This paper approaches the problem of restoring a faulted area in an electric power distribution system after locating and isolating the faulted block and reconfiguring the system. Through this paper we are going to ex...This paper approaches the problem of restoring a faulted area in an electric power distribution system after locating and isolating the faulted block and reconfiguring the system. Through this paper we are going to explain the power system restoration technique using brute-force attack method (BFAM) and binary particle swarm optimization (BPSO). This is a technique based on the possible combination in mathematical analysis which is explained in the introduction. After isolating the fault, main concentration will be towards the reconfiguration of the restored system using BPSO. Here due to fault in the system near-by agent will be affected and become useless and will go in the non-working mode. Now in order to restore these near-by loads we will give a new connection called NO (Normally Open. Using these switch system will be restored with power availability. After restoration using the BFAM, the BPSO will be used in order to provide the stable configuration. The output of the BFAM will be used as input for the BPSO and then we will reconfigure our system in order to provide the stable configuration. The effectiveness of the proposed BFAM and BPSO is demonstrated by simulating tests in a proposed distribution network and verified the results using the Matlab and C programming.展开更多
A new hybrid optimization method based on genetic algorithm(GA)and seeker optimization algorithm(SOA)is presented in this paper.The hybrid algorithm optimizes SOA by using crossover and mutation operations in GA in or...A new hybrid optimization method based on genetic algorithm(GA)and seeker optimization algorithm(SOA)is presented in this paper.The hybrid algorithm optimizes SOA by using crossover and mutation operations in GA in order to improve the global search ability of SOA.Four algorithms,i.e.particle swarm optimization(PSO),SOA,GA and quantum-behaved particle swarm optimization(GA-QPSO)and GA-SOA are used to process the simulation and experimental data of Brillouin scattering spectrum(BSS)at different temperatures.The results show that GA-SOA improves the accuracy of extracting the center frequency shift and the minimum center frequency of Brillouin scattering spectrum compared with other three algorithms.The shift error is 0.203 MHz.Therefore,GA-SOA can be applied to the accurate extraction of BSS characteristics.展开更多
图是一种非常重要的数据结构形式,被广泛用于社交网络、交通网络和搜索引擎等领域。随着图数据规模爆发式增长,存储容量受限,分布式图计算成为处理大规模图数据的焦点。宽度优先搜索(breadth first search,BFS)算法是图遍历和许多图分...图是一种非常重要的数据结构形式,被广泛用于社交网络、交通网络和搜索引擎等领域。随着图数据规模爆发式增长,存储容量受限,分布式图计算成为处理大规模图数据的焦点。宽度优先搜索(breadth first search,BFS)算法是图遍历和许多图分析算法的基础,而在分布式图计算过程中存在严重的通信开销。针对上述问题,本文提出了一种综合的数据压缩编码优化方案,结合位图和变长压缩数组,通过更高的压缩率来降低数据通信开销;此外,还提出了一种点对点异步环形通信策略,进一步降低分布式图计算中计算-通信的同步开销。通过这些优化手段,本文在8节点的分布式集群上对优化后BFS算法的性能进行了系统评估,结果表明,当图数据规模为28时,优化后的BFS算法平均性能为46.79亿条边每秒遍历(giga-traversed edges per second,GTEPS),性能比优化前提升了接近7.82%。展开更多
In real communication systems,secure and low-energy transmit scheme is very important.So far,most of schemes focus on secure transmit in special scenarios.In this paper,our goal is to propose a secure protocol in wire...In real communication systems,secure and low-energy transmit scheme is very important.So far,most of schemes focus on secure transmit in special scenarios.In this paper,our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise(AN),the imperfect receiver and imperfect channel state information(CSI)of eavesdropper,weight of beamforming(BF)vector,cooperative jammers(CJ),multiple receivers,and multiple eavesdroppers,and the analysis shows that the protocol can reduce the transmission power,and at the same time the safe reachability rate is greater than our pre-defined value,and the analysis results are in good agreement with the simulation results.In this letter,the minimal transmit power is modeled as a non-convexity optimization that is general difficult.Our method is to transform it into a two-level non-convex problem.The outer is a univariate optimization that can be solved by the golden search algorithm.The inner is a convex optimization solved by using the CVX.The solutions are further used to improve the confidentiality rate of the system,and reduce the transmit power of the system and resource consumption in terms of the imperfect CSI.Simulations show the efficiency and robustness of the proposed protocol.展开更多
文摘This paper approaches the problem of restoring a faulted area in an electric power distribution system after locating and isolating the faulted block and reconfiguring the system. Through this paper we are going to explain the power system restoration technique using brute-force attack method (BFAM) and binary particle swarm optimization (BPSO). This is a technique based on the possible combination in mathematical analysis which is explained in the introduction. After isolating the fault, main concentration will be towards the reconfiguration of the restored system using BPSO. Here due to fault in the system near-by agent will be affected and become useless and will go in the non-working mode. Now in order to restore these near-by loads we will give a new connection called NO (Normally Open. Using these switch system will be restored with power availability. After restoration using the BFAM, the BPSO will be used in order to provide the stable configuration. The output of the BFAM will be used as input for the BPSO and then we will reconfigure our system in order to provide the stable configuration. The effectiveness of the proposed BFAM and BPSO is demonstrated by simulating tests in a proposed distribution network and verified the results using the Matlab and C programming.
