Inter-regional power trading plays a crucial role in optimal resource utilization. However, intra-regional operation constraints are currently not well considered in practical implementation, which may lead to interna...
详细信息
Inter-regional power trading plays a crucial role in optimal resource utilization. However, intra-regional operation constraints are currently not well considered in practical implementation, which may lead to internal congestions and economic loss. In this paper, a non-iterative tie-line scheduling framework taking account of both intra- and inter-regional network constraints is proposed. Based on projection theory, admissible set of tie-line injections (ASTI) is defined as the allowable range of tie-line power injections that can be met by a regional system. Then, the ASTI is implemented in tie-line scheduling to ensure the feasibility of the tie-line schedule result for each region. Requirements for practical algorithms that calculate the ASTI in power system applications are analyzed, and a novel vertex-oriented projection algorithm is proposed to efficiently calculate the ASTI. Case studies based on several IEEE and Polish test systems verify the validity and efficiency of the proposed projection algorithm. Simulations based on a four-region system demonstrate the effectiveness of the proposed tie-line scheduling framework.
To deal with the problem of anomaly detection in multi UAVs formation, and simplify the complexity of hypothesis testing or probability inequalities, the anomaly detection problem can be transformed to identify some u...
详细信息
To deal with the problem of anomaly detection in multi UAVs formation, and simplify the complexity of hypothesis testing or probability inequalities, the anomaly detection problem can be transformed to identify some unknown parameters process. To avoid a statistical description of measurement noise, a worthwhile alternative is the bounded noise characterisation. In the presence of bounded noise, the projection algorithm with dead zone and its modified form are proposed to identify the unknown parameters, such that the robustness of projection algorithm can be enhanced by increasing a dead zone. Furthermore, dynamic programming technique is introduced to balance the desire for lower present cost with the undesirability of high future cost in determining the anomaly detector, then the cost of collecting new observations and the higher probability of accepting the wrong hypothesis can be compensated. A numerical example illustrates the characteristics of the anomaly detection problem.
For an arbitrary family of closed convex sets with nonempty intersection in a Hilbert space, we consider the classical convex feasibility problem. We study the convergence property of the recently introduced unified p...
详细信息
For an arbitrary family of closed convex sets with nonempty intersection in a Hilbert space, we consider the classical convex feasibility problem. We study the convergence property of the recently introduced unified projection algorithm B-EMOPP for solving this problem. For this, a new general control strategy is proposed, which we call the 'quasi-coercive control'. Under mild assumptions, we prove the convergence of B-EMOPP using these new control strategies as well as various other strategies. Several known results are extended and improved. The proposed algorithm is then applied to the inverse problem of image recovery.
In this paper, we propose a new modification of a three-term derivative-free projection algorithm for solving a system of monotone nonlinear equations. The global convergence was proved under some suitable conditions,...
详细信息
In this paper, we propose a new modification of a three-term derivative-free projection algorithm for solving a system of monotone nonlinear equations. The global convergence was proved under some suitable conditions, and the search direction of the proposed algorithm satisfies the sufficient descent property. Numerical computations were presented to display the efficacy of the proposed algorithm compared to some existing algorithms. Moreover, the proposed algorithm is applied to solve problems of image recovery.
In this article, we first present a projection method with outer perturbations for the split equality problem (SEP) and establish its weak convergence. Then combining the proposed projection method with the outer appr...
详细信息
In this article, we first present a projection method with outer perturbations for the split equality problem (SEP) and establish its weak convergence. Then combining the proposed projection method with the outer approximation method and Halpern iteration method, we introduce two approximation methods to solve the SEP, where the two closed convex sets are both level sets of convex functions. Finally, a preliminary experiment presented compares the approximation methods and a relaxed projection method.
The article focuses on the family of projection and reflection methods which form the basis for a class of iterative algorithms which can be used to solve the feasibility problem. It discusses the feasibility problem ...
