A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to bal...
详细信息
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to balance energy supplies and demands under uncertain weather *** proposed online scheduling algorithm aims at minimizing the overall energy cost by performing actions such as load shifting and peak shaving through carefully scheduled BESS charging/discharging *** scheduling algorithm is developed by using deep deterministic policy gradient(DDPG),a deep reinforcement learning(DRL)algorithm that can deal with continuous state and action *** of the main contributions of this work is a new DDPG reward function,which is designed based on the unique behaviors of energy *** new reward function can guide the scheduler to learn the appropriate behaviors of load shifting and peak shaving through a balanced process of exploration and *** new scheduling algorithm is tested through case studies using real world data,and the results indicate that it outperforms existing algorithms such as Deep *** online algorithm can efficiently learn the behaviors of optimum non-casual off-line algorithms.
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for *** overcome these obstacles,researchers have created several network IDS models,such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning *** study provides an updated learning strategy for artificial neural network(ANN)to address data categorization problems caused by unbalanced *** to traditional approaches,the augmented ANN’s 92%accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity,brought about by the addition of a random weight and standard *** the ever-evolving nature of cybersecurity threats,this study introduces a revolutionary intrusion detection method.
The rise in popularity of wearable robotic devices has brought many opportunities in the area of assistive devices for rehabilitation. However, despite their numerous advantages, these wearable mechatronic devices are...
详细信息
The telegrapher’s equations constitute a set of linear partial differential equations that establish a mathematical correspondence between the electrical current and voltage within transmission lines, taking into acc...
详细信息
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
AC optimal power flow (AC OPF) is a fundamental problem in power system operations. Accurately modeling the network physics via the AC power flow equations makes AC OPF a challenging nonconvex problem. To search for g...
详细信息
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human *** size of the current antenna is small enough(18mm×21mm×1.6mm)todistr...
详细信息
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human *** size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast *** operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of *** the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor *** simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast.
The power systems of offshore jack-up drilling rigs consist of diesel generators running in parallel load-sharing mode, controlled by an automatic Power Management System (PMS). In this paper, the operational performa...
详细信息
暂无评论