222 research outputs found

    Parallel Iteration Method for Frequency Estimation Using Trigonometric Decomposition

    Get PDF
    The parallel iteration method for frequency estimation based on trigonometric decomposition is presented. First, the multi-frequency signal can be expressed in a matrix form based on the trigonometric decomposition, which implies a possibility to solve the nonlinear mapping functions of frequency estimation by a parallel iteration procedure. Then, frequency estimation with the minimized square errors is achieved by using the gradient-descent method in the parallel iteration procedure, which can effectively restrain the interferences from harmonics and noise. Finally, the workflow is shown, and the efficiency of the proposed method was demonstrated through computer simulations and experiments

    A KIM-compliant potfit for fitting sloppy interatomic potentials : application to the EDIP model for silicon

    Get PDF
    Fitted interatomic potentials are widely used in atomistic simulations thanks to their ability to compute the energy and forces on atoms quickly. However, the simulation results crucially depend on the quality of the potential being used. Force matching is a method aimed at constructing reliable and transferable interatomic potentials by matching the forces computed by the potential as closely as possible, with those obtained from first principles calculations. The potfit program is an implementation of the force-matching method that optimizes the potential parameters using a global minimization algorithm followed by a local minimization polish. We extended potfit in two ways. First, we adapted the code to be compliant with the KIM Application Programming Interface (API) standard (part of the Knowledgebase of Interatomic Models Project). This makes it possible to use potfit to fit many KIM potential models, not just those prebuilt into the potfit code. Second, we incorporated the geodesic Levenberg–Marquardt (LM) minimization algorithm into potfit as a new local minimization algorithm. The extended potfit was tested by generating a training set using the KIM Environment-Dependent Interatomic Potential (EDIP) model for silicon and using potfit to recover the potential parameters from different initial guesses. The results show that EDIP is a “sloppy model” in the sense that its predictions are insensitive to some of its parameters, which makes fitting more difficult. We find that the geodesic LM algorithm is particularly efficient for this case. The extended potfit code is the first step in developing a KIM-based fitting framework for interatomic potentials for bulk and two-dimensional materials. The code is available for download via https://www.potfit.net

    An intelligent analysis method of security and stability control strategy based on the knowledge graph

    Get PDF
    The security and stability control system is the guarantee of the security and stability operation of the power grid. With the increasing scale of distributed new energy access to the power grid, the security and stability control strategy of the power grid is becoming more complex, and it is becoming increasingly important to correctly analyze and implement the security and stability control strategy. In order to ensure the correctness of the security and stability control strategy implemented by the security and stability control device, it is necessary to analyze the security and stability control strategy in detail. Therefore, this article proposes an intelligent analysis method of the security and stability control strategy based on the knowledge graph. First, this article introduces the ontology design method of the security and stability control strategy based on the knowledge graph, combines the characteristics and applications of the knowledge graph, analyzes the relationship between the elements of the strategy, and designs a clear-structured knowledge network. Second, this article analyzes the automatic construction technology of the graph, constructs the six-element ontology model of the security and stability control strategy, and realizes the human–computer interaction functions such as auxiliary decision making, strategy reasoning, and intelligent search based on the knowledge graph. Using artificial intelligence technology, this article takes the security and stability control strategy of a certain area’s security and stability control system as an example to model and manage. The results show that it can assist the tester to quickly retrieve the strategy, effectively improve the detection efficiency of the security and stability control strategy, avoid the omission and ambiguity caused by the manual understanding of the strategy, and ensure the accuracy and comprehensiveness of the security and stability control strategy detection

    Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Get PDF
    The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs
    • …
    corecore