88 research outputs found

    Vulnerability Assessment and Privacy-preserving Computations in Smart Grid

    Get PDF
    Modern advances in sensor, computing, and communication technologies enable various smart grid applications which highlight the vulnerability that requires novel approaches to the field of cybersecurity. While substantial numbers of technologies have been adopted to protect cyber attacks in smart grid, there lacks a comprehensive review of the implementations, impacts, and solutions of cyber attacks specific to the smart grid.In this dissertation, we are motivated to evaluate the security requirements for the smart grid which include three main properties: confidentiality, integrity, and availability. First, we review the cyber-physical security of the synchrophasor network, which highlights all three aspects of security issues. Taking the synchrophasor network as an example, we give an overview of how to attack a smart grid network. We test three types of attacks and show the impact of each attack consisting of denial-of-service attack, sniffing attack, and false data injection attack.Next, we discuss how to protect against each attack. For protecting availability, we examine possible defense strategies for the associated vulnerabilities.For protecting data integrity, a small-scale prototype of secure synchrophasor network is presented with different cryptosystems. Besides, a deep learning based time-series anomaly detector is proposed to detect injected measurement. Our approach observes both data measurements and network traffic features to jointly learn system states and can detect attacks when state vector estimator fails.For protecting data confidentiality, we propose privacy-preserving algorithms for two important smart grid applications. 1) A distributed privacy-preserving quadratic optimization algorithm to solve Security Constrained Optimal Power Flow (SCOPF) problem. The SCOPF problem is decomposed into small subproblems using the Alternating Direction Method of Multipliers (ADMM) and gradient projection algorithms. 2) We use Paillier cryptosystem to secure the computation of the power system dynamic simulation. The IEEE 3-Machine 9-Bus System is used to implement and demonstrate the proposed scheme. The security and performance analysis of our implementations demonstrate that our algorithms can prevent chosen-ciphertext attacks at a reasonable cost

    A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

    Full text link
    Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud. However, while encryption provides confidentiality to data, it also sacrifices the data owners' ability to query a special segment in their data. Searchable symmetric encryption is a technology that enables users to store documents in ciphertext form while keeping the functionality to search keywords in the documents. However, most state-of-the-art SSE algorithms are only focusing on general document storage, which may become unsuitable for smart grid applications. In this paper, we propose a simple, practical SSE scheme that aims to protect the privacy of data generated in the smart grid. Our scheme achieves high space complexity with small information disclosure that was acceptable for practical smart grid application. We also implement a prototype over the statistical data of advanced meter infrastructure to show the effectiveness of our approach

    Topological extension including quantum jump

    Full text link
    Non-Hermitian (NH) systems and open quantum systems have always been regarded as reliable tools in dissipative modeling. Intriguingly, in order to reduce the model complexity, existing literature usually obtains an effective NH Hamiltonian by ignoring the quantum jumping terms in Lindblad master equation. However, there lacks investigation into the effects of discarded terms as well as the unified connection between these two approaches. In this study, we investigate the Su-Schrieffer-Heeger (SSH) model with collective loss and gain from a topological perspective. By employing the generalized Brillouin zone (GBZ) theory to the shape matrix, the jump absence topological properties exhibits consistency with traditional theory, while the transitions points may shift when jumping terms are involved. Our study provides qualitative analysis of the impact of quantum jumping terms and reveals their unique role in quantum systems

    Excitation of atoms in an optical lattice driven by polychromatic amplitude modulation

    Full text link
    We investigate the mutiphoton process between different Bloch states in an amplitude modulated optical lattice. In the experiment, we perform the modulation with more than one frequency components, which includes a high degree of freedom and provides a flexible way to coherently control quantum states. Based on the study of single frequency modulation, we investigate the collaborative effect of different frequency components in two aspects. Through double frequency modulations, the spectrums of excitation rates for different lattice depths are measured. Moreover, interference between two separated excitation paths is shown, emphasizing the influence of modulation phases when two modulation frequencies are commensurate. Finally, we demonstrate the application of the double frequency modulation to design a large-momentum-transfer beam splitter. The beam splitter is easy in practice and would not introduce phase shift between two arms.Comment: 11pages, 7 figure

