With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr...With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.展开更多
The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches of...The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.展开更多
Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the ...Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the configuration of photovoltaic(3.8 MW),wind power(2.5 MW),energy storage(2.2 MWh),and SVC(1.2 Mvar)through interaction between upper and lower layers,and modifies lines 2–3,8–9,etc.to improve transmission capacity and voltage stability.The author uses normal distribution and Monte Carlo method to model load uncertainty,and combines Weibull distribution to describe wind speed characteristics.Compared to the traditional three-layer model(TLM),Benders decomposition-based two-layer model(BLBD)has a 58.1%reduction in convergence time(5.36 vs.12.78 h),a 51.1%reduction in iteration times(23 vs.47 times),a 8.07%reduction in total cost(12.436 vs.13.528 million yuan),and a 9.62%reduction in carbon emissions(12,456 vs.13,782 t).After optimization,the peak valley difference decreased from4.1 to 2.9MW,the renewable energy consumption rate reached 93.4%,and the energy storage efficiency was 87.6%.Themodel has been validated in the IEEE 33 node system,demonstrating its superiority in terms of economy,low-carbon,and reliability.展开更多
Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the...Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study.展开更多
In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in...In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.展开更多
The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper ...The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.展开更多
Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution netwo...Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.展开更多
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p...Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.展开更多
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt...Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.展开更多
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late...Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.展开更多
Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neur...Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.展开更多
Defects in cast-in-situ piles have an adverse impact on load transfer at the pile‒soil interface and pile bearing capacity. In recent years, thermal integrity profiling (TIP) has been developed to measure temperature ...Defects in cast-in-situ piles have an adverse impact on load transfer at the pile‒soil interface and pile bearing capacity. In recent years, thermal integrity profiling (TIP) has been developed to measure temperature profiles of cast-in-situ piles, enabling the detection of structural defects or anomalies at the early stage of construction. However, using this integrity testing method to evaluate potential defects in cast-in-situ piles requires a comprehensive understanding of the mechanism of hydration heat transfer from piles to surrounding soils. In this study, small-scale model tests were conducted in laboratory to investigate the performance of TIP in detecting pile integrity. Fiber-optic distributed temperature sensing (DTS) technology was used to monitor detailed temperature variations along model piles in sand. Additionally, sensors were installed in sand to measure water content and matric suction. An interpretation method against available DTS-based thermal profiles was proposed to reveal the potential defective regions. It shows that the temperature difference between normal and defective piles is more obvious in wet sand. In addition, there is a critical zone of water migration in sand due to the water absorption behavior of cement and temperature transfer-induced water migration in the early-age concrete setting. These findings could provide important insight into the improvement of the TIP testing method for field applications.展开更多
A distributed optical-fiber acoustic sensor is an acoustic sensor that uses the optical fiber itself as a photosensitive medium,and is based on Rayleigh backscattering in an optical fiber.The sensor is widely used in ...A distributed optical-fiber acoustic sensor is an acoustic sensor that uses the optical fiber itself as a photosensitive medium,and is based on Rayleigh backscattering in an optical fiber.The sensor is widely used in the safety monitoring of oil and gas pipelines,the classification of weak acoustic signals,defense,seismic prospecting,and other fields.In the field of seismic prospecting,distributed optical-fiber acoustic sensing(DAS)will gradually replace the use of the traditional geophone.The present paper mainly expounds the recent application of DAS,and summarizes recent research achievements of DAS in resource exploration,intrusion monitoring,pattern recognition,and other fields and various DAS system structures.It is found that the high-sensitivity and long-distance sensing capabilities of DAS play a role in the extensive monitoring applications of DAS in engineering.The future application and development of DAS technology are examined,with the hope of promoting the wider application of the DAS technology,which benefits engineering and society.展开更多
The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and th...The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.展开更多
The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching network...The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.展开更多
By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets ...By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.展开更多
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th...To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.展开更多
The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one...The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.展开更多
Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their c...Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.展开更多
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ...Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.展开更多
基金supported by the Research year project of the KongjuNational University in 2025 and the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2024-00444170,Research and International Collaboration on Trust Model-Based Intelligent Incident Response Technologies in 6G Open Network Environment).
文摘With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.
基金supported by the National Natural Science Foundation of China (Grant No.62173009)the National Key Research and Development Program of China (Grant No.2021ZD0112302)。
文摘The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.
文摘Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the configuration of photovoltaic(3.8 MW),wind power(2.5 MW),energy storage(2.2 MWh),and SVC(1.2 Mvar)through interaction between upper and lower layers,and modifies lines 2–3,8–9,etc.to improve transmission capacity and voltage stability.The author uses normal distribution and Monte Carlo method to model load uncertainty,and combines Weibull distribution to describe wind speed characteristics.Compared to the traditional three-layer model(TLM),Benders decomposition-based two-layer model(BLBD)has a 58.1%reduction in convergence time(5.36 vs.12.78 h),a 51.1%reduction in iteration times(23 vs.47 times),a 8.07%reduction in total cost(12.436 vs.13.528 million yuan),and a 9.62%reduction in carbon emissions(12,456 vs.13,782 t).After optimization,the peak valley difference decreased from4.1 to 2.9MW,the renewable energy consumption rate reached 93.4%,and the energy storage efficiency was 87.6%.Themodel has been validated in the IEEE 33 node system,demonstrating its superiority in terms of economy,low-carbon,and reliability.
