Deep learning’s widespread dependence on large datasets raises privacy concerns due to the potential presence of sensitive information.Differential privacy stands out as a crucial method for preserving privacy,garner...Deep learning’s widespread dependence on large datasets raises privacy concerns due to the potential presence of sensitive information.Differential privacy stands out as a crucial method for preserving privacy,garnering significant interest for its ability to offer robust and verifiable privacy safeguards during data training.However,classic differentially private learning introduces the same level of noise into the gradients across training iterations,which affects the trade-off between model utility and privacy guarantees.To address this issue,an adaptive differential privacy mechanism was proposed in this paper,which dynamically adjusts the privacy budget at the layer-level as training progresses to resist member inference attacks.Specifically,an equal privacy budget is initially allocated to each layer.Subsequently,as training advances,the privacy budget for layers closer to the output is reduced(adding more noise),while the budget for layers closer to the input is increased.The adjustment magnitude depends on the training iterations and is automatically determined based on the iteration count.This dynamic allocation provides a simple process for adjusting privacy budgets,alleviating the burden on users to tweak parameters and ensuring that privacy preservation strategies align with training progress.Extensive experiments on five well-known datasets indicate that the proposed method outperforms competing methods in terms of accuracy and resilience against membership inference attacks.展开更多
Definite-time zero-sequence over-current protection is presently used in systems whose neutral point is grounded by a low resistance(low-resistance grounding systems).These systems frequently malfunction owing to thei...Definite-time zero-sequence over-current protection is presently used in systems whose neutral point is grounded by a low resistance(low-resistance grounding systems).These systems frequently malfunction owing to their high settings of the action value when a high-impedance grounding fault occurs.In this study,the relationship between the zero-sequence currents of each feeder and the neutral branch was analyzed.Then,a grounding protection method was proposed on the basis of the zero-sequence current ratio coefficient.It is defined as the ratio of the zero-sequence current of the feeder to that of the neutral branch.Nonetheless,both zero-sequence voltage and zero-sequence current are affected by the transition resistance,The influence of transition resistance can be eliminated by calculating this coefficient.Therefore,a method based on the zero-sequence current ratio coefficient was proposed considering the significant difference between the faulty feeder and healthy feeder.Furthermore,unbalanced current can be prevented by setting the starting current.PSCAD simulation results reveal that the proposed method shows high reliability and sensitivity when a high-resistance grounding fault occurs.展开更多
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protectio...In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.展开更多
The paper is concerned with whether CT transient saturation, which caused by sympathetic inrush, is the direct reason for mal-operation of transformer differential relays. In order to analyze transforming characterist...The paper is concerned with whether CT transient saturation, which caused by sympathetic inrush, is the direct reason for mal-operation of transformer differential relays. In order to analyze transforming characteristics of saturated CT, the gain of each harmonic current transforming from primary winding to secondary winding of transient saturation CT is calculated. Based on the fact that series sympathetic inrush is easier to lead differential relay mal-operation than parallel sympathetic inrush, the effect of CT saturation on differential relay?in the case of both parallel sympathetic inrush and series sympathetic inrush are investigated respectively. Theory analysis and simulation show that higher harmonic will be transferred by saturated CT more easily than lower harmonic, and then the second harmonic proportion of CT secondary side is higher than that of CT primary side. Thus CT transient saturation itself is not essential reason for differential relay mal-operation. Parallel sympathetic inrush and series sympathetic inrush will lead to different location CT saturated. Parallel sympathetic inrush will lead to CT located system side saturated;second harmonic ratio of differential current increase and dead angle is large. Series sympathetic inrush will lead to CT located load side saturated;second harmonic ratio of differential current decrease and dead angle is small.展开更多
In digital substations with power transformers, the key to implementation of line differential protection is synchronization of electrical quantities at both two sides. System framework of current differential protect...In digital substations with power transformers, the key to implementation of line differential protection is synchronization of electrical quantities at both two sides. System framework of current differential protection for lines between digital substations is analyzed briefly, as well as the necessity of demand for time synchronization. Principle of time synchronization based on GPS and IEEE1588 PTP (Precision Time Protocol) are introduced. Time synchronization of current differential protection between digital substations based on IEC61850 is discussed. This paper puts forward two solution schemes of time synchronization, analyzes their advantages and disadvantages respectively, and points out that the development direction of time synchronization of differential protection between digital substations is IEEE1588 PTP.展开更多