    Improving Top- N

    Get PDF
    Recommender systems become increasingly significant in solving the information explosion problem. Data sparse is a main challenge in this area. Massive unrated items constitute missing data with only a few observed ratings. Most studies consider missing data as unknown information and only use observed data to learn models and generate recommendations. However, data are missing not at random. Part of missing data is due to the fact that users choose not to rate them. This part of missing data is negative examples of user preferences. Utilizing this information is expected to leverage the performance of recommendation algorithms. Unfortunately, negative examples are mixed with unlabeled positive examples in missing data, and they are hard to be distinguished. In this paper, we propose three schemes to utilize the negative examples in missing data. The schemes are then adapted with SVD++, which is a state-of-the-art matrix factorization recommendation approach, to generate recommendations. Experimental results on two real datasets show that our proposed approaches gain better top-N performance than the baseline ones on both accuracy and diversity

    Effects of Continuous Exercise on Physiological Indexes among Middle-aged and Elderly Chronic Patients in Northwest China

    Get PDF
    With the increase of aging population, accompanied by a series of aging problems, the study showed that the probability of chronic disease in the elderly population is 92.1%, and further research shows that the probability of having two or more chronic diseases is 70.0%. Therefore, understanding of the distribution and spatial-temporal variation trend of risk factors related to chronic diseases can provide scientific basis for the formulation of policies and intervention strategies for the prevention and treatment of chronic diseases. It is of urgent practical significance to improve the quality of life of the elderly and reduce the social medical burden. Analysis of the data indicated that after 1 year of continuous exercise intervention, the experimental group’s blood pressure was controlled at a normal level in nearly 2 months [90~140mmHg/100~160mmHg(SBP/DBP) ]. The results showed that moderate physical activity can reduce stress and help control blood pressure in patients with high blood pressure. After 1 year of targeted exercise intervention, the experimental group significantly improved fasting blood glucose (controlled under 7.2mmol/ liter) in nearly 2 months after the second questionnaire survey. After the exercise, the blood glucose was controlled within the normal range and gradually increased. After one year of exercise intervention, the blood lipid index of the experimental group was significantly different from that of the control group, indicating that physical exercise has a positive effect on the elderly with hyperlipemia

    Effect of Resting-State fNIRS Scanning Duration on Functional Brain Connectivity and Graph Theory Metrics of Brain Network

    Get PDF
    As an emerging brain imaging technique, functional near infrared spectroscopy (fNIRS) has attracted widespread attention for advancing resting-state functional connectivity (FC) and graph theoretical analyses of brain networks. However, it remains largely unknown how the duration of the fNIRS signal scanning is related to stable and reproducible functional brain network features. To answer this question, we collected resting-state fNIRS signals (10-min duration, two runs) from 18 participants and then truncated the hemodynamic time series into 30-s time bins that ranged from 1 to 10 min. Measures of nodal efficiency, nodal betweenness, network local efficiency, global efficiency, and clustering coefficient were computed for each subject at each fNIRS signal acquisition duration. Analyses of the stability and between-run reproducibility were performed to identify optimal time length for each measure. We found that the FC, nodal efficiency and nodal betweenness stabilized and were reproducible after 1 min of fNIRS signal acquisition, whereas network clustering coefficient, local and global efficiencies stabilized after 1 min and were reproducible after 5 min of fNIRS signal acquisition for only local and global efficiencies. These quantitative results provide direct evidence regarding the choice of the resting-state fNIRS scanning duration for functional brain connectivity and topological metric stability of brain network connectivity

    H2O+: An Improved Framework for Hybrid Offline-and-Online RL with Dynamics Gaps

    Full text link
    Solving real-world complex tasks using reinforcement learning (RL) without high-fidelity simulation environments or large amounts of offline data can be quite challenging. Online RL agents trained in imperfect simulation environments can suffer from severe sim-to-real issues. Offline RL approaches although bypass the need for simulators, often pose demanding requirements on the size and quality of the offline datasets. The recently emerged hybrid offline-and-online RL provides an attractive framework that enables joint use of limited offline data and imperfect simulator for transferable policy learning. In this paper, we develop a new algorithm, called H2O+, which offers great flexibility to bridge various choices of offline and online learning methods, while also accounting for dynamics gaps between the real and simulation environment. Through extensive simulation and real-world robotics experiments, we demonstrate superior performance and flexibility over advanced cross-domain online and offline RL algorithms
    • …
    corecore