A symbol level secure precoding scheme based on band-region constraint of the eavesdropper’s receiving signal is proposed to enhance the energy efficiency of cell-free multiple-input multiple-output(MIMO)networks in ...A symbol level secure precoding scheme based on band-region constraint of the eavesdropper’s receiving signal is proposed to enhance the energy efficiency of cell-free multiple-input multiple-output(MIMO)networks in the presence of an eavesdropper while guaranteeing the quality of service(QoS)of user and the security of system.Moreover,to lighten its high computational complexity,original problem is divided into several cascade sub-problems firstly,and then those sub-problems are handled by combining Lagrangian dual function and improved Hooke-Jeeves method together.Comparative ex-periment with other secure symbol-level precoding schemes demonstrate that proposed scheme can achieve the lower power consumption with almost same symbol error rate and QoS of user.展开更多
This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the...This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the proposed work is to find the relationship between the test model of an overriding method and its overridden method using the constraint propagation. In this context the approach shows that the test cases developed for testing an original method can be used for testing its overriding method in a subclass and then the number of test cases can be reduced considerably. The second objective is the use of invalid data which do not satisfy the precondition constraint and induce valid output values for introducing a new concept of test called secure testing. The implementation of this approach is based on a random generation of test data and analysis by formal proof.展开更多
Generally, the procedure for Solving Security constrained unit commitment (SCUC) problems within Lagrangian Relaxation framework is partitioned into two stages: one is to obtain feasible SCUC states;the other is to so...Generally, the procedure for Solving Security constrained unit commitment (SCUC) problems within Lagrangian Relaxation framework is partitioned into two stages: one is to obtain feasible SCUC states;the other is to solve the economic dispatch of generation power among all the generating units. The core of the two stages is how to determine the feasibility of SCUC states. The existence of ramp rate constraints and security constraints increases the difficulty of obtaining an analytical necessary and sufficient condition for determining the quasi-feasibility of SCUC states at each scheduling time. However, a numerical necessary and sufficient numerical condition is proposed and proven rigorously based on Benders Decomposition Theorem. Testing numerical example shows the effectiveness and efficiency of the condition.展开更多
The COVID-19 outbreak that became a global pandemic in early 2020 is starting to affect agricultural supply chains and leading to a rapid rise in global food prices.As many grain exporting countries announced a ban on...The COVID-19 outbreak that became a global pandemic in early 2020 is starting to affect agricultural supply chains and leading to a rapid rise in global food prices.As many grain exporting countries announced a ban on grain exports,food security issues in China have attracted a significant international attention.Based on the Suitability Distribution Model and Soybean-Cereal Constraint Model,we explored the relationship between soybean production potential and food security.We calculated that the soybean potential planting area in China is 164.3 million ha.If the outbreak prevents China from importing soybeans,soybean planting area will need to be increased by 6.9 times to satisfy the demands.In the meantime,cereal self-sufficiency rate will drop to 63.4%,which will greatly affect food security.Each additional unit of soybean production will reduce 3.9 units of cereal production,and 1%increase in the self-sufficiency rate of soybean will result in a 0.63%drop in the self-sufficiency rate of cereal.Without sacrificing the self-sufficiency rate of cereal,the self-sufficiency rate of soybean is limited to 42%.Consequently,China will still need to import more than 68%of the current import volume of soybean.Although in the short term,the outbreak will not affect food security in China,as soybean imports decrease,insufficient supply of soybeans will affect people’s quality of life.To prevent the impact of the COVID-19 outbreak,China should increase soybean stocks and strengthen international cooperation.In the long term,increasing the self-sufficiency rate is a fundamental solution to solving soybean import dependency.The key to increasing soybean cultivation is by making soybean cultivation profitable and by building a sustainable soybean planting chain.展开更多
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security mode...In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient.展开更多