Compared with conventional transformers, the rectiformer is special in connection mode, which is multi-tap and not equipped with the differential protection. In this paper, the differential protection algorithm for Mu...Compared with conventional transformers, the rectiformer is special in connection mode, which is multi-tap and not equipped with the differential protection. In this paper, the differential protection algorithm for Multi-tap special transformer was derived. The regulating methods for the rectiformer were studied first, and then the rectiformer model of one electrolytic aluminium plant was built by PSCAD/EMTDC, characteristics of the rectiformer bank were also analyzed. The algorithm was derived on the basis of the per-unit system, and the processing methods of the regulating transformer’s tap position information were proposed. Finally, a contrast of differential protection algorithm between the multi-tap special transformer and the conventional transformer was made.展开更多
This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various fa...This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various factors, such as the distributed capacitance, the transient response characteristics of current transformer and voltage transformer, etc. In order to overcome this problem, the proposed scheme applies HHT to improve the apparent impedance estimated by DEA. Empirical mode decomposition (EMD) is used to decompose the data set from DEA into the intrinsic mode functions (IMF) and the residue. This residue has monotonic trend and is used to evaluate the impedance of faulty line. Simulation results show that the proposed scheme improves significantly the accuracy of the estimated impedance.展开更多
This paper analyzes characteristics of multi type current transformers hybrid operation for each branch of the bus and their effects on differential protection of the bus. By theoretically analyzing transmission chara...This paper analyzes characteristics of multi type current transformers hybrid operation for each branch of the bus and their effects on differential protection of the bus. By theoretically analyzing transmission characteristics of multi type current transformers and their influence factors, we study the dynamic model testing method of multi type current transformers for the bus, and design 3 kinds of testing schemes by making the equivalent model based on the field of P-level current transformer, TPY-level current transformer and electronic current transformer, and build the hybrid operation testing platform of multi type current transformers. Finally, we compare and analyze the transmission characteristics difference of multi type current transformers on the same branch and the characteristics difference of hybrid operation in two successive external faults, analyze the cause behind the differences, and put forward the corresponding improvement measures.展开更多
This paper presents a modeling of a high-impedance bus differential protection logic using the ATP (Alternative Transients Program) MODELS language. The model is validated using ATP simulations on an electrical system...This paper presents a modeling of a high-impedance bus differential protection logic using the ATP (Alternative Transients Program) MODELS language. The model is validated using ATP simulations on an electrical system consisting of a sectionalized bus arrangement with four transmission lines (TLs) and two autotransformers. The obtained results validate the model and present some of the advantages of using this type of bus protection, such as fast and safe operation, even when under adverse conditions such as current transformers (CTs) magnetic core saturation upon the occurrence of external faults.展开更多
When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads t...When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads to an extended power failure.Based on equivalent circuit and Kirchhoff’s current law,the feeder current characteristic in the substation,AT station and sectioning post when T-R fault,F-R fault,and T-F fault occur are analyzed and their expressions are obtained.When the traction power supply system is equipped with wide-area protection measurement and control system,the feeder protection device in each station collects the feeder currents in other two stations through the wide-area protection channel and a wide-area current differential protection scheme based on the feeder current characteristic is proposed.When a short-circuit fault occurs in the power supply arm,all the feeder protection devices in each station receive the feeder currents with time stamp in other two stations.After data synchronous processing and logic judgment,the fault line of the power supply arm can be identified and isolated quickly.The simulation result based on MATLAB/Simulink shows that the power supply arm protection scheme based on wide-area current differential has good fault discrimination ability under different fault positions,transition resistances,and fault types.The verification of measured data shows that the novel protection scheme will not be affected by the special working conditions of the electrical multiple unit(EMU),and reliability,selectivity,and rapidity of relay protection are all improved.展开更多
Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the X...Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the XGBoost can improve the classification accuracy while protecting privacy information.When using CART regression tree to build a single decision tree,noise is added according to Laplace mechanism.Compared with random forest algorithm,this algorithm can reduce computation cost and prevent overfitting to a certain extent.The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data.展开更多
In this paper, a method to calculate the slope of the ratio restraint characteristic of a transformer differential relay protection is proposed. The method allows using some concise but effective means to get the slop...In this paper, a method to calculate the slope of the ratio restraint characteristic of a transformer differential relay protection is proposed. The method allows using some concise but effective means to get the slope. Modulating the argument of current output from ONLLY testing equipment can make the relay protection device operate, thus, the data used for calculation would be obtained naturally after several trails. In order to make sure how effective that method could be, some experiment data is given as well.展开更多
Based on the analysis of a specific relay model and an HVAC (high voltage alternating current) cable system, a detailed approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows to cr...Based on the analysis of a specific relay model and an HVAC (high voltage alternating current) cable system, a detailed approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows to create complex and accurate relay models derived from the original algorithms. Relay models can be applied with various systems, allowing to obtain the most optimal configuration of the protective relaying. The present paper describes modelling methodology on the basis of Siemens SIPROTEC 4 7SD522/610. Relay model was verified experimentally with its real equivalent by both EMTP-simulated and real world generated current signals connected to the relay.展开更多
To improve the resource utilization ratio and shorten the recovery time of the shared path protection with differentiated reliability (SPP-DiR) algorithm, an algorithm called dynamic shared segment protection with d...To improve the resource utilization ratio and shorten the recovery time of the shared path protection with differentiated reliability (SPP-DiR) algorithm, an algorithm called dynamic shared segment protection with differentiated reliability (DSSP-DiR) is proposed for survivable GMPLS networks. In the proposed algorithm, a primary path is dynamically divided into several segments according to the differentiated reliability requirements of the customers. In the SPP-DiR algorithm, the whole primary path should be protected, while in the DSSP- DiR algorithm, only partial segments on the primary path need to be protected, which can reduce more backup bandwidths than that in the SPP-DiR algorithm. Simulation results show that the DSSP-DiR algorithm achieves higher resource utilization ratio, lower protection failure probability, and shorter recovery time than the SPP-DiR algorithm.展开更多
Federated learning effectively alleviates privacy and security issues raised by the development of artificial intelligence through a distributed training architecture.Existing research has shown that attackers can com...Federated learning effectively alleviates privacy and security issues raised by the development of artificial intelligence through a distributed training architecture.Existing research has shown that attackers can compromise user privacy and security by stealing model parameters.Therefore,differential privacy is applied in federated learning to further address malicious issues.However,the addition of noise and the update clipping mechanism in differential privacy jointly limit the further development of federated learning in privacy protection and performance optimization.Therefore,we propose an adaptive adjusted differential privacy federated learning method.First,a dynamic adaptive privacy budget allocation strategy is proposed,which flexibly adjusts the privacy budget within a given range based on the client’s data volume and training requirements,thereby alleviating the loss of privacy budget and the magnitude of model noise.Second,a longitudinal clipping differential privacy strategy is proposed,which based on the differences in factors that affect parameter updates,uses sparse methods to trim local updates,thereby reducing the impact of privacy pruning steps on model accuracy.The two strategies work together to ensure user privacy while the effect of differential privacy on model accuracy is reduced.To evaluate the effectiveness of our method,we conducted extensive experiments on benchmark datasets,and the results showed that our proposed method performed well in terms of performance and privacy protection.展开更多
