This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is...This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is a stochastic deception attack at the sensor-controller end. The probability of the occurrence of attack on a subsystem is represented using a random variable. A decentralized hybrid sampled-data strategy is introduced to save energy consumption and reduce the transmission load of the network. In the proposed decentralized strategy, each subsystem can decide independently whether its state should be transmitted to the controller or not. The scheme of the hybrid triggering mechanism for each subsystem composed of two stages: In the first stage, the next sampling instant is computed using a self-triggering strategy. Subsequently, in the second stage, an event-triggering condition is checked at these sampling instants and the control signal is computed only if the event-triggering condition is violated. The self-triggering condition used in the first stage is dependent on the selection of eventtriggering condition of the second stage. Finally, a comparison of the proposed approach with other triggering mechanisms existing in the literature is presented in terms of the sampling instants,transmission frequency and performance measures through simulation examples.展开更多
In this paper we propose a Filter-based Uniform Algorithm (FbUA) for optimizing top-κ query in distributed networks, which has been a topic of much recent interest. The basic idea of FhUA is to set a filter at each...In this paper we propose a Filter-based Uniform Algorithm (FbUA) for optimizing top-κ query in distributed networks, which has been a topic of much recent interest. The basic idea of FhUA is to set a filter at each node to pre vent it from sending out the data with little chance to contrib ute to the top-κ result. FbUA can gain exact answers to top-κ query through two phrases of round trip communications between query station and participant nodes. The experiment results show that FbUA reduces network bandwidth consumption dramatically.展开更多
A new chance of developing traditional manufacturing industry comes forth with the development of network technology. Application technology oriented rapid response manufacturing in the distributed network environment...A new chance of developing traditional manufacturing industry comes forth with the development of network technology. Application technology oriented rapid response manufacturing in the distributed network environments, that is, how to take advantage of the Intranet and Internet, combine the numerous manufacturing resources spread around the region, the country and even the globe is the key to the agile design, manufacturing and the buildup of comprehensively competitive power, at the same time, is also an important research direction in the field of advanced manufacturing technology. Rapid response manufacturing in the distributed network environment is a newly manufactory pattern that can be used to implement the conception of agile design and manufacturing, but there are some new problems coming with it, which will directly influence the enterprise’s ability of rapid response in the distributed network manufacturing pattern and lead to the failure of the league and the lost of the given orders. In this paper, we establish some approaches to solve these problems in product development process. The paper then presents the research on key application technologies and solutions includes: network safety strategy which guarantees data transferring among the leaguer members, production data management based on Web/DOT (Distributed Object Technology) and XML criteria which guarantees data exchange in structure-variance characteristic environments, the network platform which provides the conversion service of different types of CAD files each other. All of these solutions are aim for technology problems existing in the distributed network environments and among the league members. Finally, the paper takes one project, that is, the establishment of the online application service system for Shanghai Advance Manufacturing Technology Research Center as a good instance.展开更多
This paper presents Isotope, an efficient, locality aware, fault-tolerant, and decentralized scheme for data location in distributed networks. This scheme is designed based on the mathematical model of decentralized l...This paper presents Isotope, an efficient, locality aware, fault-tolerant, and decentralized scheme for data location in distributed networks. This scheme is designed based on the mathematical model of decentralized location services and thus has provable correctness and performance. In Isotope, each node needs to only maintain linkage information with about O(log n) other nodes and any node can be reached within O(log n) routing hops. Compared with other related schemes, Isotope’s average locating path length is only half that of Chord, and its locating performance and locality-awareness are similar to that of Pastry and Tapestry. In addition, Isotope is more suitable for constantly changing networks because it needs to exchange only O(log n) O(log n) messages to update the routing information for nodes arrival, departure and failure.展开更多
Disconnection in the distributed heterogeneous networked unmanned weapon systems is caused by multiple weapon units' failure. The technical routes were analyzed to achieve resilience in the disconnection situation. A...Disconnection in the distributed heterogeneous networked unmanned weapon systems is caused by multiple weapon units' failure. The technical routes were analyzed to achieve resilience in the disconnection situation. A heterogeneous distributed network model of networked unmanned weapon systems was established. And an approach of adding relay weapon units was proposed to a- chieve fault tolerance after weapon units' failure due to attack or energy exhaustion. An improved ge- netic algorithm was proposed to determine and optimize the position of the relay weapon units. Simulation results in the MATLAB show that the improved resilience-based genetic algorithm can restore the network connection maximally when the number of relay units is limited, the network can keep on working after failure, and the implementation cost is controlled in a reasonable range.展开更多
