{"title":"Effective Application of IoT Power Electronics Technology and Power System Optimization Control","authors":"Libo Yang;Bin Ma;Long Yuan;Bingxiang Wu","doi":"10.26599/TST.2023.9010124","DOIUrl":"https://doi.org/10.26599/TST.2023.9010124","url":null,"abstract":"With the development of society, the power system plays an important role in the global energy structure. However, facing increasing energy demand and environmental pressure, improving power system efficiency, reducing costs, and ensuring reliability and safety have become key issues. The Internet of Things (IoT) power electronics technology, as one of the research hotspots, integrates IoT and power electronics technology to achieve intelligent and optimized control of power systems through sensors, communication, and control technologies. In order to meet current and future needs, it is necessary to optimize the operation and management of power systems using IoT power electronics technology. By analyzing the application of Internet of Things power electronics technology and the optimal dispatch of power systems, support vector machine algorithms are used to analyze and process equipment data, and perform data monitoring and anomaly detection to promote energy waste reduction and energy saving, and then start from operation and maintenance respectively. Comparative simulation experiments were conducted in five aspects: efficiency, effectiveness of power load prediction and optimization control, effectiveness of intelligent monitoring, operating costs, and data security. The experimental results show that the operation and maintenance efficiency of the power system using IoT power electronics technology has been improved to only 18 h for equipment fault handling. The accuracy of load forecasting optimization control based on IoT power electronics technology reaches 94%. The fault detection accuracy of intelligent monitoring of power equipment based on the power electronics technology of the Internet of Things has reached 96%. At the same time, the Internet of Things power electronics technology was used to improve the power operation mode, so as to promote the monthly electricity sales revenue of 2.77 million RMB. In addition, the effectiveness of IoT power electronics technology in power data security management has reached 95%. In summary, IoT power electronics technology can improve the stability, reliability, and security of power systems, reduce costs, improve efficiency and management level, and has broad application and promotion prospects.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1763-1775"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10565997","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZKP Protocols for Usowan, Herugolf, and Five Cells","authors":"Daiki Miyahara;Léo Robert;Pascal Lafourcade;Takaaki Mizuki","doi":"10.26599/TST.2023.9010153","DOIUrl":"https://doi.org/10.26599/TST.2023.9010153","url":null,"abstract":"A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a line of research proposing physical instances of ZKP protocols. Up to now, many card-based ZKP protocols for pen-and-pencil puzzles, like Sudoku, have been designed. Those games, mostly edited by Nikoli, have simple rules, yet designing them in card-based ZKP protocols is non-trivial. In this work, we propose a card-based ZKP protocol for Usowan, a Nikoli game. In Usowan, for each room of a puzzle instance, there is exactly one piece of false information. The goal of the game is to detect this wrong data amongst the correct data and also to satisfy the other rules. Designing a card-based ZKP protocol to deal with the property of detecting a liar has never been done. In some sense, we propose a physical ZKP for hiding of a liar. This work extends a previous paper appearing in Ref. [1]. In this extension, we propose two other protocols, for Herugolf and Five Cells. The puzzles are specifically chosen because each of those three puzzles shares a common constraint, connectivity. However, showing the connected configuration cannot be done with generic approach and brings new construction to the existing connectivity ZKP protocol. Indeed, in Herugolf, the connectivity is handled with a given length of cell which is decremental (i.e., the length of each connected cell decreases by one at each step). For Five Cells, there is an additional step in the setup allowing to encode all the information needed to ensure a valid ZKP protocol.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1651-1666"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Concept Lattices for Numberings","authors":"Nikolay Bazhenov;Manat Mustafa;Anvar Nurakunov","doi":"10.26599/TST.2023.9010102","DOIUrl":"https://doi.org/10.26599/TST.2023.9010102","url":null,"abstract":"The theory of numberings studies uniform computations for families of mathematical objects. In this area, computability-theoretic properties of at most countable families of sets \u0000<tex>$mathcal{S}$</tex>\u0000 are typically classified via the corresponding Rogers upper semilattices. In most cases, a Rogers semilattice cannot be a lattice. Working within the framework of Formal Concept Analysis, we develop two new approaches to the classification of families \u0000<tex>$mathcal{S}$</tex>\u0000. Similarly to the classical theory of numberings, each of the approaches assigns to a family \u0000<tex>$mathcal{S}$</tex>\u0000 its own concept lattice. The first approach captures the cardinality of a family \u0000<tex>$mathcal{S}$</tex>\u0000: if \u0000<tex>$mathcal{S}$</tex>\u0000 