1,914 research outputs found

    Bayesian Statistical Inference on Elliptical Matrix Distributions

    Get PDF
    In this paper we are concerned with Bayesian statistical inference for a class of elliptical distributions with parameters μ and Σ. Under a noninformative prior distribution, we obtain the posterior distribution, posterior mean, and generalized maximim likelihood estimators of μ and Σ. Under the entropy loss and quadratic loss, the best Bayesian estimators of Σ are derived as well. Some applications are given

    Local Cyber-physical Attack with Leveraging Detection in Smart Grid

    Full text link
    A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. However, the existing methods need to continuously attack the system for a long time, and, unfortunately, the performance cannot be guaranteed if the system states vary. To overcome this issue, we consider a new type of attack strategy called combinational attack which masks a line-outage at one position but misleads the control center on line outage at another position. Therefore, the topology information in the control center is interfered by our attack. We also offer a procedure of selecting the vulnerable lines of its kind. The proposed method can effectively and continuously deceive the control center in identifying the actual position of line-outage. The system under attack will be exposed to increasing risks as the attack continuously. Simulation results validate the efficiency of the proposed attack strategy.Comment: Accepted by IEEE SmartGridComm 201

    Development of a trench cutting re-mixing deep wall method model test device

    Get PDF
    The trench cutting re-mixing deep wall (TRD) is a new type of underground waterproof curtain. Mixing uniformity is the key index affecting the efficiency and quality of this method. However, because of many influencing factors, existing theories cannot be used to express the relationship between various factors and mixing uniformity. By analyzing the cutting and mixing process of the TRD method, the main factors affecting the uniformity of the mixing were obtained. A model test device was designed and manufactured, based on Buckingham's pi theorem. The validity of the model test device was verified through a comparative analysis of model and field test results. The model test device was demonstrated to be able to simulate the mixing process of the TRD method. The results provide guidance for promotion and better application of the TRD method

    Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

    Full text link
    Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and advanced detection mechanisms. However, a new threat called \emph{cyber-physical attacks} which jointly target both the physical and cyber layers of the system to interfere the operations of the power grid is more malicious as compared with the traditional attacks. In this paper, we propose a new cyber-physical attack strategy where the transmission line is first physically disconnected, and then the line-outage event is masked, such that the control center is misled into detecting as an obvious line outage at a different position in the local area of the power system. Therefore, the topology information in the control center is interfered by our attack. We also propose a novel procedure for selecting vulnerable lines, and analyze the observability of our proposed framework. Our proposed method can effectively and continuously deceive the control center into detecting fake line-outage positions, and thereby increase the chance of cascade failure because the attention is given to the fake outage. The simulation results validate the efficiency of our proposed attack strategy.Comment: accepted by IEEE Transactions on Smart Grid. arXiv admin note: text overlap with arXiv:1708.0320

    Genome-wide expression links the electron transfer pathway of Shewanella oneidensis to chemotaxis

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>By coupling the oxidation of organic substrates to a broad range of terminal electron acceptors (such as nitrate, metals and radionuclides), <it>Shewanella oneidensis </it>MR-1 has the ability to produce current in microbial fuel cells (MFCs). <it>omcA</it>, <it>mtrA</it>, <it>omcB </it>(also known as <it>mtrC</it>), <it>mtrB</it>, and <it>gspF </it>are some known genes of <it>S. oneidensis </it>MR-1 that participate in the process of electron transfer. How does the cell coordinate the expression of these genes? To shed light on this problem, we obtain the gene expression datasets of MR-1 that are recently public-accessible in Gene Expression Omnibus. We utilize the novel statistical method, liquid association (LA), to investigate the complex pattern of gene regulation.</p> <p>Results</p> <p>Through a web of information obtained by our data analysis, a network of transcriptional regulatory relationship between chemotaxis and electron transfer pathways is revealed, highlighting the important roles of the chemotaxis gene <it>cheA-1</it>, the magnesium transporter gene <it>mgtE-1</it>, and a triheme <it>c</it>-type cytochrome gene SO4572.</p> <p>Conclusion</p> <p>We found previously unknown relationship between chemotaxis and electron transfer using LA system. The study has the potential of helping researchers to overcome the intrinsic metabolic limitation of the microorganisms for improving power density output of an MFC.</p
    • …
    corecore