As global climate change intensifies,the power industry-a major source of carbon emissions-plays a pivotal role in achieving carbon peaking and neutrality goals through its low-carbon transition.Traditional power pla...As global climate change intensifies,the power industry-a major source of carbon emissions-plays a pivotal role in achieving carbon peaking and neutrality goals through its low-carbon transition.Traditional power plants’carbon management systems can no longer meet the demands of high-precision,real-time monitoring.Smart power plants now offer innovative solutions for carbon emission tracking and intelligent analysis by integrating IoT,big data,and AI technologies.Current research predominantly focuses on optimizing individual processes,lacking systematic exploration of comprehensive dynamic monitoring and intelligent decision-making across the entire workflow.To address this gap,we propose a smart carbon emission monitoring and analysis platform for power plants that integrates IoT sensing,multimodal data analytics,and AI-driven decision-making.The platform establishes a multi-source sensor network to collect emissions data throughout the fuel combustion,auxiliary equipment operation,and waste treatment processes.Combining carbon emission factor analysis with machine learning models enables real-time emission calculations and utilizes long short-term memory networks to predict future emission trends.展开更多
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ...The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.展开更多
The growing energy demand of buildings, driven by rapid urbanization, poses significant challenges for sustainable urban development. As buildings account for over 40% of global energy consumption, innovative solution...The growing energy demand of buildings, driven by rapid urbanization, poses significant challenges for sustainable urban development. As buildings account for over 40% of global energy consumption, innovative solutions are needed to improve efficiency, resilience, and environmental performance. This paper reviews the integration of Digital Twin (DT) technologies and Machine Learning (ML) for optimizing energy management in smart buildings connected to smart grids. A key enabler of this integration is the Internet of Things (IoT), which provides the sensor networks and real-time data streams that fee/d DT–ML frameworks, enabling accurate monitoring, forecasting, and adaptive control. Through this synergy, DT–ML systems enhance energy prediction, occupant comfort, and automated fault detection, while also supporting broader sustainability goals. The review examines recent advances in DT–ML energy systems, with attention to enabling technologies such as IoT sensor networks, building energy management systems, edge–cloud computing, and advanced analytics. Key challenges including data interoperability, cybersecurity, scalability, and the need for standardized frameworks are critically discussed, along with emerging solutions such as federated learning and blockchain. Special focus is given to human-centric digital twin frameworks that integrate user comfort and behavioral adaptation into energy optimization strategies. The findings suggest that DT–ML integration, enabled by IoT sensor networks, has the potential to significantly reduce energy consumption, lower operational costs, and improve resilience in urban infrastructures. The paper concludes by outlining future research priorities, including decentralized learning models, universal data standards, enhanced privacy protocols, and expanding digital twin applications for distributed renewable energy resources.展开更多
As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their characte...As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.展开更多
Chlorine, chlorine dioxide, and ozone are widely used as disinfectants in drinking water treatments. However, the combined use of different disinfectants can result in the formation of various organic and inorganic di...Chlorine, chlorine dioxide, and ozone are widely used as disinfectants in drinking water treatments. However, the combined use of different disinfectants can result in the formation of various organic and inorganic disinfection byproducts(DBPs). The toxic interactions, including synergism, addition, and antagonism, among the complex DBPs are still unclear. In this study, we established and verified a real-time cell analysis(RTCA) method for cytotoxicity measurement on Chinese hamster ovary(CHO) cell. Using this convenient and accurate method, we assessed the cytotoxicity of a series of binary combinations consisting of one of the 3 inorganic DBPs(chlorite, chlorate, and bromate) and one of the 32 regulated and emerging organic DBPs. The combination index(CI) of each combination was calculated and evaluated by isobolographic analysis to reflect the toxic interactions. The results confirmed the synergistic effect on cytotoxicity in the binary combinations consisting of chlorite and one of the 5 organic DBPs(2 iodinated DBPs(I-DBPs) and 3 brominated DBPs(Br-DBPs)), chlorate and one of the 4 organic DBPs(3 aromatic DBPs and dibromoacetonitrile), and bromate and one of the 3 organic DBPs(2 I-DBPs and dibromoacetic acid). The possible synergism mechanism of organic DBPs on the inorganic ones may be attributed to the influence of organic DBPs on cell membrane and cell antioxidant system. This study revealed the toxic interactions among organic and inorganic DBPs, and emphasized the latent adverse outcomes in the combined use of different disinfectants.展开更多