基金Supported by the National Natural Science Foundation of China(No.11673040,61675176,51675461)‘Xinrui Gongcheng’ Talent Project of Yanshan University of Chinathe China Scholarship Council(No.201708130010)
文摘A new hybrid optimization method based on genetic algorithm(GA)and seeker optimization algorithm(SOA)is presented in this paper.The hybrid algorithm optimizes SOA by using crossover and mutation operations in GA in order to improve the global search ability of SOA.Four algorithms,i.e.particle swarm optimization(PSO),SOA,GA and quantum-behaved particle swarm optimization(GA-QPSO)and GA-SOA are used to process the simulation and experimental data of Brillouin scattering spectrum(BSS)at different temperatures.The results show that GA-SOA improves the accuracy of extracting the center frequency shift and the minimum center frequency of Brillouin scattering spectrum compared with other three algorithms.The shift error is 0.203 MHz.Therefore,GA-SOA can be applied to the accurate extraction of BSS characteristics.
文摘图是一种非常重要的数据结构形式,被广泛用于社交网络、交通网络和搜索引擎等领域。随着图数据规模爆发式增长,存储容量受限,分布式图计算成为处理大规模图数据的焦点。宽度优先搜索(breadth first search,BFS)算法是图遍历和许多图分析算法的基础,而在分布式图计算过程中存在严重的通信开销。针对上述问题,本文提出了一种综合的数据压缩编码优化方案,结合位图和变长压缩数组,通过更高的压缩率来降低数据通信开销;此外,还提出了一种点对点异步环形通信策略,进一步降低分布式图计算中计算-通信的同步开销。通过这些优化手段,本文在8节点的分布式集群上对优化后BFS算法的性能进行了系统评估,结果表明,当图数据规模为28时,优化后的BFS算法平均性能为46.79亿条边每秒遍历(giga-traversed edges per second,GTEPS),性能比优化前提升了接近7.82%。
基金This work was supported by the national natural Science Foundation of China(no.62172341)Fundamental Research Funds for the Central Universities(no.2682014CX095).
文摘In real communication systems,secure and low-energy transmit scheme is very important.So far,most of schemes focus on secure transmit in special scenarios.In this paper,our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise(AN),the imperfect receiver and imperfect channel state information(CSI)of eavesdropper,weight of beamforming(BF)vector,cooperative jammers(CJ),multiple receivers,and multiple eavesdroppers,and the analysis shows that the protocol can reduce the transmission power,and at the same time the safe reachability rate is greater than our pre-defined value,and the analysis results are in good agreement with the simulation results.In this letter,the minimal transmit power is modeled as a non-convexity optimization that is general difficult.Our method is to transform it into a two-level non-convex problem.The outer is a univariate optimization that can be solved by the golden search algorithm.The inner is a convex optimization solved by using the CVX.The solutions are further used to improve the confidentiality rate of the system,and reduce the transmit power of the system and resource consumption in terms of the imperfect CSI.Simulations show the efficiency and robustness of the proposed protocol.