In this paper,a novel contingency-aware method for N-2 security-constrained transmission expansion planning is proposed.To ensure that the transmission construction plan satisfies the N-2 security criterion,the propos...In this paper,a novel contingency-aware method for N-2 security-constrained transmission expansion planning is proposed.To ensure that the transmission construction plan satisfies the N-2 security criterion,the proposed method takes advantage of the adjustable robust optimization(ARO)framework and upgrades it.We construct a discrete uncertainty set in which component failures are treated as uncertain events that are handled as binary variables.In addition to the failure of existing lines and generators,we explicitly model the failure of candidate lines.The proposed model comprises a master problem that makes the transmission construction decision,and a series of subproblems that can detect not only the worst contingency,but also the potential contingencies.Computational studies on the IEEE RTS 24-bus and IEEE 118-bus test systems are carried out to validate the effectiveness of the proposed method.Compared with the deterministic method and ARO method in the literature,the proposed method has higher computational efficiency.展开更多
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c...An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.展开更多
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po...A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.展开更多
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le...In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station.展开更多
N-(2-Ethynylphenyl)acrylamides have emerged as key intermediates for the synthesis of complex heteropolycyclic compounds.The recent advances focus on the tandem cyclization involving these precursors,among which forma...N-(2-Ethynylphenyl)acrylamides have emerged as key intermediates for the synthesis of complex heteropolycyclic compounds.The recent advances focus on the tandem cyclization involving these precursors,among which formation of fused six/N-three,six/five(N,S,O),and six/six-membered rings are highlighted.Nitrogen,sulfur,and oxygen incorporations into five-membered rings provide efficient routes to bioactive polycyclic molecules.These cyclization reactions exhibit excellent atom economy,high efficiency,and good functional group compatibility.Furthermore,novel catalytic systems and photochemical strategies also expand the synthetic applications of these precursors.Taken together,these advancements offer versatile tools for the synthesis of intricate heterocyclic scaffolds with broad applications in organic and medicinal chemistry.展开更多
基金supported by the National Key Research and Development Plan of China(No.2016YFB0900100)National Natural Science Foundation of China(No.51807116).
文摘In this paper,a novel contingency-aware method for N-2 security-constrained transmission expansion planning is proposed.To ensure that the transmission construction plan satisfies the N-2 security criterion,the proposed method takes advantage of the adjustable robust optimization(ARO)framework and upgrades it.We construct a discrete uncertainty set in which component failures are treated as uncertain events that are handled as binary variables.In addition to the failure of existing lines and generators,we explicitly model the failure of candidate lines.The proposed model comprises a master problem that makes the transmission construction decision,and a series of subproblems that can detect not only the worst contingency,but also the potential contingencies.Computational studies on the IEEE RTS 24-bus and IEEE 118-bus test systems are carried out to validate the effectiveness of the proposed method.Compared with the deterministic method and ARO method in the literature,the proposed method has higher computational efficiency.
基金National Natural Science Foundation of China(No.61503251)Natural Science Foundation of Shanghai,China(No.16ZR1424500)
文摘An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used.
基金Supported by the National Natural Science Foundation of China(61370212)the Research Fund for the Doctoral Program of Higher Education of China(20122304130002)+1 种基金the Natural Science Foundation of Heilongjiang Province(ZD 201102)the Fundamental Research Fund for the Central Universities(HEUCFZ1213,HEUCF100601)
文摘A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.
基金supported in part by the Aerospace Science and Technology Innovation Fund of China Aerospace Science and Technology Corporationin part by the Shanghai Aerospace Science and Technology Innovation Fund (No. SAST2018045, SAST2016034, SAST2017049)+1 种基金in part by the China Fundamental Research Fund for the Central Universities (No. 3102018QD096)in part by the Seed Foundation of Innovation and Creation for Graduate Students in Northwestern Polytechnical University (No. ZZ2019024)
文摘In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station.
基金Project supported by the Special Fund Project for Scientific Research Openness of the Key Laboratory of Medical Conditioning Functional Food Processing Technology in Weihai City(No.WHYY20240006)the Mid-Young Teachers Visiting Program of Qingdao Agricultural University(No.2024)+1 种基金the General Education Reform and Research Project of Qingdao Agricultural University(No.XJY2024063)the Research Results of the Ideological and Political Education Research Project of Qingdao Agricultural University(No:QNSZ2025023)。
文摘N-(2-Ethynylphenyl)acrylamides have emerged as key intermediates for the synthesis of complex heteropolycyclic compounds.The recent advances focus on the tandem cyclization involving these precursors,among which formation of fused six/N-three,six/five(N,S,O),and six/six-membered rings are highlighted.Nitrogen,sulfur,and oxygen incorporations into five-membered rings provide efficient routes to bioactive polycyclic molecules.These cyclization reactions exhibit excellent atom economy,high efficiency,and good functional group compatibility.Furthermore,novel catalytic systems and photochemical strategies also expand the synthetic applications of these precursors.Taken together,these advancements offer versatile tools for the synthesis of intricate heterocyclic scaffolds with broad applications in organic and medicinal chemistry.