88 research outputs found
Vulnerability Assessment and Privacy-preserving Computations in Smart Grid
Modern advances in sensor, computing, and communication technologies enable various smart grid applications which highlight the vulnerability that requires novel approaches to the field of cybersecurity. While substantial numbers of technologies have been adopted to protect cyber attacks in smart grid, there lacks a comprehensive review of the implementations, impacts, and solutions of cyber attacks specific to the smart grid.In this dissertation, we are motivated to evaluate the security requirements for the smart grid which include three main properties: confidentiality, integrity, and availability. First, we review the cyber-physical security of the synchrophasor network, which highlights all three aspects of security issues. Taking the synchrophasor network as an example, we give an overview of how to attack a smart grid network. We test three types of attacks and show the impact of each attack consisting of denial-of-service attack, sniffing attack, and false data injection attack.Next, we discuss how to protect against each attack. For protecting availability, we examine possible defense strategies for the associated vulnerabilities.For protecting data integrity, a small-scale prototype of secure synchrophasor network is presented with different cryptosystems. Besides, a deep learning based time-series anomaly detector is proposed to detect injected measurement. Our approach observes both data measurements and network traffic features to jointly learn system states and can detect attacks when state vector estimator fails.For protecting data confidentiality, we propose privacy-preserving algorithms for two important smart grid applications. 1) A distributed privacy-preserving quadratic optimization algorithm to solve Security Constrained Optimal Power Flow (SCOPF) problem. The SCOPF problem is decomposed into small subproblems using the Alternating Direction Method of Multipliers (ADMM) and gradient projection algorithms. 2) We use Paillier cryptosystem to secure the computation of the power system dynamic simulation. The IEEE 3-Machine 9-Bus System is used to implement and demonstrate the proposed scheme. The security and performance analysis of our implementations demonstrate that our algorithms can prevent chosen-ciphertext attacks at a reasonable cost
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to
enhance data management in the smart grid ecosystem. To protect the privacy of
data, the utility company may choose to encrypt the data before uploading them
to the cloud. However, while encryption provides confidentiality to data, it
also sacrifices the data owners' ability to query a special segment in their
data. Searchable symmetric encryption is a technology that enables users to
store documents in ciphertext form while keeping the functionality to search
keywords in the documents. However, most state-of-the-art SSE algorithms are
only focusing on general document storage, which may become unsuitable for
smart grid applications. In this paper, we propose a simple, practical SSE
scheme that aims to protect the privacy of data generated in the smart grid.
Our scheme achieves high space complexity with small information disclosure
that was acceptable for practical smart grid application. We also implement a
prototype over the statistical data of advanced meter infrastructure to show
the effectiveness of our approach
Topological extension including quantum jump
Non-Hermitian (NH) systems and open quantum systems have always been regarded
as reliable tools in dissipative modeling. Intriguingly, in order to reduce the
model complexity, existing literature usually obtains an effective NH
Hamiltonian by ignoring the quantum jumping terms in Lindblad master equation.
However, there lacks investigation into the effects of discarded terms as well
as the unified connection between these two approaches. In this study, we
investigate the Su-Schrieffer-Heeger (SSH) model with collective loss and gain
from a topological perspective. By employing the generalized Brillouin zone
(GBZ) theory to the shape matrix, the jump absence topological properties
exhibits consistency with traditional theory, while the transitions points may
shift when jumping terms are involved. Our study provides qualitative analysis
of the impact of quantum jumping terms and reveals their unique role in quantum
systems
Excitation of atoms in an optical lattice driven by polychromatic amplitude modulation
We investigate the mutiphoton process between different Bloch states in an
amplitude modulated optical lattice. In the experiment, we perform the
modulation with more than one frequency components, which includes a high
degree of freedom and provides a flexible way to coherently control quantum
states. Based on the study of single frequency modulation, we investigate the
collaborative effect of different frequency components in two aspects. Through
double frequency modulations, the spectrums of excitation rates for different
lattice depths are measured. Moreover, interference between two separated
excitation paths is shown, emphasizing the influence of modulation phases when
two modulation frequencies are commensurate. Finally, we demonstrate the
application of the double frequency modulation to design a
large-momentum-transfer beam splitter. The beam splitter is easy in practice
and would not introduce phase shift between two arms.Comment: 11pages, 7 figure
Improving Top- N