In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in...In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.展开更多
Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution netwo...Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.展开更多
This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for ...This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with firstorder and second-order players,respectively.In the developed algorithms,the observed disturbance values are included in control signals to eliminate the influence of disturbances,based on which a gradient-like optimization method is implemented for each player.Second,a signum function based distributed algorithm is proposed to attenuate disturbances for games with secondorder integrator-type players.To be more specific,a signum function is involved in the proposed seeking strategy to dominate disturbances,based on which the feedback of the velocity-like states and the gradients of the functions associated with players achieves stabilization of system dynamics and optimization of players'objective functions.Through Lyapunov stability analysis,it is proven that the players'actions can approach a small region around the Nash equilibrium by utilizing disturbance observerbased strategies with appropriate control gains.Moreover,exponential(asymptotic)convergence can be achieved when the signum function based control strategy(with an adaptive control gain)is employed.The performance of the proposed algorithms is tested by utilizing an integrated simulation platform of virtual robot experimentation platform(V-REP)and MATLAB.展开更多
In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence ...In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence of the decision makers in trust evaluation and collaborative decision making. A trust management mechanism based on the jury system for distributed cognitive radio networks is proposed in this paper. The "jury user" is designed to collaboratively examine the reputation of the cognitive user in the networks and to perform data fusion and spectrum allocation for distributed cognitive radio networks. Simulation analysis results show that the proposed scheme can ensure accuracy and fairness in trust evaluation and improve effectiveness and flexibility of spectrum allocation.展开更多
Network resource management is critical to ensure the security and optimal performance of distributed networks and information systems. Existing technologies are not capable of managing large-scale network resources b...Network resource management is critical to ensure the security and optimal performance of distributed networks and information systems. Existing technologies are not capable of managing large-scale network resources because of a lack of reusability and scalability. This paper presents a matrix grammar approach for automatic distributed network resource management to alleviate these problems. A matrix grammar is proposed using WMI, CIM, and SNMP to manage network resources, and provides a generic mechanism to describe what needs to be managed and how to manage it. A scalable distributed multi-agent architecture for automatic network resource management is proposed, at its core lies a management automation engine consisting of a matrix analyzer and a recipe processor. The proposed solution has been implemented in software and applied in industrial products that achieve good technical and industrial results. It has good extensibility, scalability, ment automation and software and enables network managereusability.展开更多
The spatial diversity of distributed network demands the individual filter to accommodate the topology of interference environment.In this paper,a type of distributed adaptive beamformer is proposed to mitigate interf...The spatial diversity of distributed network demands the individual filter to accommodate the topology of interference environment.In this paper,a type of distributed adaptive beamformer is proposed to mitigate interference over coordinated antenna arrays network.The proposed approach is formulated as generalized sidelobe canceller(GSC)structure to facilitate the convex combination of neighboring nodes'weights,and then it is solved by unconstrained least mean square(LMS)algorithm due to simplicity.Numerical results show that the robustness and convergence rate of antenna arrays network can be significantly improved in strong interference scenario.And they also clearly illustrate that mixing vector is optimized adaptively and adjusted according to the spatial diversity of the distributed nodes which are placed in different power of received signals to interference ratio(SIR)environments.展开更多
This paper introduces a hierarchical real-time environment for developing ship-bornefire-control system. Advanced computer networks are used to simulate the system with the requiredengagement scenario, including own-s...This paper introduces a hierarchical real-time environment for developing ship-bornefire-control system. Advanced computer networks are used to simulate the system with the requiredengagement scenario, including own-ship and parameters, and data processing and transmission,mission calculation, graphical supervision and gunnery ballistics outputting. The simulation systemis able to receive instruction from, or send information to the command-control center. Furthermore,the system can also be used to compare various designed schemes and analyze the accuracy andeffectiveness of the system.展开更多