基金supported by the Science and Technology Project of Sichuan Electric Power Company“Power Supply Guarantee Strategy for Urban Distribution Networks Considering Coordination with Virtual Power Plant during Extreme Weather Event”(No.521920230003).
文摘Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study.
基金supported by the Science and Technology Program of China Southern Power Grid(031800KC23120003).
文摘In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.
基金supported by National Natural Science Foundation of China under Grants 62203045,62433020 and T2293770。
文摘The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.
基金This research was funded by“Chunhui Program”Collaborative Scientific Research Project of the Ministry of Education of the People’s Republic of China(Project No.HZKY20220242)the S&T Program of Hebei(Project No.225676163GH).
文摘Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.
文摘Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.
基金supported by the National Natural Science Foundation of China(12471416,12171124,12301567)the Heilongjiang Provincial Natural Science Foundation of China(PL2024F015)+2 种基金the Postdoctoral Science Foundation of Heilongjiang Province of China(LBH-Z22199)the Fundamental Research Foun-dation for Universities of Heilongjiang Province of China(2022-KYYWF-0141)the Alexander von Humboldt Foundation of Germany.
文摘Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.
基金supported by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
基金supported by the National Key R&D Program of China(Grant No.2022YFA1604200)National Natural Science Foundation of China(Grant No.12261131495)+1 种基金Beijing Municipal Science and Technology Commission,Adminitrative Commission of Zhongguancun Science Park(Grant No.Z231100006623006)Institute of Systems Science,Beijing Wuzi University(Grant No.BWUISS21)。
文摘Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.
基金The authors grate fully acknowledge the financial support provided by the National Natural Science Foundation of China(Grant Nos.42225702 and 42077235)the Open Research Project Program of the State Key Laboratory of Internet of Things for Smart City(University of Macao),China(Grant No.SKUoTSC(UM)-2021-2023/0RP/GA10/2022).
文摘Defects in cast-in-situ piles have an adverse impact on load transfer at the pile‒soil interface and pile bearing capacity. In recent years, thermal integrity profiling (TIP) has been developed to measure temperature profiles of cast-in-situ piles, enabling the detection of structural defects or anomalies at the early stage of construction. However, using this integrity testing method to evaluate potential defects in cast-in-situ piles requires a comprehensive understanding of the mechanism of hydration heat transfer from piles to surrounding soils. In this study, small-scale model tests were conducted in laboratory to investigate the performance of TIP in detecting pile integrity. Fiber-optic distributed temperature sensing (DTS) technology was used to monitor detailed temperature variations along model piles in sand. Additionally, sensors were installed in sand to measure water content and matric suction. An interpretation method against available DTS-based thermal profiles was proposed to reveal the potential defective regions. It shows that the temperature difference between normal and defective piles is more obvious in wet sand. In addition, there is a critical zone of water migration in sand due to the water absorption behavior of cement and temperature transfer-induced water migration in the early-age concrete setting. These findings could provide important insight into the improvement of the TIP testing method for field applications.
基金supported by the Science and Technology Development Plan of Jilin Province(No.20180201036GX)
文摘A distributed optical-fiber acoustic sensor is an acoustic sensor that uses the optical fiber itself as a photosensitive medium,and is based on Rayleigh backscattering in an optical fiber.The sensor is widely used in the safety monitoring of oil and gas pipelines,the classification of weak acoustic signals,defense,seismic prospecting,and other fields.In the field of seismic prospecting,distributed optical-fiber acoustic sensing(DAS)will gradually replace the use of the traditional geophone.The present paper mainly expounds the recent application of DAS,and summarizes recent research achievements of DAS in resource exploration,intrusion monitoring,pattern recognition,and other fields and various DAS system structures.It is found that the high-sensitivity and long-distance sensing capabilities of DAS play a role in the extensive monitoring applications of DAS in engineering.The future application and development of DAS technology are examined,with the hope of promoting the wider application of the DAS technology,which benefits engineering and society.
基金The National Natural Science Foundation of China (No60574006)
文摘The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.
基金The National Natural Science Foundation of China(No.61106021)the Postdoctoral Science Foundation of China(No.2015M582541)+1 种基金the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.15KJB510020)the Research Fund of Nanjing University of Posts and Telecommunications(No.NY215140,No.NY215167)
文摘The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.
文摘By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.
基金The Natural Science Foundation of Zhejiang Province(No.Y1090232)
文摘To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.
基金China Postdoctoral Science Foundation (No.20090461048)Postdoctoral Science Foundation of Jiangsu Province (No.0901022C)Postdoctoral Science Foundation of Southeast University
文摘The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.
基金the National Natural Science Foundation of China (60673054, 60773129)theExcellent Youth Science and Technology Foundation of Anhui Province of China.
文摘Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.
基金Project supported by the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 60921063) and the National High Technology Research and Development Program of China (Grant No. 2013AA013601).
文摘Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.