On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pande...On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike.展开更多
The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma...The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.展开更多
In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional eco...In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type.展开更多
The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a com...The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out.展开更多
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet...Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.展开更多
This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument...This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia.展开更多
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica...Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.展开更多
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c...An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.展开更多
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose...The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.展开更多
The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblem...The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method.展开更多
The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies o...The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach.展开更多
Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological feat...Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost.展开更多
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted...Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).展开更多
Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,tr...Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results.展开更多
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in...This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.展开更多
The Gulf cooperation has gained new momentum after the end of the Cold War. However, it also faces various developing difficulties, including the low level of regional institutional cooperation and integration. The re...The Gulf cooperation has gained new momentum after the end of the Cold War. However, it also faces various developing difficulties, including the low level of regional institutional cooperation and integration. The regional context of the regional cooperation in the Gulf region is composed by regional security, energy factors and monarchy form of government, in which regional security is the primary motivation which makes it possible for the co-existence in competition of two tendencies in this region: integration and division. The energy element is the most important reason for external powers’ involvement in the region as well as an important part in regional cooperation in the Gulf region. The monarchy is the key point to understand the relationship between the GCC and Iran and the geographical spillover of the GCC. These factors jointly shape the regional cooperation in the Gulf region.展开更多
In international politics,regional initiatives to establish peace and security have been recognised as more appropriate and pragmatic in the present complex interconnected interdependent security scenario.Regional sec...In international politics,regional initiatives to establish peace and security have been recognised as more appropriate and pragmatic in the present complex interconnected interdependent security scenario.Regional security regimes initiated and promoted both by regional and extra-regional powers for resolving,preventing and managing crises that had grown and nurtured in the regional landscape.Conceptually,comprehensive security regimes,the hybrid of both idealist and realist schools of thought of international relations,are preferably the unique one among all other security regimes.The best example of a comprehensive security regime is the Organisation for Security and Co-operation in Europe.Practically,the dynamic nature of Gulf regional security has become a matter of discourse to ponder upon whether the region is transforming itself on various fronts or whether regional security regimes should be explored to overcome the ongoing multiple security challenges on multidimensional aspects.Scholars have recognised Gulf security as a sub-regional security complex of a larger area which must be dealt with separately.Thus,using this conceptual framework the paper attempts to explore the feasibility of the establishment of a comprehensive security regime in the Gulf Region which can address all three levels of insecurity,regional,state and individual thereby transcend the state-centric approach to security and create security based on multi-sum principles and not on zero-sum calculations.展开更多
In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 sec...In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs.展开更多
文摘On February 29,2020,President Donald Trump announced the United States signed a peace agreement with the Taliban,signifying the United States‟intention of leaving Afghanistan in the near future.Though the global pandemic has altered US withdrawal plans,the question still remains:What will become of the Central Asian regional security complex following America‟s exit?Buffered by the presence of the United States since 2001,the Central Asian republics now once again find themselves at a crossroads to either rely on individual defense services or to develop increased military cooperation with interested states.Recognizing Central Asia‟s history of collaboration among its regional and near-regional countries,I argue that the Central Asian Republics of Afghanistan,Kazakhstan,Kyrgyzstan,Tajikistan,Turkmenistan,and Uzbekistan will seek to develop stronger security ties with neighboring regional security complexes(RSCs),namely the South Asian,Russian,and Chinese RSCs.With decreased American influence,each of the states in these RSCs is rushing to fill the void of influence in order to capitalize on Central Asia‟s geostrategic position in Eurasia as well as secure itself from the threat of non-state actors still prevalent in the region.I further argue that the states in the Central Asian RSC additionally seek these same benefits and security,but receive them to a much lesser extent than their more powerful regional neighbors.Understanding how the American withdrawal from Afghanistan will impact Central Asian RSC relations can provide insight into how great power vacuums are filled both by great powers and regional powers alike.
文摘The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.
