This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity fa...This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.展开更多
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the di...The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
目的:构建一套科学客观的能力评价体系,用于评估临床研究协调员(clinical research coordinator,CRC)在临床研究中的能力水平。方法:通过本中心既往的项目管理工作经验及文献回顾,确定CRC临床研究能力的评估指标,结合临床试验开展流程...目的:构建一套科学客观的能力评价体系,用于评估临床研究协调员(clinical research coordinator,CRC)在临床研究中的能力水平。方法:通过本中心既往的项目管理工作经验及文献回顾,确定CRC临床研究能力的评估指标,结合临床试验开展流程和项目质控结果,搭建CRC的评价体系,并将该评价体系应用于CRC在临床研究中实际工作能力的评估,验证评价体系的客观性、科学性以及可行性。结果:该评价体系结果与既往人工评估结果一致,年资和学历影响临床研究能力。结论:该评价体系能够科学客观地反映CRC的临床研究能力,为CRC的职业发展和管理层的决策提供理论基础。展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this stud...The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.展开更多
文摘This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
文摘The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.
文摘目的:构建一套科学客观的能力评价体系,用于评估临床研究协调员(clinical research coordinator,CRC)在临床研究中的能力水平。方法:通过本中心既往的项目管理工作经验及文献回顾,确定CRC临床研究能力的评估指标,结合临床试验开展流程和项目质控结果,搭建CRC的评价体系,并将该评价体系应用于CRC在临床研究中实际工作能力的评估,验证评价体系的客观性、科学性以及可行性。结果:该评价体系结果与既往人工评估结果一致,年资和学历影响临床研究能力。结论:该评价体系能够科学客观地反映CRC的临床研究能力,为CRC的职业发展和管理层的决策提供理论基础。
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.