With the deepening of the national urban and rural development strategy and the development of urban and rural integration, all levels of government are committed to narrowing the gap between rural and urban subsisten...With the deepening of the national urban and rural development strategy and the development of urban and rural integration, all levels of government are committed to narrowing the gap between rural and urban subsistence allowances. However, the inherent urban and rural differences and path dependence determines the integration of urban and rural low-cost integration is far from the standard can be achieved, the institutional environment and the operating environment are not in the same starting line of the facts, determines the "integration" will need to go through a long period of time Time of urban and rural development can be gradually achieved. At present, China's widespread implementation of the distinction between urban and rural residents minimum riving security system, not only difficult to play its due security ftmction, but further exacerbated the vicious cycle of dual society, the economic and social development is extremely unfavorable.展开更多
大规模安全约束机组组合(security constrained unit commitment,SCUC)问题的混合整数线性规划(mixed integer linear programming,MILP)模型因其高维、非凸的特点导致求解困难,尤其在考虑故障态安全约束后模型规模骤增,MILP算法常遇到...大规模安全约束机组组合(security constrained unit commitment,SCUC)问题的混合整数线性规划(mixed integer linear programming,MILP)模型因其高维、非凸的特点导致求解困难,尤其在考虑故障态安全约束后模型规模骤增,MILP算法常遇到收敛间隙下降瓶颈问题。为满足现货市场出清对SCUC问题求解时间的要求,提出了基于热启动的快速求解方法,从待求模型的一个可行解出发,根据节点边际电价和机组收益分析进行整数变量固定,同时削减无约束力的安全约束,以缩减模型规模,加快收敛进程。仿真结果表明:所提方法能够大幅缩减SCUC模型规模,尤其对于考虑故障态安全约束的大规模SCUC问题,能有效克服收敛间隙下降瓶颈问题,求解效率提高特别显著。展开更多
“双碳”背景下,异质能源的耦合加剧迫使综合能源系统(integrated energy system, IES)拓扑朝着更复杂、更灵活的方向不断演变。然而,现有优化调度方法对非欧网络拓扑知识及其异质潮流约束考虑不足。针对这一问题,提出一种基于图强化学...“双碳”背景下,异质能源的耦合加剧迫使综合能源系统(integrated energy system, IES)拓扑朝着更复杂、更灵活的方向不断演变。然而,现有优化调度方法对非欧网络拓扑知识及其异质潮流约束考虑不足。针对这一问题,提出一种基于图强化学习的综合能源系统优化调度方法。首先,基于图理论在保证节点多样状态的情况下,将异质能源网络拓扑转换为网络图模型。其次,通过建立基于真实图映射的状态-动作-奖励的框架,利用图强化学习的方法学习图模型的非欧拓扑信息,将异质潮流知识加入系统节点运行状态,从而实现IES的安全优化调度。最后,利用某工业园区的真实数据进行仿真验证,所提方法相对于传统方法有效缓解了节点电压越限的问题。结果表明,所提方法能够在考虑IES真实拓扑运行状态信息和异质潮流安全的情况下实现IES的优化调度。展开更多
随着电网规模的持续扩大,市场环境下考虑网络安全约束的机组组合(security-constrained unit commitment,SCUC)模型中的变量和约束显著增加,模型的求解性能变差。当模型规模过大时,会出现现有的商用求解器无法求解的状况,造成大规模模...随着电网规模的持续扩大,市场环境下考虑网络安全约束的机组组合(security-constrained unit commitment,SCUC)模型中的变量和约束显著增加,模型的求解性能变差。当模型规模过大时,会出现现有的商用求解器无法求解的状况,造成大规模模型求解困难的问题。为实现大规模机组组合模型的快速求解,从减少模型约束数量的角度出发,提出了一种基于边界法的线性约束简化方法。通过边界法剔除模型中冗余的线性约束,可以有效降低模型规模,实现模型的快速求解。基于IEEE-39、WECC 179和IEEE-118算例,在市场环境下进行日前SCUC测试。通过对比简化前后的求解时间,表明该方法能够显著提高模型的求解速率。展开更多
As the proportion of wind power generation increases in power systems,it is necessary to develop new ways for wind power accommodation and improve the existing power dispatch model.The power-to-gas technology,which of...As the proportion of wind power generation increases in power systems,it is necessary to develop new ways for wind power accommodation and improve the existing power dispatch model.The power-to-gas technology,which offers a new approach to accommodate surplus wind power,is an excellent way to solve the former.Hence,this paper proposes to involve power-to-gas technology in the integrated electricity and natural gas systems(IEGSs).To solve the latter,on one hand,a new indicator,the scale factor of wind power integration,is introduced into the wind power stochastic model to better describe the uncertainty of grid-connected wind power;on the other hand,for quantizing and minimizing the impact of the uncertainties of wind power and system loads on system security,security risk constraints are established for the IEGS by the conditional value-at-risk method.By considering these two aspects,an MILP formulation of a security-risk based stochastic dynamic economic dispatch model for an IEGS is established,and GUROBI obtained from GAMS is used for the solution.Case studies are conducted on an IEGS consisting of a modified IEEE 39-bus system and the Belgium 20-node natural gas system to examine the effectiveness of the proposed dispatch model.展开更多
An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of shor...An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of short circuit currents is solved with a linearization method based on the DC power flow.The model can be converted to a mixed-integer linear programming problem,realizing the optimization of planning model that considers the constraints of linearized short circuit currents and N-1 security.To compensate the error caused by the assump-tions of DC power flow,the compensation factor is pro-posed.With this factor,an iterative algorithm that can compensate the linearization error is then presented.The case study based on the IEEE 118-bus system shows that the proposed model and approach can be utilized to:opti-mize the construction strategy of transmission lines;ensure the N-1 security of the network;and effectively limit the short circuit currents of the system.展开更多
基金the National Natural Science Foundation of China(No.61976080)the Key Research Projects in Henan Province of China(No.231111212500).