In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign met...In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.展开更多
In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation...In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.展开更多
Flood control operation,a non-engineering measure,can efficiently manage flood disasters within a river basin.However,numerous uncertainties exit in the real-time operation of flood control systems,creating risks in d...Flood control operation,a non-engineering measure,can efficiently manage flood disasters within a river basin.However,numerous uncertainties exit in the real-time operation of flood control systems,creating risks in decision-making.As an efficient tool to mitigate these risks,risk management has garnered increasing attention in real-time flood control operation.This communication offers a series of suggestions for future research concerning risk management in real-time flood control operation,including risk assessment,risk diagnosis,and risk control methods.展开更多
Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with o...Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.展开更多
A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and...A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.展开更多
Real-time electricity price(RTEP)influence factor extraction is essential to forecasting accurate power system electricity prices.At present,new electricity price forecasting models have been studied to improve predic...Real-time electricity price(RTEP)influence factor extraction is essential to forecasting accurate power system electricity prices.At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors.In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly,an augmented matrix is formulated,including RTEP influence factor data and RTEP state data.Secondly,data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius(MSR)is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method.Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.展开更多
Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. ...Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.展开更多
A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model ...A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
In this paper, a composite grid method (CGM) for finite element (FE) analysisof an electromagnetic field with strong local interest is proposed. The method is based on theregular finite element method in conjunction w...In this paper, a composite grid method (CGM) for finite element (FE) analysisof an electromagnetic field with strong local interest is proposed. The method is based on theregular finite element method in conjunction with three basic steps, i.e. global analysis, localanalysis, and modified global analysis. In the first two steps, a coarse finite element mesh is usedto analyze the global model to obtain the nodal potentials which are subsequently used asartificial boundary conditions for local regions of interest. These local regions with theprescribed boundary conditions are then analyzed with refined meshes to obtain more accuratepotential and density distribution In the third step, a modified global analysis is performed toobtain more improved solution for potential and density distribution. And iteratively, successivelyimproved solutions can be obtained until the desired accuracy is achieved. Various numericalexperiments show that CCM yields accurate solutions with significant savings in computing timecompared with the regular finite element method.展开更多
Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analys...Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security.展开更多
The ion thruster is an engine with high specific impulse for satellites and spacecrafts,which uses electric energy to boost the spacecraft.The ion optical system,also known as gate assemblies which consist of accelera...The ion thruster is an engine with high specific impulse for satellites and spacecrafts,which uses electric energy to boost the spacecraft.The ion optical system,also known as gate assemblies which consist of acceleration and screen grids,is the key component of the ion thruster.In this paper,the static mechanical properties of the C/C composite grids are evaluated based on the structural design.Representative volume element (RVE) is adopted to simplify the braded composite structure as a continuum material.The dynamical behavior of the 100 mm ion thruster optics in the launch environment (1000g shock-load) is numerically modeled and simulated with the half-sine pulse method.The impact response of the C/C and molybdenum gate assemblies on the stress distribution and deformation is investigated.The simulated results indicate that the magnitudes of the normal displacement of the composite grids subject to the uniformly distributed load are on the same level as molybdenum grids although the normal stiffness of the composite grids is much smaller.When subject to impact loading,the stress distribution in the C/C composite grids is similar to molybdenum grids while the stress magnitude is much smaller.This finding shows that the C/C gate assemblies outperform molybdenum grids and meet the requirement of long lifetime service in space travel.展开更多