详细信息
The article focuses on the family of projection and reflection methods which form the basis for a class of iterative algorithms which can be used to solve the feasibility problem. It discusses the feasibility problem framework and fundamental projection-type algorithms, as well as the cyclic Douglas-Rachford method. Moreover, it focuses on a theory in the presence of convex constraint sets.
One of the major software safety issues is memory leak. Moreover, detecting memory leak vulnerabilities is challenging in static analysis. Existing static detection tools find bugs by collecting programs' informat...
详细信息
ISBN:
(纸本)9781538626672
One of the major software safety issues is memory leak. Moreover, detecting memory leak vulnerabilities is challenging in static analysis. Existing static detection tools find bugs by collecting programs' information in the process of scanning source code. However, the current detection tools are weak in efficiency and accuracy, especially when the targeted program contains complex branches. This paper proposes a projection-based approach to detect memory leaks in C source code with complex control flows. According to the features of memory allocation and deallocation in C source code, this approach projects the original control flow graph of a program to a simpler one, and it reduces the analysis complexity. Besides, this paper implements a memory-leak detection tool-PML Checker, and evaluates the tool by comparing with three open-source static detection tools on both public benchmarks and study test cases. The experimental results show that PML Checker reports the most memory leak vulnerabilities among the four existing tools with complex control flows and complex data types, and PML Checker obtains higher efficiency and accuracy on public benchmarks.
We have already proposed high order tuner (HOT) which uses a smooth projection algorithm to ensure the positive definiteness of an estimated inertia matrix for realizing a stability and a good transient response of ad...
详细信息
ISBN:
(纸本)9784907764401
We have already proposed high order tuner (HOT) which uses a smooth projection algorithm to ensure the positive definiteness of an estimated inertia matrix for realizing a stability and a good transient response of adaptive tracking control system based on [7] for a rigid link robot arm. Also, we proposed a HOT capable to constrain adjustable parameters into hyper-parallelogram region [8, 9]. In this paper, an adaptive control scheme for a 2 DOF flexible link robot arm is proposed. The controller is composed of an adaptation law using smooth projection algorithm [8, 9] and a control law based on dynamic certainty equivalent principle [7, 14]. The effectiveness of the proposed scheme is illustrated by a theoretical analysis and simple numerical simulation results.
To incorporate the operating constraints of a virtual power plant(VPP)in transmission-level operation and market clearing,the concept of the VPP capability curve(VPP-CC)is proposed which explicitly characterizes the a...
详细信息
To incorporate the operating constraints of a virtual power plant(VPP)in transmission-level operation and market clearing,the concept of the VPP capability curve(VPP-CC)is proposed which explicitly characterizes the allowable range of active and reactive power outputs of a VPP.A two-step projection-based calculation framework is proposed to approximate the VPP-CC by the convex hull of critical points on its *** output of the proposed algorithm is concise and can be easily incorporated in the existing system operation and market *** studies based on the IEEE 33 and 123 test feeders show the computational efficiency of the proposed method outperforms existing methods by 4~7 ***,many fewer inequalities are needed to depict the VPP-CC while achieving the comparative approximation accuracy compared to sampling-based methods,which will relieve the communication and computation burden.
This paper provides an approach to solve the system optimal dynamic traffic assignment problem for networks with multiple O-D pairs. The path-based cell transmission model is embedded as the underlying dynamic network...
详细信息
This paper provides an approach to solve the system optimal dynamic traffic assignment problem for networks with multiple O-D pairs. The path-based cell transmission model is embedded as the underlying dynamic network loading procedure to propagate traffic. We propose a novel method to fully capture the effect of flow perturbation on total system cost and accurately compute path marginal cost for each path. This path marginal cost pattern is used in the projection algorithm to equilibrate the departure rate pattern and solve the system optimal dynamic traffic assignment. We observe that the results from projection algorithm are more reliable than those from method of successive average algorithm (MSA). Several numerical experiments are tested to illustrate the benefits of the proposed model. (C) 2014 Elsevier Ltd. All rights reserved.
暂无评论