With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr...With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.展开更多
In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in...In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.展开更多
The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper ...The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.展开更多
Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution netwo...Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.展开更多
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p...Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.展开更多
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt...Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.展开更多
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late...Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.展开更多
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i...In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.展开更多
Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neur...Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.展开更多
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz...Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.展开更多
The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches of...The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.展开更多
Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the ...Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the configuration of photovoltaic(3.8 MW),wind power(2.5 MW),energy storage(2.2 MWh),and SVC(1.2 Mvar)through interaction between upper and lower layers,and modifies lines 2–3,8–9,etc.to improve transmission capacity and voltage stability.The author uses normal distribution and Monte Carlo method to model load uncertainty,and combines Weibull distribution to describe wind speed characteristics.Compared to the traditional three-layer model(TLM),Benders decomposition-based two-layer model(BLBD)has a 58.1%reduction in convergence time(5.36 vs.12.78 h),a 51.1%reduction in iteration times(23 vs.47 times),a 8.07%reduction in total cost(12.436 vs.13.528 million yuan),and a 9.62%reduction in carbon emissions(12,456 vs.13,782 t).After optimization,the peak valley difference decreased from4.1 to 2.9MW,the renewable energy consumption rate reached 93.4%,and the energy storage efficiency was 87.6%.Themodel has been validated in the IEEE 33 node system,demonstrating its superiority in terms of economy,low-carbon,and reliability.展开更多
Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the...Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study.展开更多
The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and th...The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.展开更多
The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching network...The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.展开更多
By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets ...By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.展开更多
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th...To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.展开更多
The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one...The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.展开更多
基金supported by the Research year project of the KongjuNational University in 2025 and the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2024-00444170,Research and International Collaboration on Trust Model-Based Intelligent Incident Response Technologies in 6G Open Network Environment).
文摘With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments.
基金supported by the Science and Technology Program of China Southern Power Grid(031800KC23120003).
文摘In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.
基金supported by National Natural Science Foundation of China under Grants 62203045,62433020 and T2293770。
文摘The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.
基金This research was funded by“Chunhui Program”Collaborative Scientific Research Project of the Ministry of Education of the People’s Republic of China(Project No.HZKY20220242)the S&T Program of Hebei(Project No.225676163GH).
文摘Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.
文摘Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.
基金supported by the National Natural Science Foundation of China(12471416,12171124,12301567)the Heilongjiang Provincial Natural Science Foundation of China(PL2024F015)+2 种基金the Postdoctoral Science Foundation of Heilongjiang Province of China(LBH-Z22199)the Fundamental Research Foun-dation for Universities of Heilongjiang Province of China(2022-KYYWF-0141)the Alexander von Humboldt Foundation of Germany.
文摘Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.
基金supported by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
文摘In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.
基金supported by the National Key R&D Program of China(Grant No.2022YFA1604200)National Natural Science Foundation of China(Grant No.12261131495)+1 种基金Beijing Municipal Science and Technology Commission,Adminitrative Commission of Zhongguancun Science Park(Grant No.Z231100006623006)Institute of Systems Science,Beijing Wuzi University(Grant No.BWUISS21)。
文摘Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.
文摘Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.
基金supported by the National Natural Science Foundation of China (Grant No.62173009)the National Key Research and Development Program of China (Grant No.2021ZD0112302)。
文摘The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach.
文摘Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the configuration of photovoltaic(3.8 MW),wind power(2.5 MW),energy storage(2.2 MWh),and SVC(1.2 Mvar)through interaction between upper and lower layers,and modifies lines 2–3,8–9,etc.to improve transmission capacity and voltage stability.The author uses normal distribution and Monte Carlo method to model load uncertainty,and combines Weibull distribution to describe wind speed characteristics.Compared to the traditional three-layer model(TLM),Benders decomposition-based two-layer model(BLBD)has a 58.1%reduction in convergence time(5.36 vs.12.78 h),a 51.1%reduction in iteration times(23 vs.47 times),a 8.07%reduction in total cost(12.436 vs.13.528 million yuan),and a 9.62%reduction in carbon emissions(12,456 vs.13,782 t).After optimization,the peak valley difference decreased from4.1 to 2.9MW,the renewable energy consumption rate reached 93.4%,and the energy storage efficiency was 87.6%.Themodel has been validated in the IEEE 33 node system,demonstrating its superiority in terms of economy,low-carbon,and reliability.
基金supported by the Science and Technology Project of Sichuan Electric Power Company“Power Supply Guarantee Strategy for Urban Distribution Networks Considering Coordination with Virtual Power Plant during Extreme Weather Event”(No.521920230003).
文摘Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study.
基金The National Natural Science Foundation of China (No60574006)
文摘The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.
基金The National Natural Science Foundation of China(No.61106021)the Postdoctoral Science Foundation of China(No.2015M582541)+1 种基金the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.15KJB510020)the Research Fund of Nanjing University of Posts and Telecommunications(No.NY215140,No.NY215167)
文摘The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.
文摘By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.
基金The Natural Science Foundation of Zhejiang Province(No.Y1090232)
文摘To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.
基金China Postdoctoral Science Foundation (No.20090461048)Postdoctoral Science Foundation of Jiangsu Province (No.0901022C)Postdoctoral Science Foundation of Southeast University
文摘The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.