54 research outputs found

    Diffusion Mechanisms of Dissolved Gases in Transformer Oil Influenced with Moisture Based on Molecular Dynamics Simulation

    Get PDF
    Dissolved Gas Analysis (DGA) of insulating oil is widely used for diagnosing transformer incipient faults. Moisture is a major contaminant and degradation byproduct of transformer insulating oil. In this paper, molecular dynamics simulation was used to study the influence of moisture on the diffusion movement of dissolved gases in the insulating oil. Cycloalkanes (C20H42), alkanes (C20H38), and aromatic hydrocarbons (C20H26) are selected as the basic structural units in the constructed transformer oil simulation system. 0%, 1%, 3%, and 5% moisture molecules are added to insulating oil, respectively, and the insulating oil generates seven kinds of gas molecules through cracking. With an anhydrous model used as a benchmark, we researched the diffusion trajectory, the diffusion coefficient (D), free volume (VF), and the moisture-gas interaction energy of each gas molecule as a function of moisture content. Through this study, we found that the increase of moisture content enlarges the VFvalue of dissolved gas in insulating oil, which makes the gas in oil easier to diffuse. Besides, the moisture can also alter the mean square displacement (MSD) of dissolved gases; the mutual energy of molecules is mainly affected by the electrostatic interaction energy. This study can contribute to a better understanding of the influence of different moisture contents on the diffusion movement of dissolved gas in transformer oil from the micro level

    Collective behaviors of isotropic phoretic microswimmers: from crystalline solids to active turbulence

    Full text link
    Chemically phoretic microswimmers including Janus colloids and isotropic active droplets have recently shown great potential for self-organizing into active materials. However, the fascinating self-organization of these swimmers remains enigmatic owing to an incomplete understanding of their collective dynamics. We investigate a paradigmatic suspension of phoretic swimmers represented by isotropic phoretic disks. By varying the activity and area fraction of disks, we observe their diverse collective phenomena: formation of crystalline solids resembling Wigner crystals, melting, gas-like dynamic chaining, active transition and turbulence. Notably, altering the activity alone leads to solid-fluid phase transition and subsequently the fluid's laminar-turbulent transition. Our observations are based on large-scale simulations explicitly resolving the many-body, long-range hydrochemical interactions among the phoretic agents. We reproduce independent experimental phenomena that have not been collectively captured by a single model, emphasizing the importance of incorporating full physicochemical hydrodynamics. We develop a predictive scaling delineating the solid-liquid transition and further dissect it as a defect-mediated two-step melting scenario via a hexatic phase. We demonstrate that the fluid phase exhibits oscillatory instability with waves, transition due to wave-breaking clusters, and active turbulence manifesting vortices. These progressive scenarios evidence a closer phenomenological resemblance between active and classical fluids in their laminar-turbulent transition than previously demonstrated. Our findings elucidate the collective dynamics of phoretic agents, potentially facilitating the design of active material systems by harnessing non-equilibrium phoretic collectives

    Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Get PDF
    In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.This work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905)

    Secrecy Enhancement of Multiuser MISO Networks Using OSTBC and Artificial Noise

    Get PDF
    In this paper, we propose a novel physical layer strategy to improve the secrecy performance of multiuser multiple-input single-output networks. In this strategy, orthogonal space-time block code (OSTBC) is employed at an AAantenna base station (BS) and artificial noise (AN) is employed at an AJ-antenna cooperative relay to enhance the security level of the network. Moreover, two opportunistic scheduling schemes, namely, selection combining (SC) and scan-and-wait combining (SWC), are leveraged to select one legitimate user for data transmission. To evaluate the secrecy performance of the proposed OSTBC-SC-AN and OSTBC-SWC-AN schemes, we derive new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput. Using numerical results, we show that the OSTBC-SWC-AN scheme outperforms the OSTBC-SC-AN scheme when the switching threshold is carefully chosen. We also show that increasing AA brings down the secrecy performance in the presence of a high switching threshold.ARC Discovery Projects Grant DP150103905

    Leakage current simulations of Low Gain Avalanche Diode with improved Radiation Damage Modeling

    Full text link
    We report precise TCAD simulations of IHEP-IME-v1 Low Gain Avalanche Diode (LGAD) calibrated by secondary ion mass spectroscopy (SIMS). Our setup allows us to evaluate the leakage current, capacitance, and breakdown voltage of LGAD, which agree with measurements' results before irradiation. And we propose an improved LGAD Radiation Damage Model (LRDM) which combines local acceptor removal with global deep energy levels. The LRDM is applied to the IHEP-IME-v1 LGAD and able to predict the leakage current well at -30 ^{\circ}C after an irradiation fluence of Φeq=2.5×1015 neq/cm2 \Phi_{eq}=2.5 \times 10^{15} ~n_{eq}/cm^{2}. The charge collection efficiency (CCE) is under development

    Precision Higgs physics at the CEPC

    Get PDF
    The discovery of the Higgs boson with its mass around 125 GeV by the ATLAS and CMS Collaborations marked the beginning of a new era in high energy physics. The Higgs boson will be the subject of extensive studies of the ongoing LHC program. At the same time, lepton collider based Higgs factories have been proposed as a possible next step beyond the LHC, with its main goal to precisely measure the properties of the Higgs boson and probe potential new physics associated with the Higgs boson. The Circular Electron Positron Collider~(CEPC) is one of such proposed Higgs factories. The CEPC is an e+ee^+e^- circular collider proposed by and to be hosted in China. Located in a tunnel of approximately 100~km in circumference, it will operate at a center-of-mass energy of 240~GeV as the Higgs factory. In this paper, we present the first estimates on the precision of the Higgs boson property measurements achievable at the CEPC and discuss implications of these measurements.Comment: 46 pages, 37 figure

    Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    No full text
    In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance
    corecore