In order to solve the problem of the reliability of slope engineering due to complex uncertainties, the Monte Carlo simulation method is adopted. Based on the characteristics of sparse grid, an interpolation algorithm...In order to solve the problem of the reliability of slope engineering due to complex uncertainties, the Monte Carlo simulation method is adopted. Based on the characteristics of sparse grid, an interpolation algorithm, which can be applied to high dimensional problems, is introduced. A surrogate model of high dimensional implicit function is established, which makes Monte Carlo method more adaptable. Finally, a reliability analysis method is proposed to evaluate the reliability of the slope engineering, and is applied in the Sau Mau Ping slope project in Hong Kong. The reliability analysis method has great theoretical and practical significance for engineering quality evaluation and natural disaster assessment.展开更多
The implementation of higher shares of renewables in a global energy mix has to be accompanied by simultaneous deployment of enabling smart grid technologies (SGTs). This combination will inevitably lead to a revolu...The implementation of higher shares of renewables in a global energy mix has to be accompanied by simultaneous deployment of enabling smart grid technologies (SGTs). This combination will inevitably lead to a revolutionary change in a conventional energy system, particularly, the shifting role of consumers to prosnmers. But resistance may arise from such a dramatic shift, since it is associated with high uncertainty in conjunction with increasing responsibilities of all stakeholders, the urgent need of effective control, and the development of a process. To ensure the positive influence, coherent actions of all players, and appropriate treatment of the spots of resistance, the analysis of the interplay between key stakeholders has been done. The paper introduces the framework for stakeholders' analysis, applies it on the European Union (EU) example, and provides recommendations to reduce the resistance of SGTs deployment.展开更多
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ...Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.展开更多
文摘As global climate change intensifies,the power industry-a major source of carbon emissions-plays a pivotal role in achieving carbon peaking and neutrality goals through its low-carbon transition.Traditional power plants’carbon management systems can no longer meet the demands of high-precision,real-time monitoring.Smart power plants now offer innovative solutions for carbon emission tracking and intelligent analysis by integrating IoT,big data,and AI technologies.Current research predominantly focuses on optimizing individual processes,lacking systematic exploration of comprehensive dynamic monitoring and intelligent decision-making across the entire workflow.To address this gap,we propose a smart carbon emission monitoring and analysis platform for power plants that integrates IoT sensing,multimodal data analytics,and AI-driven decision-making.The platform establishes a multi-source sensor network to collect emissions data throughout the fuel combustion,auxiliary equipment operation,and waste treatment processes.Combining carbon emission factor analysis with machine learning models enables real-time emission calculations and utilizes long short-term memory networks to predict future emission trends.
文摘The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.
文摘The growing energy demand of buildings, driven by rapid urbanization, poses significant challenges for sustainable urban development. As buildings account for over 40% of global energy consumption, innovative solutions are needed to improve efficiency, resilience, and environmental performance. This paper reviews the integration of Digital Twin (DT) technologies and Machine Learning (ML) for optimizing energy management in smart buildings connected to smart grids. A key enabler of this integration is the Internet of Things (IoT), which provides the sensor networks and real-time data streams that fee/d DT–ML frameworks, enabling accurate monitoring, forecasting, and adaptive control. Through this synergy, DT–ML systems enhance energy prediction, occupant comfort, and automated fault detection, while also supporting broader sustainability goals. The review examines recent advances in DT–ML energy systems, with attention to enabling technologies such as IoT sensor networks, building energy management systems, edge–cloud computing, and advanced analytics. Key challenges including data interoperability, cybersecurity, scalability, and the need for standardized frameworks are critically discussed, along with emerging solutions such as federated learning and blockchain. Special focus is given to human-centric digital twin frameworks that integrate user comfort and behavioral adaptation into energy optimization strategies. The findings suggest that DT–ML integration, enabled by IoT sensor networks, has the potential to significantly reduce energy consumption, lower operational costs, and improve resilience in urban infrastructures. The paper concludes by outlining future research priorities, including decentralized learning models, universal data standards, enhanced privacy protocols, and expanding digital twin applications for distributed renewable energy resources.
