The unobstructed transmission line is the foundation to ensure the stable operation of the power system. The uniqueness of the power Internet of Things transmission mode makes its external ...transmission line links extremely vulnerable to interference. In order to ensure the safe and stable operation of the power Internet of Things and the power system, this paper constructs a grid transmission line operation risk response strategy and prevention mechanism based on the power Internet of Things environment, operation risk fault tree and transmission line typical operation risk early warning mechanism, and realizes the protection of the transmission line Effective control of operational risks.
In this paper, we propose a double-node-upset recoverable latch that can completely recover from all possible double-node-upsets (DNUs) with low area and low delay. The latch consists of seven ...2-input C-elements (CEs) implemented in 22nm complementary metal oxide semiconductor (CMOS) technology, making it area-efficient. The proposed latch employs the clock gating methodology and a high-speed transmission path, enabling it to perform with lower overhead in terms of transmission delay and power dissipation. Simulation results demonstrate that the proposed latch can provide complete DNU recovery. Compared with typical double-node-upset-recoverable latches, the proposed latch can save 89.74% of Area-Delay-Power Product (ADPP) on average.
In this paper, the diagnostic issues for the four-rotor unmanned aerial vehicle (UAV) with the sensor fault, the actuator fault and the composite fault are considered. Existing data-driven methods ...mostly present drawbacks of structural complexity and insufficient generalization ability. Therefore, a novel fault diagnosis scheme based on the optimized deep forest (GcForest) algorithm is put forward. According to the flight mission and mechanism of the four-rotor UAV, the six-degree-of-freedom model and fault database are established. First, the wavelet packet translation (WPT) is used for fault feature extraction. Second, the fault isolation process is achieved by the GcForest algorithm. While the optimal cascade forest internal structure parameter is obtained by the grid search optimizer. Finally, simulation studies are provided to illustrate the enhanced performance and efficiency of the proposed approach. In addition, to solve the difficulty of diagnosis with a small number of samples, simulation experiments based on multiple working conditions are performed to evaluate the generalization capability.
SPE-16 is a new 16
kDa protein that has been purified from the seeds of
Pachyrrhizus erosus. It’s N-terminal amino acid sequence shows significant sequence homology to pathogenesis-related class 10 ...proteins. cDNA encoding 150 amino acids was cloned by RT-PCR and the gene sequence proved SPE-16 to be a new member of PR-10 family. The cDNA was cloned into pET15b plasmid and expressed in
Escherichia coli. The bacterially expressed SPE-16 also demonstrated ribonuclease-like activity in vitro. Site-directed mutation of three conserved amino acids E95A, E147A, Y150A, and a P-loop truncated form were constructed and their different effects on ribonuclease activities were observed. SPE-16 is also able to bind the fluorescent probe 8-anilino-1-naphthalenesulfonate (ANS) in the native state. The ANS anion is a much-utilized “hydrophobic probe” for proteins. This binding activity indicated another biological function of SPE-16.
To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the ...security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdropper obtains the same amount of information, she must face a larger detection probability in the presented scheme than the other two, and if obtains the whole information, the detection rate of the PingPong protocol is 50%; the second protocol which used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 94%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
Multi-path routing is always the focus in wireless sensor networks. Either energy efficiency or QoS is taken into account in the existing multi-path routing, which makes the protocol not realize in ...both requirements. In this paper, the paths selection approach based on Bayesian network are introduced into the multi-path routing establishment, while two phase path selection mechanism according to Path ID and Path Ability respectively, are applied into the protocol. The simulation shows that BNSR is better than the other protocols on longivity and transmission delay.
The tunnel excavation destroys rock stress state and when concentrated stress exceeds the strength of surrounding rock, the tunnel periphery rocks will be destroyed. And the effective bearing ring ...will be soon instable and it needs to be supported. Blot-grouting support is an active support method which organically combines shotcreting support and grouting consolidation and its theoretical research achievements are less. This paper, starting from catastrophe theory, established catastrophe instability model of blot-grouting support body and it also obtained the mechanic judgment criterion of blot-grouting support body damage and the regular pattern of the point (N, q)’s motion tract in the controlling space, of which the influence to the rock stability. And the paper also judged the minimum thickness of blot-grouting support body in the point of catastrophe stability model to provide the basis for theoretical calculation and engineering application.
This paper chooses anchored support engineering of ore dynamic pressure soft rock roadway Qinan, Huaibei city as an example, and with the help of nested mechanical analysis model of anchored support ...structure, the paper analyzes the range of elastoplasticity, the range of anchor note area, stress and displacement of original rocks of the reinforced project, and simulates three-dimensional finite element numerical and underwent engineering detection of the project. Practicality and validity of quantitative control design method of anchored support structure are proved by comparing the theoretic research, calculation results, and field measurement results.
It is critical to predict the motion of surrounding vehicles for self-driving planning, especially in a socially compliant and flexible way. However, future prediction is challenging due to the ...interaction and uncertainty in driving behaviors. We propose planning-informed trajectory prediction (PiP) to tackle the prediction problem in the multi-agent setting. Our approach is differentiated from the traditional manner of prediction, which is only based on historical information and decoupled with planning. By informing the prediction process with the planning of ego vehicle, our method achieves the state-of-the-art performance of multi-agent forecasting on highway datasets. Moreover, our approach enables a novel pipeline which couples the prediction and planning, by conditioning PiP on multiple candidate trajectories of the ego vehicle, which is highly beneficial for autonomous driving in interactive scenarios.
This paper presents a distributed Demand and Response algorithm for smart grid with the objective of optimizing social-welfare. Assuming the power demand range is known or predictable ahead of time, ...our proposed distributed algorithm will calculate demand and response of all participating energy demanders and suppliers, as well as energy flow routes, in a fully distributed fashion, such that the social-welfare is optimized. During the computation, each node (e.g., demander or supplier) only needs to exchange limited rounds of messages with its neighboring nodes. It provides a potential scheme for energy trade among participants in the smart grids. Our theoretical analysis proves that the algorithm converges even if there is some random noise induced in the process of our distributed Lagrange-Newton based solution. The simulation also shows that the result is close to that of centralized solution.