Network localization serves as a fundamental component for enabling various position based operations in multi-agent systems,facilitating tasks like target searching and formation control by providing accurate positio...Network localization serves as a fundamental component for enabling various position based operations in multi-agent systems,facilitating tasks like target searching and formation control by providing accurate position information for all nodes in the network.Network localization focuses on the challenge of determining the positions of nodes within a network,relying on the known positions of anchor nodes and internode relative measurements.Over the past few decades,distributed network localization has garnered significant attention from researchers.This paper aims to provide a review of main results and advancements in the field of distributed network localization,with a particular focus on the perspective of graph Laplacian.Owning to its favorable characteristics,graph Laplacian unifies various network localization,even when dealing with diverse types of internode relative measurements,into a unified protocol framework,which can be constructed by a linear method and ensure the global convergence.展开更多
The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-trigge...The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure.展开更多
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ...Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.展开更多
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite...The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.展开更多
Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several securi...Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems,e.g.key leakage,impersonation attack,MitM attack and single point of failure.In this paper,a blockchain based asymmetric authentication and key agreement protocol(BC-AKA)is proposed for distributed 5G core network.In particular,the key used in the authentication process is replaced from a symmetric key to an asymmetric key,and the database used to store keys in conventional 5G core network is replaced with a blockchain network.A proof of concept system for distributed 5G core network is built based on Ethereum and ECC-Secp256 k1,and the efficiency and effectiveness of the proposed scheme are verified by the experiment results.展开更多
The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a syste...The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.展开更多
In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the...In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the fault position,the closed-loop structure of the PSDN is skillfully exploited,and the common control strategies of IIDGs are considered.For asymmetrical faults,a fault line identification formula based on the negative-sequence current phase differences is presented,and a fault location formula only utilizing the negative-sequence current amplitudes is derived to calculated the fault position.For symmetrical faults,the positive-sequence current at both ends of lines and the current output from IIDGs are used to identify the fault line,and the positive-sequence current on multiple lines are used to pinpoint the fault position.In this method,corresponding current phasors are separated into amplitudes and phases to satisfy the limitation of communication level.The simulation results show that the error is generally less than 1%,and the accuracy of the proposed method is not affected by the fault type,fault position,fault resistance,load current,and the IIDG penetration.展开更多
A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection,leading to...A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection,leading to poor performance.The method combines a fault-tolerant fault location method based on long-term and short-term memory networks to accurately locate the fault section.Then,an operation control method for relay protection based on adaptive weight and whale optimization algorithm(WOA)is used to construct an objective function considering the shortest relay protection action time and the smallest impulse current.The adaptive weight and WOA are employed to obtain the optimal strategy for relay protection operation control,reducing the action time and impulse current.Experimental results demonstrate the effectiveness of the proposed method in accurately locating faults and improving relay protection performance.The longest operation time is reduced by 4.7023 s,and the maximum impulse current is limited to 0.3 A,effectively controlling the impact of large impulse currents and enhancing control efficiency.展开更多
文摘This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is a stochastic deception attack at the sensor-controller end. The probability of the occurrence of attack on a subsystem is represented using a random variable. A decentralized hybrid sampled-data strategy is introduced to save energy consumption and reduce the transmission load of the network. In the proposed decentralized strategy, each subsystem can decide independently whether its state should be transmitted to the controller or not. The scheme of the hybrid triggering mechanism for each subsystem composed of two stages: In the first stage, the next sampling instant is computed using a self-triggering strategy. Subsequently, in the second stage, an event-triggering condition is checked at these sampling instants and the control signal is computed only if the event-triggering condition is violated. The self-triggering condition used in the first stage is dependent on the selection of eventtriggering condition of the second stage. Finally, a comparison of the proposed approach with other triggering mechanisms existing in the literature is presented in terms of the sampling instants,transmission frequency and performance measures through simulation examples.