文摘As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.
基金supported by the National Natural Science Foundation of China (No. 21876210)。
文摘Chlorine, chlorine dioxide, and ozone are widely used as disinfectants in drinking water treatments. However, the combined use of different disinfectants can result in the formation of various organic and inorganic disinfection byproducts(DBPs). The toxic interactions, including synergism, addition, and antagonism, among the complex DBPs are still unclear. In this study, we established and verified a real-time cell analysis(RTCA) method for cytotoxicity measurement on Chinese hamster ovary(CHO) cell. Using this convenient and accurate method, we assessed the cytotoxicity of a series of binary combinations consisting of one of the 3 inorganic DBPs(chlorite, chlorate, and bromate) and one of the 32 regulated and emerging organic DBPs. The combination index(CI) of each combination was calculated and evaluated by isobolographic analysis to reflect the toxic interactions. The results confirmed the synergistic effect on cytotoxicity in the binary combinations consisting of chlorite and one of the 5 organic DBPs(2 iodinated DBPs(I-DBPs) and 3 brominated DBPs(Br-DBPs)), chlorate and one of the 4 organic DBPs(3 aromatic DBPs and dibromoacetonitrile), and bromate and one of the 3 organic DBPs(2 I-DBPs and dibromoacetic acid). The possible synergism mechanism of organic DBPs on the inorganic ones may be attributed to the influence of organic DBPs on cell membrane and cell antioxidant system. This study revealed the toxic interactions among organic and inorganic DBPs, and emphasized the latent adverse outcomes in the combined use of different disinfectants.
基金Projects(50875090,50905063) supported by the National Natural Science Foundation of ChinaProject(2009AA04Z111) supported by the National High Technology Research and Development Program of China+2 种基金Project(20090460769) supported by China Postdoctoral Science FoundationProject(2011ZM0070) supported by the Fundamental Research Funds for the Central Universities in ChinaProject(S2011010001155) supported by the Natural Science Foundation of Guangdong Province,China
文摘In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.
文摘In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.
基金supported by the National Natural Science Foundation of China(Grant No.51909062)the National Key R&D Program(Grant No.2022YFC3202801).
文摘Flood control operation,a non-engineering measure,can efficiently manage flood disasters within a river basin.However,numerous uncertainties exit in the real-time operation of flood control systems,creating risks in decision-making.As an efficient tool to mitigate these risks,risk management has garnered increasing attention in real-time flood control operation.This communication offers a series of suggestions for future research concerning risk management in real-time flood control operation,including risk assessment,risk diagnosis,and risk control methods.
文摘Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.
基金Project(51175159)supported by the National Natural Science Foundation of ChinaProject(2013WK3024)supported by the Science andTechnology Planning Program of Hunan Province,ChinaProject(CX2013B146)supported by the Hunan Provincial InnovationFoundation for Postgraduate,China
文摘A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.
基金National Natural Science Foundation of China(No.61701104)the “13th Five Year Plan” Research Foundation of Jilin Provincial Department of Education,China(No.JJKH2017018KJ)
文摘Real-time electricity price(RTEP)influence factor extraction is essential to forecasting accurate power system electricity prices.At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors.In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly,an augmented matrix is formulated,including RTEP influence factor data and RTEP state data.Secondly,data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius(MSR)is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method.Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.
文摘Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.
