Intelligent-PID (i-PID) control proposed by Fliess is a simple control algorithm. The controller is designed based on ultra-local model, and consisted of PID type controller and derivatives of reference signal and con...
详细信息
Transient Stability Assessment (TSA) has gained increased attention as a preventative measure against grid black-outs. This paper proposes an efficient two-stage Deep Learning (DL)-based TSA strategy to provide critic...
详细信息
We develop algorithms for online linear regression which achieve optimal static and dynamic regret guarantees even in the complete absence of prior knowledge. We present a novel analysis showing that a discounted vari...
We develop algorithms for online linear regression which achieve optimal static and dynamic regret guarantees even in the complete absence of prior knowledge. We present a novel analysis showing that a discounted variant of the Vovk-Azoury-Warmuth forecaster achieves dynamic regret of the form RT(u) ≤ O (d log(T ) ∨ √dPγT (u)T ), where PγT (u) is a measure of variability of the comparator sequence, and show that the discount factor achieving this result can be learned on-the-fly. We show that this result is optimal by providing a matching lower bound. We also extend our results to strongly-adaptive guarantees which hold over every sub-interval [a, b] ⊆ [1, T ] simultaneously. Copyright 2024 by the author(s)
The recent surge in distributed energy resources has made voltage fluctuations more complex and unpredictable. Consequently, traditional voltage control (VC) methods such as stochastic programming and robust optimizat...
详细信息
The integration of the large language model (LLM) technology in electric vehicles (EVs) has sparked a significant leap forward in the evolution of intelligent transportation. LLM technology enables real-time, context-...
详细信息
The efficient and secure operation of power grids is essential for ensuring reliable electricity supply and supporting the integration of renewable energy sources. Yet, the landscape is marred by burgeoning adversaria...
详细信息
This paper proposes an engineered half-Eaton lens (EHEL) antenna for full azimuthal coverage with high gain patterns emanating from ports placed in a flat feed plane. Essentially, the lens bends rays entering from the...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approa...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approach at the PCC of ADNs using coordination of non-MPPT based ***,due to the intermittent nature of DGs coupled with PCC through uni-directional broadcast communication,the PCC becomes vulnerable to transient *** address this challenge,this study first presents a detailed mathematical model of an ADN from the perspective of PCC regulation to realize rigidness of PCC against ***,an H_(∞)controller is formulated and employed to achieve optimal performance against disturbances,consequently,ensuring the least oscillations during transients at ***,an eigenvalue analysis is presented to analyze convergence speed limitations of the newly derived system ***,simulation results show the proposed method offers superior performance as compared to the state-of-the-art methods.
The incorporation of weather variables is crucial in developing an effective demand forecasting model because electricity demand is strongly influenced by weather *** dependence of demand on weather conditions may cha...
详细信息
The incorporation of weather variables is crucial in developing an effective demand forecasting model because electricity demand is strongly influenced by weather *** dependence of demand on weather conditions may change with time during a ***,the time stamped weather information is *** this paper,a multi-layer moving window approach is proposed to incorporate the significant weather variables,which are selected using Pearson and Spearman correlation *** multi-layer moving window approach allows the layers to adjust their size to accommodate the weather variables based on their significance,which creates more flexibility and adaptability thereby improving the overall performance of the proposed ***,a recursive model is developed to forecast the demand in multi-step *** electricity demand data for the state of New South Wales,Australia are acquired from the Australian Energy Market Operator and the associated results are reported in the *** results show that the proposed approach with dynamic incorporation of weather variables is promising for day-ahead and week-ahead load demand forecasting.
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no centr...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no central *** nodes on the network mine or verify the data recorded on the *** is a distributed ledger that may be used to keep track of transactions between several *** one can tamper with the data on the blockchain since it is *** the blocks are connected by hashes,the transaction data is *** is managed by a system that is based on the consensus of network users rather than a central *** immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and ***,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s *** is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain *** paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing *** builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack *** contracts are also used to send automatic early warning replies to possible attack *** tests are used to verify the feasibility and efficacy of the suggested model.
暂无评论