In order to help the monitoring staff in control station realize a quicker condition monitoring and a more in-time and accurate contingency reaction, a method of intelligent analysis and fault alarming system was proposed. It can be used as an advanced application module in the monitoring system of a centralized control station, realizing fast fault allocation and auxiliary fault decision-making. Meanwhile, in case of some double-circuit transmission line contingencies and other complex faults existing in centralized control stations, a method of complex fault diagnosis was also proposed in this paper. This method can effectively reduce the work intensity to the monitoring staff, and avoid accident spreading when a monitoring failure of abnormal grid status occurs.
To evaluate the effect of surgical treatment on metastatic spinal tumor.The results of surgical intervention for metastatic spinal tumor of 31 consecutive patients since October 1985 were reviewed.The average survival time was 17.6 months (range from 3 months to 9 years), and 4 patients are still alive with an average survival time of 24.6 months (range, 14 to approximately 84 months). No postoperative complication was noted. The preoperative symptoms were partially relieved and neurological functions were improved after surgery.Surgical treatment for metastatic spinal tumor could improve the life quality, but should be adopted cautiously. The surgical procedures such as decompression and internal fixation should be involved only when neurological deficits occurred. The surgery with postoperative complementary therapy may not only improve the life quality, but also extend the patients' life span.
Man-machine interface (Human Machine Interface, HMI) is known as the man-machine interface, which is the transmission of information between human and computer media.And it plays an important role in computer system design. Man-machine interface as an independent field of study is pay attention to the world widely. From the perspective of the development of computer technology, man-machine interface guide the development of the related hardware and software.
Under the guidance of 《Standard for dyke design》,this paper analyzes and discusses some technical problems arising in dyke design.The most important factor to be taken into consideration in design is the effective water head,which determines whether the dyke needs strengthening,and determines the strengthening scheme and the works quantity.Technical measures for strengthening dykes include:section enlargement;cone-probing grouting;placing impervious material on river side slope;providing outer blanket,vertical cutoff device,pressure relief ditch,pressure relief well,inner berm;increasing weight,etc..
Verifiable robust machine learning, as a new trend of ML security defense, enforces security properties (e.g., Lipschitzness, Monotonicity) on machine learning models and achieves satisfying accuracy-security trade-off. Such security properties identify a series of evasion strategies of ML security attackers and specify logical constraints on their effects on a classifier (e.g., the classifier is monotonically increasing along some feature dimensions). However, little has been done so far to understand the side effect of those security properties on the model privacy.
Abstract Cognitive radio (CR) technology allows secondary users (SUs) to opportunistically access the licensed spectrum being authorized by the primary users (PUs) and then improves the spectrum utilization. Cooperative spectrum sensing (CSS) is an important component of cognitive radio (CR) technology to detect the PU signal via spatial diversity. However, due to the open facet of CR networks (CRNs), the CSS process may suffer from Byzantine attack where malicious users (MUs) falsify the status information about the PU signal and then cause harmful interference to the PU's communication or selfishly occupy spectrum resources. Otherwise, the cooperative paradigm also results in that multiple SUs need more time to detect the PU signal. The performance and efficiency of CSS will be further degraded due to these two reasons. For this aim, we propose sequential spectrum sensing (SSS) scheme to mitigate the negative impact of Byzantine attack and improve the cooperative efficiency. To this end, encouraged by in‐depth analysis of the blind problem, we formulate a random Byzantine attack model to follow the malicious behaviors from the perspective of MUs. In order to solve the blind problem in the process of the sensing sample fusion, a delivery evaluation mechanism is developed to lay solid foundation for SSS. On this basis, we further evaluate the reputation value (RV) within a sliding window and in order to improve the cooperative efficiency in the reporting stage, we dynamically select the sensing results of the more reliable SUs as the global decision to make a tradeoff between cooperative performance and cooperative efficiency. At last, extensive simulation results show that regardless of the malicious ratio, our proposed SSS only requires 6 samples to provide with 100% detection accuracy in the presence of always attack while also the remarkable performance in the presence of random attack when the malicious ratio exceeds 50%.
In order to mitigate the cost of manpower and resource in maintenance of power distribution assets, and to deal with the inefficiency caused by the separated protection / automation system and maintenance / management system , a 4-in-1 intelligent terminal unit is proposed, which combines the functions of protection, measurement and control, online monitoring, and maintenance. It covers all the functions of a conventional distribution automation terminal unit and additionally provide maintenance functions based on multi-dimensional analysis to the online monitoring data collected through multiple sensors for temperature, mechanical characteristics, contacts movements, etc.