基金funded by the National Science-technology Support Plan Projects of China (Grant No.2015BAD07B0105)Yunnan Education Department Fundof China (2014Y315)
文摘In order toclarify regional ecological security status and formation mechanism of regional ecological security barriers in underdeveloped regions of China,we took Yunnan province as a case to evaluate its regional ecological security by using entropy matter-element model,comprehensive index and GIS spatial method,and we diagnosed itsobstacle factors through obstacle degree model. We found a low overall level of regional ecological security in Yunnan. Only Kunmingfell into the good level, 68% of the regions were below the critical safe level. For the vast majority of regions in Yunnan, their regional ecological security was unstable. The indexes related to per capita resources, geological and topographyenvironment, economic, and technologywere at the unsafe or dangerous level.The indexes related to urban expansion, level of income, cultivated land quality were at the level of critical safety. The indexes concerning urban management capacity, airqualityand waterenvironment were at the good or ideallevel. Yunnan's regional ecological security was not good due to natural obstructive environment itself, simultaneously lower backward economic and social level restricted the ability of ecological security response to manage ragile ecological environment. The results of the composite index wereroughly consistent with those of the entropy weight matterelement model. The mean values of the classification index,from high to low, were: the state index>the response index>the pressure index. The state index and the response index had a significant mutual promotion to each other.The regions with good composite index, state index and response index mainly distributed in the central regions of Yunnan Province. Spatial autocorrelation of regional ecological security level in Yunnan was not obvious. Water resources, economic and social development were main obstacle factors of the regional ecological security.When distinguishing with obstacle type, Kunming belonged to natural ecological environment barrier type, while other regions belonged to economic and social barrier type.
基金Supported by the State Nature Science Foundation (40771085) the National Science & Technology Support Program (2006BZC 18B01-05)
文摘The DPSIR assessment method, which implies the relationships among driving force (D), pressure (P), status (S), impact (I), and response (R), is widely applied by scholars. This paper aims to establish a comprehensive assessment system for regional energy security in eastern coastal China based on the above model using different indicators. Factor analysis and the SPSS statistical analysis software were used to carry out scientific and quantitative assessments. The results indicated that con- tradictions of energy supply and demand as well as environmental pollution are the critical factors that present great challenges to regional energy security in this area. The authors argued that a sustainable, stable, and safe supply energy supply is crucial in solving the aforesaid dilemma, and improving the energy use efficiency is one of the best choices. Some countermeasures and suggestions regarding regional energy supply stability and utilization security were pointed out.
文摘Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.
文摘This article asks whether a regional security community has emerged in Asia with the potential to grow mature and seeks to make a contribution to the ongoing debate on this controversial topic.It advances the argument that states in this broad region are far from being able to develop a security community for reasons different from those provided by political realists,developmental statists,liberals,and constructivists(social,discursive,and emancipationist).The role of Association of Southeast Asia(ASEAN)and that of China provide excellent test cases for the theoretical proposition that the building of a successful regional security community requires at least two necessary conditions:liberal democracy and regional democratic leadership,which remain absent in Asia.
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
基金National Natural Science Foundation of China, No.40371003 Ministry of Education of China, No.01158 Master Research Project of Shaanxi Normal University
文摘Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.
基金National Natural Science Foundation of China(No.61503251)Natural Science Foundation of Shanghai,China(No.16ZR1424500)
文摘An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.
基金Supported by National Natural Science Foundation of China (No.50595413)Special Fund of the National Fundamental Research of China(No.2004CB217904)+4 种基金US EPRI under Agreement EP-P29464/C9966Foundation for the Author of National Excellent Doctoral Disserta-tion (No.200439)Key Project of Ministry of Education of China(No.105047)Program for New Century Excellent Talents in University,Fok Ying Tung Education Foundation (No.104019)Innovation Fund of Tianjin Municipal (2006-09)
文摘The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.
基金National Natural Science Foundation of China(No.50595413)National Key Basic Research Program ("973" Program) (No.2004CB217904)
文摘The security constrained distributed optimal power flow (DOPF) of interconnected power systems is presented. The centralized OPF problem of the multi-area power systems is decomposed into independent DOPF subproblems, one for each area. The dynamic security region (DSR) to guarantee the transient stability constraints and static voltage stability region (SVSR) constraints, and line current limits are included as constraints. The solutions to the DOPF subproblems of the different areas are coordinated through a pricing mechanism until they converge to the centralized OPF solution. The nonlinear DOPF subproblem is solved by predictor-corrector interior point method (PClPM). The IEEE three-area RTS-96 system is worked out in order to demonstrate the effectiveness of the proposed method.
文摘The article gives an overview on the dynamic political processes in the Black Sea region after some major geostrategic changes posing instability concerns in the region. The aim is to summarise the policy tendencies of the international organisations (NATO and EU) towards Russia and to present some analytical thoughts on current Euro-Atlantic strategies. Proposed is a different way of thinking based on the "congagement" approach.