To realize dynamic statistical publishing and protection of location-based data privacy,this paper proposes a differential privacy publishing algorithm based on adaptive sampling and grid clustering and adjustment.The...To realize dynamic statistical publishing and protection of location-based data privacy,this paper proposes a differential privacy publishing algorithm based on adaptive sampling and grid clustering and adjustment.The PID control strategy is combined with the difference in data variation to realize the dynamic adjustment of the data publishing intervals.The spatial-temporal correlations of the adjacent snapshots are utilized to design the grid clustering and adjustment algorithm,which facilitates saving the execution time of the publishing process.The budget distribution and budget absorption strategies are improved to form the sliding window-based differential privacy statistical publishing algorithm,which realizes continuous statistical publishing and privacy protection and improves the accuracy of published data.Experiments and analysis on large datasets of actual locations show that the privacy protection algorithm proposed in this paper is superior to other existing algorithms in terms of the accuracy of adaptive sampling time,the availability of published data,and the execution efficiency of data publishing methods.展开更多
The differential cubature solution to the problem of a Mindlin plate lying on the Winkler foundation with two simply supported edges and two clamped edges was derived.Discrete numerical technology and shape functions ...The differential cubature solution to the problem of a Mindlin plate lying on the Winkler foundation with two simply supported edges and two clamped edges was derived.Discrete numerical technology and shape functions were used to ensure that the solution is suitable to irregular shaped plates.Then,the mechanical model and the solution were employed to model the protection layer that isolates the mining stopes from sea water in Sanshandao gold mine,which is the first subsea mine of China.Furthermore,thickness optimizations for the protection layers above each stope were conducted based on the maximum principle stress criterion,and the linear relations between the best protection layer thickness and the stope area under different safety factors were regressed to guide the isolation design.The method presented in this work provides a practical way to quickly design the isolation layer thickness in subsea mining.展开更多
In recent years,along with the rapid expansion of power grids,the increasing complication of grid structures,and the development of smart grids and energy technologies,the lightning protection of power grids becomes i...In recent years,along with the rapid expansion of power grids,the increasing complication of grid structures,and the development of smart grids and energy technologies,the lightning protection of power grids becomes increasingly prominent.Power grids of China have acquired significant achievements on lightning protection technologies,which are reviewed in this paper.A technical route of lightning protection is introduced in detail; it allows us to find problems through detection and measurement of lightning,to analyze problems through evaluation and simulation of lightning,to solve problems through lightning protection measures,and to prevent problems through hazard risk warning of lightning.Following the route,the technical breakthroughs of these four aspects in China are presented,including the chinese lightning detection network(CLDN),natural lightning observations,lightning faults detection at transmission lines,lightning current measurements,progresses in lightning distribution maps,lightning fault replays,lightning hazard risk evaluations,and lightning simulated experiments,as well as novel lightning protection measures.The practical devices and systems corresponding to the technologies mentioned above are also introduced and discussed.Due to the progress of lightning protection technologies in recent years,despite the rapidly growing length of transmission lines in China,the lightning accident rate is controlled at a certain level.展开更多
Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the s...Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the service quality of recommendation systems.In a MEC-based recommendation system,users’rating data are collected and analyzed by the edge servers.If the servers behave dishonestly or break down,users’privacy may be disclosed.To solve this issue,we design a recommendation framework that applies local differential privacy(LDP)to collaborative filtering.In the proposed framework,users’rating data are perturbed to satisfy LDP and then released to the edge servers.The edge servers perform partial computing task by using the perturbed data.The cloud computing center computes the similarity between items by using the computing results generated by edge servers.We propose a data perturbation method to protect user’s original rating values,where the Harmony mechanism is modified so as to preserve the accuracy of similarity computation.And to enhance the protection of privacy,we propose two methods to protect both users’rating values and rating behaviors.Experimental results on real-world data demonstrate that the proposed methods perform better than existing differentially private recommendation methods.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.62462022)the Hainan Province Science and Technology Special Fund(Grants No.ZDYF2022GXJS229).