文摘A symbol level secure precoding scheme based on band-region constraint of the eavesdropper’s receiving signal is proposed to enhance the energy efficiency of cell-free multiple-input multiple-output(MIMO)networks in the presence of an eavesdropper while guaranteeing the quality of service(QoS)of user and the security of system.Moreover,to lighten its high computational complexity,original problem is divided into several cascade sub-problems firstly,and then those sub-problems are handled by combining Lagrangian dual function and improved Hooke-Jeeves method together.Comparative ex-periment with other secure symbol-level precoding schemes demonstrate that proposed scheme can achieve the lower power consumption with almost same symbol error rate and QoS of user.
文摘This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the proposed work is to find the relationship between the test model of an overriding method and its overridden method using the constraint propagation. In this context the approach shows that the test cases developed for testing an original method can be used for testing its overriding method in a subclass and then the number of test cases can be reduced considerably. The second objective is the use of invalid data which do not satisfy the precondition constraint and induce valid output values for introducing a new concept of test called secure testing. The implementation of this approach is based on a random generation of test data and analysis by formal proof.
文摘Generally, the procedure for Solving Security constrained unit commitment (SCUC) problems within Lagrangian Relaxation framework is partitioned into two stages: one is to obtain feasible SCUC states;the other is to solve the economic dispatch of generation power among all the generating units. The core of the two stages is how to determine the feasibility of SCUC states. The existence of ramp rate constraints and security constraints increases the difficulty of obtaining an analytical necessary and sufficient condition for determining the quasi-feasibility of SCUC states at each scheduling time. However, a numerical necessary and sufficient numerical condition is proposed and proven rigorously based on Benders Decomposition Theorem. Testing numerical example shows the effectiveness and efficiency of the condition.
基金supported by the National Natural Science Foundation of China(Grant No.41625001,31660233).
文摘The COVID-19 outbreak that became a global pandemic in early 2020 is starting to affect agricultural supply chains and leading to a rapid rise in global food prices.As many grain exporting countries announced a ban on grain exports,food security issues in China have attracted a significant international attention.Based on the Suitability Distribution Model and Soybean-Cereal Constraint Model,we explored the relationship between soybean production potential and food security.We calculated that the soybean potential planting area in China is 164.3 million ha.If the outbreak prevents China from importing soybeans,soybean planting area will need to be increased by 6.9 times to satisfy the demands.In the meantime,cereal self-sufficiency rate will drop to 63.4%,which will greatly affect food security.Each additional unit of soybean production will reduce 3.9 units of cereal production,and 1%increase in the self-sufficiency rate of soybean will result in a 0.63%drop in the self-sufficiency rate of cereal.Without sacrificing the self-sufficiency rate of cereal,the self-sufficiency rate of soybean is limited to 42%.Consequently,China will still need to import more than 68%of the current import volume of soybean.Although in the short term,the outbreak will not affect food security in China,as soybean imports decrease,insufficient supply of soybeans will affect people’s quality of life.To prevent the impact of the COVID-19 outbreak,China should increase soybean stocks and strengthen international cooperation.In the long term,increasing the self-sufficiency rate is a fundamental solution to solving soybean import dependency.The key to increasing soybean cultivation is by making soybean cultivation profitable and by building a sustainable soybean planting chain.
基金the National High Technology Research and Development Program of China (2006AA01Z430)
文摘In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient.
文摘With the deepening of the national urban and rural development strategy and the development of urban and rural integration, all levels of government are committed to narrowing the gap between rural and urban subsistence allowances. However, the inherent urban and rural differences and path dependence determines the integration of urban and rural low-cost integration is far from the standard can be achieved, the institutional environment and the operating environment are not in the same starting line of the facts, determines the "integration" will need to go through a long period of time Time of urban and rural development can be gradually achieved. At present, China's widespread implementation of the distinction between urban and rural residents minimum riving security system, not only difficult to play its due security ftmction, but further exacerbated the vicious cycle of dual society, the economic and social development is extremely unfavorable.