基金Supported by the National Natural Science Foun-dation of China (60503036 ,60473073) Fok Ying Tong EducationFoundation (104027)
文摘In this paper we propose a Filter-based Uniform Algorithm (FbUA) for optimizing top-κ query in distributed networks, which has been a topic of much recent interest. The basic idea of FhUA is to set a filter at each node to pre vent it from sending out the data with little chance to contrib ute to the top-κ result. FbUA can gain exact answers to top-κ query through two phrases of round trip communications between query station and participant nodes. The experiment results show that FbUA reduces network bandwidth consumption dramatically.
文摘A new chance of developing traditional manufacturing industry comes forth with the development of network technology. Application technology oriented rapid response manufacturing in the distributed network environments, that is, how to take advantage of the Intranet and Internet, combine the numerous manufacturing resources spread around the region, the country and even the globe is the key to the agile design, manufacturing and the buildup of comprehensively competitive power, at the same time, is also an important research direction in the field of advanced manufacturing technology. Rapid response manufacturing in the distributed network environment is a newly manufactory pattern that can be used to implement the conception of agile design and manufacturing, but there are some new problems coming with it, which will directly influence the enterprise’s ability of rapid response in the distributed network manufacturing pattern and lead to the failure of the league and the lost of the given orders. In this paper, we establish some approaches to solve these problems in product development process. The paper then presents the research on key application technologies and solutions includes: network safety strategy which guarantees data transferring among the leaguer members, production data management based on Web/DOT (Distributed Object Technology) and XML criteria which guarantees data exchange in structure-variance characteristic environments, the network platform which provides the conversion service of different types of CAD files each other. All of these solutions are aim for technology problems existing in the distributed network environments and among the league members. Finally, the paper takes one project, that is, the establishment of the online application service system for Shanghai Advance Manufacturing Technology Research Center as a good instance.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60073074).
文摘This paper presents Isotope, an efficient, locality aware, fault-tolerant, and decentralized scheme for data location in distributed networks. This scheme is designed based on the mathematical model of decentralized location services and thus has provable correctness and performance. In Isotope, each node needs to only maintain linkage information with about O(log n) other nodes and any node can be reached within O(log n) routing hops. Compared with other related schemes, Isotope’s average locating path length is only half that of Chord, and its locating performance and locality-awareness are similar to that of Pastry and Tapestry. In addition, Isotope is more suitable for constantly changing networks because it needs to exchange only O(log n) O(log n) messages to update the routing information for nodes arrival, departure and failure.
基金Supported by the Aviation Science Foundation of China(2013ZC72006)
文摘Disconnection in the distributed heterogeneous networked unmanned weapon systems is caused by multiple weapon units' failure. The technical routes were analyzed to achieve resilience in the disconnection situation. A heterogeneous distributed network model of networked unmanned weapon systems was established. And an approach of adding relay weapon units was proposed to a- chieve fault tolerance after weapon units' failure due to attack or energy exhaustion. An improved ge- netic algorithm was proposed to determine and optimize the position of the relay weapon units. Simulation results in the MATLAB show that the improved resilience-based genetic algorithm can restore the network connection maximally when the number of relay units is limited, the network can keep on working after failure, and the implementation cost is controlled in a reasonable range.
基金supported by the Science and Technology Program of China Southern Power Grid(031800KC23120003).
文摘In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.
基金This research was funded by“Chunhui Program”Collaborative Scientific Research Project of the Ministry of Education of the People’s Republic of China(Project No.HZKY20220242)the S&T Program of Hebei(Project No.225676163GH).
文摘Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.