contains more than 2 elements, then the corresponding concept lattice FC\u0000<inf>1</inf>\u0000(\u0000<tex>$mathcal{S}$</tex>\u0000) is a modular lattice of height 3, such that the number of its atoms to the cardinality of \u0000<tex>$mathcal{S}$</tex>\u0000. Our second approach gives a much richer environment. We prove that for any countable poset \u0000<tex>$P$</tex>\u0000, there exists a family \u0000<tex>$mathcal{S}$</tex>\u0000 such that the induced concept lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) is isomorphic to the Dedekind-MacNeille completion of \u0000<tex>$P$</tex>\u0000. We also establish connections with the class of enumerative lattices introduced by Hoyrup and Rojas in their studies of algorithmic randomness. We show that every lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) is anti-isomorphic to an enumerative lattice. In addition, every enumerative lattice is anti-isomorphic to a sublattice of the lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) for some family \u0000<tex>$mathcal{S}$</tex>\u0000.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1642-1650"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Transportation System Performance Analysis of Indoor and Outdoor Internet of Vehicle (IoV) Applications Towards 5G","authors":"Preeti Rani;Rohit Sharma","doi":"10.26599/TST.2023.9010119","DOIUrl":"https://doi.org/10.26599/TST.2023.9010119","url":null,"abstract":"The Internet of Vehicles (IoVs) has seen rapid development due to advances in advanced communication technologies. The 5-th Generation (5G) systems will be integrated into next-generation vehicles, enabling them to operate more efficiently by cooperating with the environment. The millimeter Wave (mmWave) technology is projected to provide a large bandwidth to meet future needs for more effective data rate communications. A viable approach for transferring raw sensor data among autonomous vehicles would be to use mmWave communication. This paper attracts various research interests in academic, indoor, and outdoor mmWave operations. This paper presents mmWave propagation measurements for indoor and outdoor at 66 GHz frequency for IoVs scenarios. The proposed model examines the equivalent path loss using Free-Space Path Loss (FSPL) based on the transmitter and receiver distances for indoor and outdoor communications of the vehicles. In the indoor scenario, path loss propagation has the lowest penetration loss, but it is ineffective in the outdoor scenario because distance increases as free space path loss increases. The probability of error is increased, concerning the transmitter and receiver distances due to propagation effect, packet collisions, busy receiver, and sensing threshold. The proposed methodology shows a higher packet delivery ratio and average throughput with less delay in the connection during transmission.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1785-1795"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10565999","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashish Bagwari;Jaganathan Logeshwaran;M. Raja;P. Devisivasankari;Jyotshana Bagwari;Vikas Rathi;Asma Mohammed Elbashir Saad
{"title":"Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment","authors":"Ashish Bagwari;Jaganathan Logeshwaran;M. Raja;P. Devisivasankari;Jyotshana Bagwari;Vikas Rathi;Asma Mohammed Elbashir Saad","doi":"10.26599/TST.2024.9010005","DOIUrl":"https://doi.org/10.26599/TST.2024.9010005","url":null,"abstract":"Currently, the 4G network service has caused massive digital growth in high use. Video calling has become the go-to Internet application for many people, downloading even huge files in minutes. Everyone is looking for and buying only 4G Subscriber Identity Module (SIM)-capable mobiles. In this case, the expectation of 5G has increased in line with 2G, 3G, and 4G, where the G stands for generation, and it does not indicate Internet or Internet speed. 5G includes next-generation features that are more advanced than those available in 4G network services. The main objective of 5G is uninterrupted telecommunication service in hybrid energy storage system. This paper proposes an intelligent networking model to obtain the maximum energy efficiency and Artificial Intelligence (AI) automation of 5G networks. There is currently an issue where the signal cuts out when crossing an area with one tower and traveling to an area with another tower. The problem of “call drop”, where the call is disconnected while talking, is not present in 5G. The proposed Intelligent Computational Model (ICM) model obtained 96.31% network speed management, 90.63% battery capacity management, 92.27% network device management, 93.57% energy efficiency, and 88.41% AI automation.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1728-1751"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Stage Submodular Maximization Under Knapsack Problem","authors":"Zhicheng Liu;Jing Jin;Donglei Du;Xiaoyan Zhang","doi":"10.26599/TST.2023.9010107","DOIUrl":"https://doi.org/10.26599/TST.2023.9010107","url":null,"abstract":"Two-stage submodular maximization problem under cardinality constraint has been widely studied in machine learning and combinatorial optimization. In this paper, we consider knapsack constraint. In this problem, we give \u0000<tex>$n$</tex>\u0000 articles and \u0000<tex>$m$</tex>\u0000 categories, and the goal is to select a subset of articles that can maximize the function \u0000<tex>$F(S)$</tex>\u0000. Function \u0000<tex>$F(S)$</tex>\u0000 consists of \u0000<tex>$m$</tex>\u0000 monotone submodular functions \u0000<tex>$f_{j}, j=1,2, ldots, m$</tex>\u0000, and each \u0000<tex>$f_{j}$</tex>\u0000 measures the similarity of each article in category \u0000<tex>$j$</tex>\u0000. We present a constant-approximation algorithm for this problem.