文摘Since the scale and uncertainty of the power system have been rapidly increasing,the computation efficiency of constructing the security region boundary(SRB)has become a prominent problem.Based on the topological features of historical operation data,a sample generation method for SRB identification is proposed to generate evenly distributed samples,which cover dominant security modes.The boundary sample pair(BSP)composed of a secure sample and an unsecure sample is defined to describe the feature of SRB.The resolution,sampling,and span indices are designed to evaluate the coverage degree of existing BSPs on the SRB and generate samples closer to the SRB.Based on the feature of flat distribution of BSPs over the SRB,the principal component analysis(PCA)is adopted to calculate the tangent vectors and normal vectors of SRB.Then,the sample distribution can be expanded along the tangent vector and corrected along the normal vector to cover different security modes.Finally,a sample set is randomly gen-erated based on the IEEE standard example and another new sample set is generated by the proposed method.The results indicate that the new sample set is closer to the SRB and covers different security modes with a small calculation time cost.
基金supported by the National Key R&D Program of China(No.2022YFB2404000).
文摘Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).
基金supported in part by the National Natural Science Foundation of China (No.52007017)Fundamental Research Funds for the Central Universities (No.2020CDJQY-A027)。
文摘Determining security/stability boundaries is a common and critical means of preventing cascading failures induced by voltage-related issues,which represents one of the major challenges in bulk power systems.However,traditional approaches suffer from conservative issues and heavy computational burdens.To address these challenges,the concept of an autonomous-synergic voltage security region(AS-VSR)and the corresponding dynamic constraint coefficient pruning(DCCP)computation method,which fully consider the volt/var characteristics of bulk power systems,are proposed in this letter.Both linearized and nonlinearized robust optimization problems are introduced to obtain accurate results.The computational accuracy,time cost,and advantages of autonomous-synergic control are observed in the simulation results.
基金supported by National Key Research and Development Program of China(2016YFB0900100)National Natural Science Foundation of China(51877144)China Postdoctoral Science(2020M6700668).
文摘This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.
基金This article is financed by key research projects of China’s Education Ministry(08JZD0039),National Social Sciences Foundation of China(13CZJ017)China Postdoctoral Science Foundation(2013T60402&2012M520795)+1 种基金Chinese Ministry of Education Research(KA159225)Shanghai’s Key Academic Discipline。
文摘The Gulf cooperation has gained new momentum after the end of the Cold War. However, it also faces various developing difficulties, including the low level of regional institutional cooperation and integration. The regional context of the regional cooperation in the Gulf region is composed by regional security, energy factors and monarchy form of government, in which regional security is the primary motivation which makes it possible for the co-existence in competition of two tendencies in this region: integration and division. The energy element is the most important reason for external powers’ involvement in the region as well as an important part in regional cooperation in the Gulf region. The monarchy is the key point to understand the relationship between the GCC and Iran and the geographical spillover of the GCC. These factors jointly shape the regional cooperation in the Gulf region.
文摘In international politics,regional initiatives to establish peace and security have been recognised as more appropriate and pragmatic in the present complex interconnected interdependent security scenario.Regional security regimes initiated and promoted both by regional and extra-regional powers for resolving,preventing and managing crises that had grown and nurtured in the regional landscape.Conceptually,comprehensive security regimes,the hybrid of both idealist and realist schools of thought of international relations,are preferably the unique one among all other security regimes.The best example of a comprehensive security regime is the Organisation for Security and Co-operation in Europe.Practically,the dynamic nature of Gulf regional security has become a matter of discourse to ponder upon whether the region is transforming itself on various fronts or whether regional security regimes should be explored to overcome the ongoing multiple security challenges on multidimensional aspects.Scholars have recognised Gulf security as a sub-regional security complex of a larger area which must be dealt with separately.Thus,using this conceptual framework the paper attempts to explore the feasibility of the establishment of a comprehensive security regime in the Gulf Region which can address all three levels of insecurity,regional,state and individual thereby transcend the state-centric approach to security and create security based on multi-sum principles and not on zero-sum calculations.
基金This work was supported by the National Natural Science Foundation of China(51477112)National Natural Science Foundation of China(51277129).
文摘In this paper,a new Distribution Management System(DMS)framework based on security region is proposed.First,the concept of Distribution System Security Region(DSSR)is introduced.DSSR is capable to describe the N-1 security boundary of the whole distribution network,including the secure output range of DGs.This new theoretic tool provides a chance for the implementation of real-time security analysis and active controls in DMS.Second,this paper proposes and describes five security states for distribution system.Third,an upgraded DMS enhanced with DSSR is proposed,which consists of advanced security functions such as preventive and predictive control of the trajectory of operating points.Finally,a practical case is presented to simulate the proposed DSSR-enhanced DMS,in which both the security region of network and the output range of DGs are calculated.Typical security functions are also demonstrated.In conclusion,the new DMS framework aims to help operate the system closed to its security boundary in order to improve the efficiency significantly within same security standard.This work is beneficial for future low carbon distribution systems with high penetration rate of DGs.