文摘Deep learning’s widespread dependence on large datasets raises privacy concerns due to the potential presence of sensitive information.Differential privacy stands out as a crucial method for preserving privacy,garnering significant interest for its ability to offer robust and verifiable privacy safeguards during data training.However,classic differentially private learning introduces the same level of noise into the gradients across training iterations,which affects the trade-off between model utility and privacy guarantees.To address this issue,an adaptive differential privacy mechanism was proposed in this paper,which dynamically adjusts the privacy budget at the layer-level as training progresses to resist member inference attacks.Specifically,an equal privacy budget is initially allocated to each layer.Subsequently,as training advances,the privacy budget for layers closer to the output is reduced(adding more noise),while the budget for layers closer to the input is increased.The adjustment magnitude depends on the training iterations and is automatically determined based on the iteration count.This dynamic allocation provides a simple process for adjusting privacy budgets,alleviating the burden on users to tweak parameters and ensuring that privacy preservation strategies align with training progress.Extensive experiments on five well-known datasets indicate that the proposed method outperforms competing methods in terms of accuracy and resilience against membership inference attacks.
基金supported in part by National Key Research and Development Program of China(2016YFB0900603)Technology Projects of State Grid Corporation of China(52094017000W).
文摘Definite-time zero-sequence over-current protection is presently used in systems whose neutral point is grounded by a low resistance(low-resistance grounding systems).These systems frequently malfunction owing to their high settings of the action value when a high-impedance grounding fault occurs.In this study,the relationship between the zero-sequence currents of each feeder and the neutral branch was analyzed.Then,a grounding protection method was proposed on the basis of the zero-sequence current ratio coefficient.It is defined as the ratio of the zero-sequence current of the feeder to that of the neutral branch.Nonetheless,both zero-sequence voltage and zero-sequence current are affected by the transition resistance,The influence of transition resistance can be eliminated by calculating this coefficient.Therefore,a method based on the zero-sequence current ratio coefficient was proposed considering the significant difference between the faulty feeder and healthy feeder.Furthermore,unbalanced current can be prevented by setting the starting current.PSCAD simulation results reveal that the proposed method shows high reliability and sensitivity when a high-resistance grounding fault occurs.
基金This work is supported by Major Scientific and Technological Special Project of Guizhou Province(20183001)Research on the education mode for complicate skill students in new media with cross specialty integration(22150117092)+2 种基金Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ014)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
文摘In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV.
文摘The paper is concerned with whether CT transient saturation, which caused by sympathetic inrush, is the direct reason for mal-operation of transformer differential relays. In order to analyze transforming characteristics of saturated CT, the gain of each harmonic current transforming from primary winding to secondary winding of transient saturation CT is calculated. Based on the fact that series sympathetic inrush is easier to lead differential relay mal-operation than parallel sympathetic inrush, the effect of CT saturation on differential relay?in the case of both parallel sympathetic inrush and series sympathetic inrush are investigated respectively. Theory analysis and simulation show that higher harmonic will be transferred by saturated CT more easily than lower harmonic, and then the second harmonic proportion of CT secondary side is higher than that of CT primary side. Thus CT transient saturation itself is not essential reason for differential relay mal-operation. Parallel sympathetic inrush and series sympathetic inrush will lead to different location CT saturated. Parallel sympathetic inrush will lead to CT located system side saturated;second harmonic ratio of differential current increase and dead angle is large. Series sympathetic inrush will lead to CT located load side saturated;second harmonic ratio of differential current decrease and dead angle is small.
文摘In digital substations with power transformers, the key to implementation of line differential protection is synchronization of electrical quantities at both two sides. System framework of current differential protection for lines between digital substations is analyzed briefly, as well as the necessity of demand for time synchronization. Principle of time synchronization based on GPS and IEEE1588 PTP (Precision Time Protocol) are introduced. Time synchronization of current differential protection between digital substations based on IEC61850 is discussed. This paper puts forward two solution schemes of time synchronization, analyzes their advantages and disadvantages respectively, and points out that the development direction of time synchronization of differential protection between digital substations is IEEE1588 PTP.