基金supported by the National Natural Science Foundation of China(NSFC)(62222308,62173181,62073171,62221004)the Natural Science Foundation of Jiangsu Province(BK20200744,BK20220139)+3 种基金Jiangsu Specially-Appointed Professor(RK043STP19001)1311 Talent Plan of Nanjing University of Posts and Telecommunicationsthe Young Elite Scientists SponsorshipProgram by CAST(2021QNRC001)the Fundamental Research Funds for the Central Universities(30920032203)。
文摘This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with firstorder and second-order players,respectively.In the developed algorithms,the observed disturbance values are included in control signals to eliminate the influence of disturbances,based on which a gradient-like optimization method is implemented for each player.Second,a signum function based distributed algorithm is proposed to attenuate disturbances for games with secondorder integrator-type players.To be more specific,a signum function is involved in the proposed seeking strategy to dominate disturbances,based on which the feedback of the velocity-like states and the gradients of the functions associated with players achieves stabilization of system dynamics and optimization of players'objective functions.Through Lyapunov stability analysis,it is proven that the players'actions can approach a small region around the Nash equilibrium by utilizing disturbance observerbased strategies with appropriate control gains.Moreover,exponential(asymptotic)convergence can be achieved when the signum function based control strategy(with an adaptive control gain)is employed.The performance of the proposed algorithms is tested by utilizing an integrated simulation platform of virtual robot experimentation platform(V-REP)and MATLAB.
基金supported by the National Natural Science Foundation of China under Grant No. 61172068
文摘In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence of the decision makers in trust evaluation and collaborative decision making. A trust management mechanism based on the jury system for distributed cognitive radio networks is proposed in this paper. The "jury user" is designed to collaboratively examine the reputation of the cognitive user in the networks and to perform data fusion and spectrum allocation for distributed cognitive radio networks. Simulation analysis results show that the proposed scheme can ensure accuracy and fairness in trust evaluation and improve effectiveness and flexibility of spectrum allocation.
文摘Network resource management is critical to ensure the security and optimal performance of distributed networks and information systems. Existing technologies are not capable of managing large-scale network resources because of a lack of reusability and scalability. This paper presents a matrix grammar approach for automatic distributed network resource management to alleviate these problems. A matrix grammar is proposed using WMI, CIM, and SNMP to manage network resources, and provides a generic mechanism to describe what needs to be managed and how to manage it. A scalable distributed multi-agent architecture for automatic network resource management is proposed, at its core lies a management automation engine consisting of a matrix analyzer and a recipe processor. The proposed solution has been implemented in software and applied in industrial products that achieve good technical and industrial results. It has good extensibility, scalability, ment automation and software and enables network managereusability.
基金supported by National Basic Research Program of China(No.2010CB731903)
文摘The spatial diversity of distributed network demands the individual filter to accommodate the topology of interference environment.In this paper,a type of distributed adaptive beamformer is proposed to mitigate interference over coordinated antenna arrays network.The proposed approach is formulated as generalized sidelobe canceller(GSC)structure to facilitate the convex combination of neighboring nodes'weights,and then it is solved by unconstrained least mean square(LMS)algorithm due to simplicity.Numerical results show that the robustness and convergence rate of antenna arrays network can be significantly improved in strong interference scenario.And they also clearly illustrate that mixing vector is optimized adaptively and adjusted according to the spatial diversity of the distributed nodes which are placed in different power of received signals to interference ratio(SIR)environments.
文摘This paper introduces a hierarchical real-time environment for developing ship-bornefire-control system. Advanced computer networks are used to simulate the system with the requiredengagement scenario, including own-ship and parameters, and data processing and transmission,mission calculation, graphical supervision and gunnery ballistics outputting. The simulation systemis able to receive instruction from, or send information to the command-control center. Furthermore,the system can also be used to compare various designed schemes and analyze the accuracy andeffectiveness of the system.