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1703-1708"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximation Algorithms for Maximization of $k$-Submodular Function Under a Matroid Constraint","authors":"Yuezhu Liu;Yunjing Sun;Min Li","doi":"10.26599/TST.2023.9010122","DOIUrl":"https://doi.org/10.26599/TST.2023.9010122","url":null,"abstract":"In this paper, we design a deterministic 1/3-approximation algorithm for the problem of maximizing non-monotone \u0000<tex>$k$</tex>\u0000-submodular function under a matroid constraint. In order to reduce the complexity of this algorithm, we also present a randomized 1/3-approximation algorithm with the probability of \u0000<tex>$1-varepsilon$</tex>\u0000, where \u0000<tex>$varepsilon$</tex>\u0000 is the probability of algorithm failure. Moreover, we design a streaming algorithm for both monotone and non-monotone objective \u0000<tex>$k$</tex>\u0000-submodular functions.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1633-1641"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gajula Ramesh;Anil Kumar Budati;Shayla Islam;Louai A. Maghrabi;Abdullah Al-Atwai
{"title":"Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models","authors":"Gajula Ramesh;Anil Kumar Budati;Shayla Islam;Louai A. Maghrabi;Abdullah Al-Atwai","doi":"10.26599/TST.2023.9010094","DOIUrl":"https://doi.org/10.26599/TST.2023.9010094","url":null,"abstract":"In the contemporary era, driverless vehicles are a reality due to the proliferation of distributed technologies, sensing technologies, and Machine to Machine (M2M) communications. However, the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy efficient. From existing methods, it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy efficiency. However, the models focus on different aspects separately. There is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence (AI) on autonomous driving and energy efficiency. Towards this end, we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision making. It focuses on both safe driving in highway scenarios and energy efficiency. The deep learning based framework is realized with many models used for localization, path planning at high level, path planning at low level, reinforcement learning, transfer learning, power control, and speed control. With reinforcement learning, state-action-feedback play important role in decision making. Our simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1776-1784"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunming Xu;Mingfei Bai;Chenchen Wu;Qiyue Wang;Yiwei Wang
{"title":"An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages","authors":"Chunming Xu;Mingfei Bai;Chenchen Wu;Qiyue Wang;Yiwei Wang","doi":"10.26599/TST.2023.9010040","DOIUrl":"https://doi.org/10.26599/TST.2023.9010040","url":null,"abstract":"Based on the retail inventory operation of Heilan Home, this study incorporates the price factor into inventory environment involving trapezoidal time-varying products. A joint pricing and ordering issue with deteriorating items under partial backlogged shortages is firstly explored in a fixed selling cycle. The corresponding optimization model aiming at maximizing profit performance of inventory system is developed, the theoretical analysis of solving the model is further provided, and the modelling frame generalizes some inventory models in the existing studies. Then, a solving algorithm for the model is designed to determine the optimal price, initial ordering quantity, shortage time point, and the maximum inventory level. Finally, numerical examples are presented to illustrate the model, and the results show the robustness of the proposed model.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1709-1727"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu
{"title":"IIN-FFD: Intra-Inter Network for Face Forgery Detection","authors":"Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu","doi":"10.26599/TST.2024.9010022","DOIUrl":"https://doi.org/10.26599/TST.2024.9010022","url":null,"abstract":"Since different kinds of face forgeries leave similar forgery traces in videos, learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection. Therefore, to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries, we propose an intra-inter network (IIN) for face forgery detection (FFD) in videos with continual learning. The proposed IIN mainly consists of three modules, i.e., intra-module, inter-module, and forged trace masking module (FTMM). Specifically, the intra-module is trained for each kind of face forgeries by supervised learning to extract special features, while the inter-module is trained by self-supervised learning to extract the common features. As a result, the common and special features of the different forgeries are decoupled by the two feature learning modules, and then the decoupled common features can be utlized to achieve high generalization ability for FFD. Moreover, the FTMM is deployed for contrastive learning to further improve detection accuracy. The experimental results on FaceForensic++ dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in FFD. Also, the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1839-1850"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}