This paper presents a new 3-phase multilevel inverter (MLI) based on a supercapacitor (SC) unit, which is ideal for medium and low-voltage grid-feeding photovoltaic (PV) applications since it is built to deliver nine ...
详细信息
This paper introduces a groundbreaking classification model called the Controllable Ensemble Transformer and CNN (CETC) for the analysis of medical images. The CETC model combines the powerful capabilities of convolut...
详细信息
This paper explores the utilization of alternative measures at the distribution grid level., particularly focusing on local voltage support through reactive power regulation., to identify optimal operating conditions ...
详细信息
ISBN:
(数字)9798350379730
ISBN:
(纸本)9798350379747
This paper explores the utilization of alternative measures at the distribution grid level., particularly focusing on local voltage support through reactive power regulation., to identify optimal operating conditions for enhancing Distributed Generation (DG) capacity. To address the challenge posed by the substantial increase in interconnection requests faced by utilities., largely due to the installation of new photovoltaic (PV s) systems on their distribution grids., one viable strategy involves implementing voltage control measures directly by distributed generators. This includes actions such as the absorption of reactive power by DG inverters. A range of possibilities exist., most commonly using an active power dependent reactive power characteristic or using a voltage dependent reactive power characteristic. Different operation scenarios have been examined considering all extreme states of operation of the distribution system. The study is applied for a distribution feeder of a BV IMV substation of the Greek Distribution System with high levels of installed DG capacity. The results of the analysis indicate that the coordinated voltage controls could significantly increase DG hosting capacity without the need of costly grid reinforcements. The technical and economic benefits and challenges associated with such control techniques are discussed and evaluated.
Physically unclonable functions (PUFs) are applied in hardware security applications. During the integrated circuits fabrication process, a unique response mechanism gets created these characteristics are utilized dur...
详细信息
Probabilistic Movement Primitives (ProMPs) and their variants are powerful methods for enabling robots to learn complex tasks from human demonstrations, where motion trajectories are represented as stochastic processe...
详细信息
ISBN:
(数字)9798350377705
ISBN:
(纸本)9798350377712
Probabilistic Movement Primitives (ProMPs) and their variants are powerful methods for enabling robots to learn complex tasks from human demonstrations, where motion trajectories are represented as stochastic processes with Gaussian assumptions. However, despite their computational efficiency, these methods have limited expressiveness in capturing the diversity found in human demonstrations, which are typically characterized by the multi-modality of motions. For example, when picking up an object partially obscured by an obstacle, some individuals may opt to go to the right, while others may choose the left side of the object. In this paper, we introduce Stein Movement Primitives (SMPs), a novel approach to probabilistic movement primitives. We formulate motion primitive adaptation as a non-parametric probabilistic inference using Stein Variational Gradient Descent (SVGD), thus avoiding any explicit posterior distribution assumptions and enabling the direct representation of the multi-modality in human demonstrations. We illustrate how our method can adapt robot motion to different scenarios while maintaining high similarity to the original demonstrations, even when the demonstrations are multi-modal. Experimentally, we demonstrate our approach to several domain adaptation problems using the LASA dataset and with a real robotic arm.
This paper introduces a novel two-stage adaptive supply-demand management framework for microgrids (MGs), addressing the challenges of aging asset management and dynamic energy demand-supply interaction to enhance bot...
详细信息
A new insight is given in the analysis of the standard power system stabilizer (PSS) design problem that results in some important methodology novelties. The problem is investigating in a new manner based on the compl...
ISBN:
(数字)9781837242689
A new insight is given in the analysis of the standard power system stabilizer (PSS) design problem that results in some important methodology novelties. The problem is investigating in a new manner based on the complete nonlinear model of the synchronous generator (SG), in combination with the well-known lead-lag compensator characteristics. According to the deployed theoretical analysis, a novel, simple and reliable PSS design procedure is established that is expected to contribute to the system stability and good response with clearly smooth and fast damping on the local frequency oscillatory behaviour of the SG. Following the proposed methodology, different design and gain tuning cases are examined by conducting extended simulations. All the comparisons between the results, fully confirm the theoretical analysis and indicate the superiority of the proposed design procedure.
Colorectal cancer (CRC) is the third most common malignancy and the second most deadly cancer. The most efficient way to determine CRC staging is to analyze whole slide digital pathology images;therefore, it is certai...
详细信息
Graph neural networks (GNNs) are becoming popular in various real-world applications. However, hardware-level security is a concern when GNN models are mapped to emerging neuromorphic technologies such as memristor-ba...
Graph neural networks (GNNs) are becoming popular in various real-world applications. However, hardware-level security is a concern when GNN models are mapped to emerging neuromorphic technologies such as memristor-based crossbars. These security issues can lead to malfunction of memristor-mapped GNNs. We identify a vulnerability of memristor-mapped GNNs and propose an attack mechanism based on the identified vulnerability. The proposed attack tampers memristor-mapped graph-structured data of a GNN by injecting adversarial edges to the graph and inducing slow-to-write errors in crossbars. We show that 10% adversarial edge injection induces 1.11× longer write latency, eventually leading to a 44.33% error in node classification. Experimental results for the proposed attack also show that there is a 5.72× increase in the success rate compared to a software-based baseline.
The networking industry, compared to the computer industry, has been slow in evolving from a closed ecosystem with limited abstractions to a more open ecosystem with well-defined, sophisticated, high-level abstraction...
详细信息
暂无评论