Recommender systems become increasingly significant in solving the information explosion problem. Data sparse is a main challenge in this area. Massive unrated items constitute missing data with only a few observed ratings. Most studies consider missing data as unknown information and only use observed data to learn models and generate recommendations. However, data are missing not at random. Part of missing data is due to the fact that users choose not to rate them. This part of missing data is negative examples of user preferences. Utilizing this information is expected to leverage the performance of recommendation algorithms. Unfortunately, negative examples are mixed with unlabeled positive examples in missing data, and they are hard to be distinguished. In this paper, we propose three schemes to utilize the negative examples in missing data. The schemes are then adapted with SVD++, which is a state-of-the-art matrix factorization recommendation approach, to generate recommendations. Experimental results on two real datasets show that our proposed approaches gain better top-N performance than the baseline ones on both accuracy and diversity
Effects of Continuous Exercise on Physiological Indexes among Middle-aged and Elderly Chronic Patients in Northwest China
With the increase of aging population, accompanied by a series of aging problems, the study showed that the probability of chronic disease in the elderly population is 92.1%, and further research shows that the probability of having two or more chronic diseases is 70.0%. Therefore, understanding of the distribution and spatial-temporal variation trend of risk factors related to chronic diseases can provide scientific basis for the formulation of policies and intervention strategies for the prevention and treatment of chronic diseases. It is of urgent practical significance to improve the quality of life of the elderly and reduce the social medical burden. Analysis of the data indicated that after 1 year of continuous exercise intervention, the experimental group’s blood pressure was controlled at a normal level in nearly 2 months [90~140mmHg/100~160mmHg(SBP/DBP) ]. The results showed that moderate physical activity can reduce stress and help control blood pressure in patients with high blood pressure. After 1 year of targeted exercise intervention, the experimental group significantly improved fasting blood glucose (controlled under 7.2mmol/ liter) in nearly 2 months after the second questionnaire survey. After the exercise, the blood glucose was controlled within the normal range and gradually increased. After one year of exercise intervention, the blood lipid index of the experimental group was significantly different from that of the control group, indicating that physical exercise has a positive effect on the elderly with hyperlipemia
Effect of Resting-State fNIRS Scanning Duration on Functional Brain Connectivity and Graph Theory Metrics of Brain Network
As an emerging brain imaging technique, functional near infrared spectroscopy (fNIRS) has attracted widespread attention for advancing resting-state functional connectivity (FC) and graph theoretical analyses of brain networks. However, it remains largely unknown how the duration of the fNIRS signal scanning is related to stable and reproducible functional brain network features. To answer this question, we collected resting-state fNIRS signals (10-min duration, two runs) from 18 participants and then truncated the hemodynamic time series into 30-s time bins that ranged from 1 to 10 min. Measures of nodal efficiency, nodal betweenness, network local efficiency, global efficiency, and clustering coefficient were computed for each subject at each fNIRS signal acquisition duration. Analyses of the stability and between-run reproducibility were performed to identify optimal time length for each measure. We found that the FC, nodal efficiency and nodal betweenness stabilized and were reproducible after 1 min of fNIRS signal acquisition, whereas network clustering coefficient, local and global efficiencies stabilized after 1 min and were reproducible after 5 min of fNIRS signal acquisition for only local and global efficiencies. These quantitative results provide direct evidence regarding the choice of the resting-state fNIRS scanning duration for functional brain connectivity and topological metric stability of brain network connectivity
H2O+: An Improved Framework for Hybrid Offline-and-Online RL with Dynamics Gaps
Solving real-world complex tasks using reinforcement learning (RL) without
high-fidelity simulation environments or large amounts of offline data can be
quite challenging. Online RL agents trained in imperfect simulation
environments can suffer from severe sim-to-real issues. Offline RL approaches
although bypass the need for simulators, often pose demanding requirements on
the size and quality of the offline datasets. The recently emerged hybrid
offline-and-online RL provides an attractive framework that enables joint use
of limited offline data and imperfect simulator for transferable policy
learning. In this paper, we develop a new algorithm, called H2O+, which offers
great flexibility to bridge various choices of offline and online learning
methods, while also accounting for dynamics gaps between the real and
simulation environment. Through extensive simulation and real-world robotics
experiments, we demonstrate superior performance and flexibility over advanced
cross-domain online and offline RL algorithms
- …