文摘大规模安全约束机组组合(security constrained unit commitment,SCUC)问题的混合整数线性规划(mixed integer linear programming,MILP)模型因其高维、非凸的特点导致求解困难,尤其在考虑故障态安全约束后模型规模骤增,MILP算法常遇到收敛间隙下降瓶颈问题。为满足现货市场出清对SCUC问题求解时间的要求,提出了基于热启动的快速求解方法,从待求模型的一个可行解出发,根据节点边际电价和机组收益分析进行整数变量固定,同时削减无约束力的安全约束,以缩减模型规模,加快收敛进程。仿真结果表明:所提方法能够大幅缩减SCUC模型规模,尤其对于考虑故障态安全约束的大规模SCUC问题,能有效克服收敛间隙下降瓶颈问题,求解效率提高特别显著。
文摘“双碳”背景下,异质能源的耦合加剧迫使综合能源系统(integrated energy system, IES)拓扑朝着更复杂、更灵活的方向不断演变。然而,现有优化调度方法对非欧网络拓扑知识及其异质潮流约束考虑不足。针对这一问题,提出一种基于图强化学习的综合能源系统优化调度方法。首先,基于图理论在保证节点多样状态的情况下,将异质能源网络拓扑转换为网络图模型。其次,通过建立基于真实图映射的状态-动作-奖励的框架,利用图强化学习的方法学习图模型的非欧拓扑信息,将异质潮流知识加入系统节点运行状态,从而实现IES的安全优化调度。最后,利用某工业园区的真实数据进行仿真验证,所提方法相对于传统方法有效缓解了节点电压越限的问题。结果表明,所提方法能够在考虑IES真实拓扑运行状态信息和异质潮流安全的情况下实现IES的优化调度。
文摘随着电网规模的持续扩大,市场环境下考虑网络安全约束的机组组合(security-constrained unit commitment,SCUC)模型中的变量和约束显著增加,模型的求解性能变差。当模型规模过大时,会出现现有的商用求解器无法求解的状况,造成大规模模型求解困难的问题。为实现大规模机组组合模型的快速求解,从减少模型约束数量的角度出发,提出了一种基于边界法的线性约束简化方法。通过边界法剔除模型中冗余的线性约束,可以有效降低模型规模,实现模型的快速求解。基于IEEE-39、WECC 179和IEEE-118算例,在市场环境下进行日前SCUC测试。通过对比简化前后的求解时间,表明该方法能够显著提高模型的求解速率。
基金This work was supported by National Natural Science Foundation of China(No.51777077)Natural Science Foundation of Guangdong Province(2017A030313304).
文摘As the proportion of wind power generation increases in power systems,it is necessary to develop new ways for wind power accommodation and improve the existing power dispatch model.The power-to-gas technology,which offers a new approach to accommodate surplus wind power,is an excellent way to solve the former.Hence,this paper proposes to involve power-to-gas technology in the integrated electricity and natural gas systems(IEGSs).To solve the latter,on one hand,a new indicator,the scale factor of wind power integration,is introduced into the wind power stochastic model to better describe the uncertainty of grid-connected wind power;on the other hand,for quantizing and minimizing the impact of the uncertainties of wind power and system loads on system security,security risk constraints are established for the IEGS by the conditional value-at-risk method.By considering these two aspects,an MILP formulation of a security-risk based stochastic dynamic economic dispatch model for an IEGS is established,and GUROBI obtained from GAMS is used for the solution.Case studies are conducted on an IEGS consisting of a modified IEEE 39-bus system and the Belgium 20-node natural gas system to examine the effectiveness of the proposed dispatch model.
基金This work was supported by National Key Technology R&D Program of China(No.2013BAA01B02)National Natural Science Foundation of China(Nos.51325702,51407100).
文摘An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of short circuit currents is solved with a linearization method based on the DC power flow.The model can be converted to a mixed-integer linear programming problem,realizing the optimization of planning model that considers the constraints of linearized short circuit currents and N-1 security.To compensate the error caused by the assump-tions of DC power flow,the compensation factor is pro-posed.With this factor,an iterative algorithm that can compensate the linearization error is then presented.The case study based on the IEEE 118-bus system shows that the proposed model and approach can be utilized to:opti-mize the construction strategy of transmission lines;ensure the N-1 security of the network;and effectively limit the short circuit currents of the system.