随着“双碳”目标的提出,以风电为代表的可再生能源参与电力现货市场已是大势所趋。但由于具有不确定性和波动性,风电在市场中常处于不利地位。风电与具有灵活调节能力的光热电站(Concentrated Solar Power,CSP)联合能够减少实时出力偏...随着“双碳”目标的提出,以风电为代表的可再生能源参与电力现货市场已是大势所趋。但由于具有不确定性和波动性,风电在市场中常处于不利地位。风电与具有灵活调节能力的光热电站(Concentrated Solar Power,CSP)联合能够减少实时出力偏差,进而降低不平衡成本。基于此,本文针对风电—CSP电站联合参与现货市场的运行策略开展研究。首先,对风电—CSP电站联合参与现货市场的机理进行分析,在此基础上,以经济性最优为目标,综合考虑供电收益、冬季供暖收益和不平衡惩罚等因素,提出了考虑冬季供暖的风电—CSP电站联合参与电力现货市场运行策略,并基于Shapley值法对联盟收益进行分配,最后分析了储热容量对联盟收益的影响。算例表明所提联合运行策略能够充分利用CSP电站灵活性,显著提高双方收益,减少弃风损失。展开更多
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.展开更多
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
Objective:This study aims to explore the expression patterns of cysteine string protein alpha(CSPα)and cysteine string protein beta(CSPβ)in the mammalian inner ear,with an emphasis on their temporal dynamics during ...Objective:This study aims to explore the expression patterns of cysteine string protein alpha(CSPα)and cysteine string protein beta(CSPβ)in the mammalian inner ear,with an emphasis on their temporal dynamics during the developmental stages of C57BL/6 mice.Methods:We utilized immunofluorescence staining to assess the localization and distribution of CSPαand CSPβwithin the inner ears of C57BL/6 mice and miniature pigs.Additionally,this method facilitated the investigation of their temporal expression profiles.Results:In adult C57BL/6 mice and miniature pigs,CSPαand CSPβwere identified in the cytoplasm of inner hair cells and spiral ganglion cells,yet were absent in outer hair cells.Both proteins were found to colocalize with Ctbp2 on the basal side of the cytoplasm in inner hair cells’basilar membrane.Expression of CSPαwas observed at the nerve fiber termini at the basilar membrane’s base of inner and outer hair cells 10 days postnatally in C57BL/6 mice.Notably,expression of both CSPαand CSPβin the cytoplasm of inner hair cells emerged on the 12th day post-birth,aligning with the timeline for registering cochlear potentials.The expression levels of both proteins increased with age,but were consistently absent in outer hair cells.Contrastingly,expression of CSPαand CSPβwas present in the cytoplasm of inner hair cells in miniature pigs as early as one day post-birth,yet remained absent in the three rows of outer hair cells.Conclusion:CSPαand CSPβexhibit predominant and specific expression in inner hair cells and spiral ganglion cells.A unique expression pattern was observed for CSPα,which was also present at the nerve fiber endings of both inner and outer hair cells.The developmental expression trajectory of CSPαand CSPβin mouse inner hair cells is characterized by an initial absence,followed by a gradual increase.Moreover,the timing of expression onset between mice and miniature pigs indicates distinct temporal dynamics,suggesting a potential role in auditory development.展开更多
文摘随着“双碳”目标的提出,以风电为代表的可再生能源参与电力现货市场已是大势所趋。但由于具有不确定性和波动性,风电在市场中常处于不利地位。风电与具有灵活调节能力的光热电站(Concentrated Solar Power,CSP)联合能够减少实时出力偏差,进而降低不平衡成本。基于此,本文针对风电—CSP电站联合参与现货市场的运行策略开展研究。首先,对风电—CSP电站联合参与现货市场的机理进行分析,在此基础上,以经济性最优为目标,综合考虑供电收益、冬季供暖收益和不平衡惩罚等因素,提出了考虑冬季供暖的风电—CSP电站联合参与电力现货市场运行策略,并基于Shapley值法对联盟收益进行分配,最后分析了储热容量对联盟收益的影响。算例表明所提联合运行策略能够充分利用CSP电站灵活性,显著提高双方收益,减少弃风损失。
文摘In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
基金supported by the Science and Technology Development aid Project of Xuzhou Science and Technology Bureau(KC21249)supported by Hainan Provincial Natural Science Foundation of China(824MS052)Scientific Research Startup Foundation of Hainan University.
文摘Objective:This study aims to explore the expression patterns of cysteine string protein alpha(CSPα)and cysteine string protein beta(CSPβ)in the mammalian inner ear,with an emphasis on their temporal dynamics during the developmental stages of C57BL/6 mice.Methods:We utilized immunofluorescence staining to assess the localization and distribution of CSPαand CSPβwithin the inner ears of C57BL/6 mice and miniature pigs.Additionally,this method facilitated the investigation of their temporal expression profiles.Results:In adult C57BL/6 mice and miniature pigs,CSPαand CSPβwere identified in the cytoplasm of inner hair cells and spiral ganglion cells,yet were absent in outer hair cells.Both proteins were found to colocalize with Ctbp2 on the basal side of the cytoplasm in inner hair cells’basilar membrane.Expression of CSPαwas observed at the nerve fiber termini at the basilar membrane’s base of inner and outer hair cells 10 days postnatally in C57BL/6 mice.Notably,expression of both CSPαand CSPβin the cytoplasm of inner hair cells emerged on the 12th day post-birth,aligning with the timeline for registering cochlear potentials.The expression levels of both proteins increased with age,but were consistently absent in outer hair cells.Contrastingly,expression of CSPαand CSPβwas present in the cytoplasm of inner hair cells in miniature pigs as early as one day post-birth,yet remained absent in the three rows of outer hair cells.Conclusion:CSPαand CSPβexhibit predominant and specific expression in inner hair cells and spiral ganglion cells.A unique expression pattern was observed for CSPα,which was also present at the nerve fiber endings of both inner and outer hair cells.The developmental expression trajectory of CSPαand CSPβin mouse inner hair cells is characterized by an initial absence,followed by a gradual increase.Moreover,the timing of expression onset between mice and miniature pigs indicates distinct temporal dynamics,suggesting a potential role in auditory development.