文摘Compared with conventional transformers, the rectiformer is special in connection mode, which is multi-tap and not equipped with the differential protection. In this paper, the differential protection algorithm for Multi-tap special transformer was derived. The regulating methods for the rectiformer were studied first, and then the rectiformer model of one electrolytic aluminium plant was built by PSCAD/EMTDC, characteristics of the rectiformer bank were also analyzed. The algorithm was derived on the basis of the per-unit system, and the processing methods of the regulating transformer’s tap position information were proposed. Finally, a contrast of differential protection algorithm between the multi-tap special transformer and the conventional transformer was made.
文摘This paper proposed the scheme of transmission lines distance protection based on differential equation algorithms (DEA) and Hilbert-Huang transform (HHT). The measured impedance based on EDA is affected by various factors, such as the distributed capacitance, the transient response characteristics of current transformer and voltage transformer, etc. In order to overcome this problem, the proposed scheme applies HHT to improve the apparent impedance estimated by DEA. Empirical mode decomposition (EMD) is used to decompose the data set from DEA into the intrinsic mode functions (IMF) and the residue. This residue has monotonic trend and is used to evaluate the impedance of faulty line. Simulation results show that the proposed scheme improves significantly the accuracy of the estimated impedance.
文摘This paper analyzes characteristics of multi type current transformers hybrid operation for each branch of the bus and their effects on differential protection of the bus. By theoretically analyzing transmission characteristics of multi type current transformers and their influence factors, we study the dynamic model testing method of multi type current transformers for the bus, and design 3 kinds of testing schemes by making the equivalent model based on the field of P-level current transformer, TPY-level current transformer and electronic current transformer, and build the hybrid operation testing platform of multi type current transformers. Finally, we compare and analyze the transmission characteristics difference of multi type current transformers on the same branch and the characteristics difference of hybrid operation in two successive external faults, analyze the cause behind the differences, and put forward the corresponding improvement measures.
文摘This paper presents a modeling of a high-impedance bus differential protection logic using the ATP (Alternative Transients Program) MODELS language. The model is validated using ATP simulations on an electrical system consisting of a sectionalized bus arrangement with four transmission lines (TLs) and two autotransformers. The obtained results validate the model and present some of the advantages of using this type of bus protection, such as fast and safe operation, even when under adverse conditions such as current transformers (CTs) magnetic core saturation upon the occurrence of external faults.
基金supported by the Natural Science Foundation of Sichuan Province(No.2022NSFSC0405).
文摘When fault occurs on cross-coupling autotransformer(AT)power supply traction network,the up-line and down-line feeder circuit breakers in the traction substation trip at the same time without selectivity,which leads to an extended power failure.Based on equivalent circuit and Kirchhoff’s current law,the feeder current characteristic in the substation,AT station and sectioning post when T-R fault,F-R fault,and T-F fault occur are analyzed and their expressions are obtained.When the traction power supply system is equipped with wide-area protection measurement and control system,the feeder protection device in each station collects the feeder currents in other two stations through the wide-area protection channel and a wide-area current differential protection scheme based on the feeder current characteristic is proposed.When a short-circuit fault occurs in the power supply arm,all the feeder protection devices in each station receive the feeder currents with time stamp in other two stations.After data synchronous processing and logic judgment,the fault line of the power supply arm can be identified and isolated quickly.The simulation result based on MATLAB/Simulink shows that the power supply arm protection scheme based on wide-area current differential has good fault discrimination ability under different fault positions,transition resistances,and fault types.The verification of measured data shows that the novel protection scheme will not be affected by the special working conditions of the electrical multiple unit(EMU),and reliability,selectivity,and rapidity of relay protection are all improved.
基金This work is supported by the NSFC[Grant Nos.61772281,61703212,61602254]Jiangsu Province Natural Science Foundation[Grant No.BK2160968]the Priority Academic Program Development of Jiangsu Higher Edu-cation Institutions(PAPD)and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology(CICAEET).
