the economic loss of post-fault powergrids. In this study, a reinforcement learning method is developed based on a deep deterministic policy gradient.The tedious training process of the reinforcement learning model can be conducted offline, so the model showssatisfactory performance in real-time operation, indicating that it is suitable for fast load transfer. Consideringthat the reinforcement learning model performs poorly in satisfying safety constraints, a safe action-correctionframework is proposed to modify the learning model. In the framework, the action of load shedding is correctedaccording to sensitivity analysis results under a small discrete increment so as to match the constraints of line flowlimits. The results of case studies indicate that the proposed method is practical for fast and safe power grid loadtransfer.
基金supported by Yunnan Provincial Major Science and Technology Special Plan Projects(Grant Nos.202202AD080003,202202AE090008,202202AD080004,202302AD080003)National Natural Science Foundation of China(Grant Nos.U21B2027,62266027,62266028,62266025)Yunnan Province Young and Middle-Aged Academic and Technical Leaders Reserve Talent Program(Grant No.202305AC160063).
文摘Chinese named entity recognition(CNER)has received widespread attention as an important task of Chinese information extraction.Most previous research has focused on individually studying flat CNER,overlapped CNER,or discontinuous CNER.However,a unified CNER is often needed in real-world scenarios.Recent studies have shown that grid tagging-based methods based on character-pair relationship classification hold great potential for achieving unified NER.Nevertheless,how to enrich Chinese character-pair grid representations and capture deeper dependencies between character pairs to improve entity recognition performance remains an unresolved challenge.In this study,we enhance the character-pair grid representation by incorporating both local and global information.Significantly,we introduce a new approach by considering the character-pair grid representation matrix as a specialized image,converting the classification of character-pair relationships into a pixel-level semantic segmentation task.We devise a U-shaped network to extract multi-scale and deeper semantic information from the grid image,allowing for a more comprehensive understanding of associative features between character pairs.This approach leads to improved accuracy in predicting their relationships,ultimately enhancing entity recognition performance.We conducted experiments on two public CNER datasets in the biomedical domain,namely CMeEE-V2 and Diakg.The results demonstrate the effectiveness of our approach,which achieves F1-score improvements of 7.29 percentage points and 1.64 percentage points compared to the current state-of-the-art(SOTA)models,respectively.
文摘In the evolving landscape of the smart grid(SG),the integration of non-organic multiple access(NOMA)technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management.However,the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages,especially when broadcasted from a neighborhood gateway(NG)to smart meters(SMs).This paper introduces a novel approach based on reinforcement learning(RL)to fortify the performance of secrecy.Motivated by the need for efficient and effective training of the fully connected layers in the RL network,we employ an improved chimp optimization algorithm(IChOA)to update the parameters of the RL.By integrating the IChOA into the training process,the RL agent is expected to learn more robust policies faster and with better convergence properties compared to standard optimization algorithms.This can lead to improved performance in complex SG environments,where the agent must make decisions that enhance the security and efficiency of the network.We compared the performance of our proposed method(IChOA-RL)with several state-of-the-art machine learning(ML)algorithms,including recurrent neural network(RNN),long short-term memory(LSTM),K-nearest neighbors(KNN),support vector machine(SVM),improved crow search algorithm(I-CSA),and grey wolf optimizer(GWO).Extensive simulations demonstrate the efficacy of our approach compared to the related works,showcasing significant improvements in secrecy capacity rates under various network conditions.The proposed IChOA-RL exhibits superior performance compared to other algorithms in various aspects,including the scalability of the NOMA communication system,accuracy,coefficient of determination(R2),root mean square error(RMSE),and convergence trend.For our dataset,the IChOA-RL architecture achieved coefficient of determination of 95.77%and accuracy of 97.41%in validation dataset.This was accompanied by the lowest RMSE(0.95),indicating very precise predictions with minimal error.
基金the financial support for this work provided by the National Key R&D Program of China‘Technologies and Integrated Application of Magnesite Waste Utilization for High-Valued Chemicals and Materials’(2020YFC1909303)。
文摘This study developed a numerical model to efficiently treat solid waste magnesium nitrate hydrate through multi-step chemical reactions.The model simulates two-phase flow,heat,and mass transfer processes in a pyrolysis furnace to improve the decomposition rate of magnesium nitrate.The performance of multi-nozzle and single-nozzle injection methods was evaluated,and the effects of primary and secondary nozzle flow ratios,velocity ratios,and secondary nozzle inclination angles on the decomposition rate were investigated.Results indicate that multi-nozzle injection has a higher conversion efficiency and decomposition rate than single-nozzle injection,with a 10.3%higher conversion rate under the design parameters.The decomposition rate is primarily dependent on the average residence time of particles,which can be increased by decreasing flow rate and velocity ratios and increasing the inclination angle of secondary nozzles.The optimal parameters are injection flow ratio of 40%,injection velocity ratio of 0.6,and secondary nozzle inclination of 30°,corresponding to a maximum decomposition rate of 99.33%.