基金supported by the National Key Research and Development Program of China under Grant No.2021YFB1715700the National Natural Science Foundation of China under Grant Nos.U23A20325,62173118,and 62350710214.
文摘Network localization serves as a fundamental component for enabling various position based operations in multi-agent systems,facilitating tasks like target searching and formation control by providing accurate position information for all nodes in the network.Network localization focuses on the challenge of determining the positions of nodes within a network,relying on the known positions of anchor nodes and internode relative measurements.Over the past few decades,distributed network localization has garnered significant attention from researchers.This paper aims to provide a review of main results and advancements in the field of distributed network localization,with a particular focus on the perspective of graph Laplacian.Owning to its favorable characteristics,graph Laplacian unifies various network localization,even when dealing with diverse types of internode relative measurements,into a unified protocol framework,which can be constructed by a linear method and ensure the global convergence.
基金supported in part by the National Key Research and Development Program of China(2021YFB1714800)the National Natural Science Foundation of China(62088101,61925303,62173034,U20B2073)+1 种基金the Natural Science Foundation of Chongqing(2021ZX4100027)the Deutsche Forschungsgemeinschaft(DFG,German Research Foundation)under Germanys Excellence Strategy—EXC 2075-390740016(468094890)。
文摘The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure.
基金Project supported by the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 60921063) and the National High Technology Research and Development Program of China (Grant No. 2013AA013601).
文摘Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.
文摘The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.
基金supported by National Key Research and Development Program of China under Grant 2021YFE0205300Tianjin Natural Science Foundation(19JCYBJC15700)。
文摘Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems,e.g.key leakage,impersonation attack,MitM attack and single point of failure.In this paper,a blockchain based asymmetric authentication and key agreement protocol(BC-AKA)is proposed for distributed 5G core network.In particular,the key used in the authentication process is replaced from a symmetric key to an asymmetric key,and the database used to store keys in conventional 5G core network is replaced with a blockchain network.A proof of concept system for distributed 5G core network is built based on Ethereum and ECC-Secp256 k1,and the efficiency and effectiveness of the proposed scheme are verified by the experiment results.
基金supported by the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 60921063)the Young Scientists Fund of the National Natural Science Foundation of China (Grant No. 60902010)
文摘The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.
基金supported by State Grid Science and Technology Project:Research on Key Protection Technologies for New-type Urban Distribution Network with Controllable Sources and Loads(5100-201913019A-0-0-00).
文摘In this paper,a fault location method for the petal-shaped distribution network(PSDN)with inverter-interfaced distributed generators(IIDGs)is proposed to shorten the time of manual inspection.In order to calculate the fault position,the closed-loop structure of the PSDN is skillfully exploited,and the common control strategies of IIDGs are considered.For asymmetrical faults,a fault line identification formula based on the negative-sequence current phase differences is presented,and a fault location formula only utilizing the negative-sequence current amplitudes is derived to calculated the fault position.For symmetrical faults,the positive-sequence current at both ends of lines and the current output from IIDGs are used to identify the fault line,and the positive-sequence current on multiple lines are used to pinpoint the fault position.In this method,corresponding current phasors are separated into amplitudes and phases to satisfy the limitation of communication level.The simulation results show that the error is generally less than 1%,and the accuracy of the proposed method is not affected by the fault type,fault position,fault resistance,load current,and the IIDG penetration.
文摘A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection,leading to poor performance.The method combines a fault-tolerant fault location method based on long-term and short-term memory networks to accurately locate the fault section.Then,an operation control method for relay protection based on adaptive weight and whale optimization algorithm(WOA)is used to construct an objective function considering the shortest relay protection action time and the smallest impulse current.The adaptive weight and WOA are employed to obtain the optimal strategy for relay protection operation control,reducing the action time and impulse current.Experimental results demonstrate the effectiveness of the proposed method in accurately locating faults and improving relay protection performance.The longest operation time is reduced by 4.7023 s,and the maximum impulse current is limited to 0.3 A,effectively controlling the impact of large impulse currents and enhancing control efficiency.