文摘Privacy protection is a hot research topic in information security field.An improved XGBoost algorithm is proposed to protect the privacy in classification tasks.By combining with differential privacy protection,the XGBoost can improve the classification accuracy while protecting privacy information.When using CART regression tree to build a single decision tree,noise is added according to Laplace mechanism.Compared with random forest algorithm,this algorithm can reduce computation cost and prevent overfitting to a certain extent.The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data.
文摘In this paper, a method to calculate the slope of the ratio restraint characteristic of a transformer differential relay protection is proposed. The method allows using some concise but effective means to get the slope. Modulating the argument of current output from ONLLY testing equipment can make the relay protection device operate, thus, the data used for calculation would be obtained naturally after several trails. In order to make sure how effective that method could be, some experiment data is given as well.
文摘Based on the analysis of a specific relay model and an HVAC (high voltage alternating current) cable system, a detailed approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows to create complex and accurate relay models derived from the original algorithms. Relay models can be applied with various systems, allowing to obtain the most optimal configuration of the protective relaying. The present paper describes modelling methodology on the basis of Siemens SIPROTEC 4 7SD522/610. Relay model was verified experimentally with its real equivalent by both EMTP-simulated and real world generated current signals connected to the relay.
基金supported by the National Natural Science Foundation of China (60673142)Applied Basic Research Project of Sichuan Province (2006J13-067)
文摘To improve the resource utilization ratio and shorten the recovery time of the shared path protection with differentiated reliability (SPP-DiR) algorithm, an algorithm called dynamic shared segment protection with differentiated reliability (DSSP-DiR) is proposed for survivable GMPLS networks. In the proposed algorithm, a primary path is dynamically divided into several segments according to the differentiated reliability requirements of the customers. In the SPP-DiR algorithm, the whole primary path should be protected, while in the DSSP- DiR algorithm, only partial segments on the primary path need to be protected, which can reduce more backup bandwidths than that in the SPP-DiR algorithm. Simulation results show that the DSSP-DiR algorithm achieves higher resource utilization ratio, lower protection failure probability, and shorter recovery time than the SPP-DiR algorithm.
基金funded by the Science and Technology Project of State Grid Corporation of China(Research on the theory and method of multiparty encrypted computation in the edge fusion environment of power IoT,No.5700-202358592A-3-2-ZN)the National Natural Science Foundation of China(Grant Nos.62272056,62372048,62371069).
文摘Federated learning effectively alleviates privacy and security issues raised by the development of artificial intelligence through a distributed training architecture.Existing research has shown that attackers can compromise user privacy and security by stealing model parameters.Therefore,differential privacy is applied in federated learning to further address malicious issues.However,the addition of noise and the update clipping mechanism in differential privacy jointly limit the further development of federated learning in privacy protection and performance optimization.Therefore,we propose an adaptive adjusted differential privacy federated learning method.First,a dynamic adaptive privacy budget allocation strategy is proposed,which flexibly adjusts the privacy budget within a given range based on the client’s data volume and training requirements,thereby alleviating the loss of privacy budget and the magnitude of model noise.Second,a longitudinal clipping differential privacy strategy is proposed,which based on the differences in factors that affect parameter updates,uses sparse methods to trim local updates,thereby reducing the impact of privacy pruning steps on model accuracy.The two strategies work together to ensure user privacy while the effect of differential privacy on model accuracy is reduced.To evaluate the effectiveness of our method,we conducted extensive experiments on benchmark datasets,and the results showed that our proposed method performed well in terms of performance and privacy protection.
基金supported by National Nature Science Foundation of China(No.62361036)Nature Science Foundation of Gansu Province(No.22JR5RA279).
文摘To realize dynamic statistical publishing and protection of location-based data privacy,this paper proposes a differential privacy publishing algorithm based on adaptive sampling and grid clustering and adjustment.The PID control strategy is combined with the difference in data variation to realize the dynamic adjustment of the data publishing intervals.The spatial-temporal correlations of the adjacent snapshots are utilized to design the grid clustering and adjustment algorithm,which facilitates saving the execution time of the publishing process.The budget distribution and budget absorption strategies are improved to form the sliding window-based differential privacy statistical publishing algorithm,which realizes continuous statistical publishing and privacy protection and improves the accuracy of published data.Experiments and analysis on large datasets of actual locations show that the privacy protection algorithm proposed in this paper is superior to other existing algorithms in terms of the accuracy of adaptive sampling time,the availability of published data,and the execution efficiency of data publishing methods.