基金Supported by the Innovative Research Groups of the National Natural Science Foundation of China(No.51321065)the National Natural Science Foundation of China(No.51339003 and No.51439005)
文摘A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘In this paper, a composite grid method (CGM) for finite element (FE) analysisof an electromagnetic field with strong local interest is proposed. The method is based on theregular finite element method in conjunction with three basic steps, i.e. global analysis, localanalysis, and modified global analysis. In the first two steps, a coarse finite element mesh is usedto analyze the global model to obtain the nodal potentials which are subsequently used asartificial boundary conditions for local regions of interest. These local regions with theprescribed boundary conditions are then analyzed with refined meshes to obtain more accuratepotential and density distribution In the third step, a modified global analysis is performed toobtain more improved solution for potential and density distribution. And iteratively, successivelyimproved solutions can be obtained until the desired accuracy is achieved. Various numericalexperiments show that CCM yields accurate solutions with significant savings in computing timecompared with the regular finite element method.
基金supported by The National Key Research and Development Program of China (Title: Basic Theories and Methods of Analysis and Control of the Cyber Physical Systems for Power Grid (Basic Research Class 2017YFB0903000))the State Grid Science and Technology Project (Title: Research on Architecture and Several Key Technologies for Grid Cyber Physical System,No.SGRIXTKJ[2016]454)
文摘Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security.
基金Project supported by the National Key R&D Program of China(No.2018YFF01014200)the National Natural Science Foundation of China(Nos.11727804,11672347,and 51732008)
文摘The ion thruster is an engine with high specific impulse for satellites and spacecrafts,which uses electric energy to boost the spacecraft.The ion optical system,also known as gate assemblies which consist of acceleration and screen grids,is the key component of the ion thruster.In this paper,the static mechanical properties of the C/C composite grids are evaluated based on the structural design.Representative volume element (RVE) is adopted to simplify the braded composite structure as a continuum material.The dynamical behavior of the 100 mm ion thruster optics in the launch environment (1000g shock-load) is numerically modeled and simulated with the half-sine pulse method.The impact response of the C/C and molybdenum gate assemblies on the stress distribution and deformation is investigated.The simulated results indicate that the magnitudes of the normal displacement of the composite grids subject to the uniformly distributed load are on the same level as molybdenum grids although the normal stiffness of the composite grids is much smaller.When subject to impact loading,the stress distribution in the C/C composite grids is similar to molybdenum grids while the stress magnitude is much smaller.This finding shows that the C/C gate assemblies outperform molybdenum grids and meet the requirement of long lifetime service in space travel.
基金Supported by projects of China Ocean Research Mineral Resources R&D Association(COMRA)Special Foundation(DY135-R2-1-01,DY135-46)the Province/Jilin University Co-Construction Project-Funds for New Materials(SXGJSF2017-3)
文摘In order to solve the problem of the reliability of slope engineering due to complex uncertainties, the Monte Carlo simulation method is adopted. Based on the characteristics of sparse grid, an interpolation algorithm, which can be applied to high dimensional problems, is introduced. A surrogate model of high dimensional implicit function is established, which makes Monte Carlo method more adaptable. Finally, a reliability analysis method is proposed to evaluate the reliability of the slope engineering, and is applied in the Sau Mau Ping slope project in Hong Kong. The reliability analysis method has great theoretical and practical significance for engineering quality evaluation and natural disaster assessment.
文摘The implementation of higher shares of renewables in a global energy mix has to be accompanied by simultaneous deployment of enabling smart grid technologies (SGTs). This combination will inevitably lead to a revolutionary change in a conventional energy system, particularly, the shifting role of consumers to prosnmers. But resistance may arise from such a dramatic shift, since it is associated with high uncertainty in conjunction with increasing responsibilities of all stakeholders, the urgent need of effective control, and the development of a process. To ensure the positive influence, coherent actions of all players, and appropriate treatment of the spots of resistance, the analysis of the interplay between key stakeholders has been done. The paper introduces the framework for stakeholders' analysis, applies it on the European Union (EU) example, and provides recommendations to reduce the resistance of SGTs deployment.
基金supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Sk?odowska-Curie Grant Agreement(801522)Science Foundation Ireland and co-funded by the European Regional Development Fund through the ADAPT Centre for Digital Content Technology(13/RC/2106_P2)。
文摘Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.