基金Projects(51504044,51204100)supported by National Natural Science Foundation of ChinaProject(14KF05)supported by the Research Fund of The State Key Laboratory of Coal Resources and Mine Safety,CUMT,China+3 种基金Project(cstc2016jcyj A1861)supported by the Research Fund of Chongqing Basic Science and Cutting-Edge Technology Special Projects,ChinaProject(2015CDJXY)supported by the Fundamental Research Funds for the Central UniversitiesProject supported by the China Postdoctoral Science FoundationProject(2011DA105287-MS201503)supported by the Independent Subject of State Key Laboratory of Coal Mine Disaster Dynamics and Control,China
文摘The differential cubature solution to the problem of a Mindlin plate lying on the Winkler foundation with two simply supported edges and two clamped edges was derived.Discrete numerical technology and shape functions were used to ensure that the solution is suitable to irregular shaped plates.Then,the mechanical model and the solution were employed to model the protection layer that isolates the mining stopes from sea water in Sanshandao gold mine,which is the first subsea mine of China.Furthermore,thickness optimizations for the protection layers above each stope were conducted based on the maximum principle stress criterion,and the linear relations between the best protection layer thickness and the stope area under different safety factors were regressed to guide the isolation design.The method presented in this work provides a practical way to quickly design the isolation layer thickness in subsea mining.
基金Project supported by National Basic Research Program of China (973 Program) (2011CB209400), National Fligh-tech Research and Developmerit Program of China (863 Program (2011AA040405), National Natural Science Foundation of China (Ul134106), 3551 Optics Valley Personal Plan of Wuhan East Lake High-tech Development Zone, Science and Technology Program of SGCC(SG[2009], SG[2013]).
文摘In recent years,along with the rapid expansion of power grids,the increasing complication of grid structures,and the development of smart grids and energy technologies,the lightning protection of power grids becomes increasingly prominent.Power grids of China have acquired significant achievements on lightning protection technologies,which are reviewed in this paper.A technical route of lightning protection is introduced in detail; it allows us to find problems through detection and measurement of lightning,to analyze problems through evaluation and simulation of lightning,to solve problems through lightning protection measures,and to prevent problems through hazard risk warning of lightning.Following the route,the technical breakthroughs of these four aspects in China are presented,including the chinese lightning detection network(CLDN),natural lightning observations,lightning faults detection at transmission lines,lightning current measurements,progresses in lightning distribution maps,lightning fault replays,lightning hazard risk evaluations,and lightning simulated experiments,as well as novel lightning protection measures.The practical devices and systems corresponding to the technologies mentioned above are also introduced and discussed.Due to the progress of lightning protection technologies in recent years,despite the rapidly growing length of transmission lines in China,the lightning accident rate is controlled at a certain level.
基金supported by National Natural Science Foundation of China(No.61871037)supported by Natural Science Foundation of Beijing(No.M21035).
文摘Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the service quality of recommendation systems.In a MEC-based recommendation system,users’rating data are collected and analyzed by the edge servers.If the servers behave dishonestly or break down,users’privacy may be disclosed.To solve this issue,we design a recommendation framework that applies local differential privacy(LDP)to collaborative filtering.In the proposed framework,users’rating data are perturbed to satisfy LDP and then released to the edge servers.The edge servers perform partial computing task by using the perturbed data.The cloud computing center computes the similarity between items by using the computing results generated by edge servers.We propose a data perturbation method to protect user’s original rating values,where the Harmony mechanism is modified so as to preserve the accuracy of similarity computation.And to enhance the protection of privacy,we propose two methods to protect both users’rating values and rating behaviors.Experimental results on real-world data demonstrate that the proposed methods perform better than existing differentially private recommendation methods.