Grid-forming control is considered to be essential in the transition to renewables-dominated power systems. However, grid-forming Type-3 wind turbine generators present unique challenges due to their electromechanical...
详细信息
This paper presents a Python-driven graphical user interface (GUI) explicitly crafted for benchmarking the electromagnetic transient (EMT) models of inverter-based resources (IBRs) across Matlab/Simulink and PSCAD/EMT...
详细信息
作者:
Anjarlekar, AmeyaEtesami, RasoulSrikant, R.Uiuc
Department of Electrical and Computer Engineering United States Uiuc
Faculty of Electrical and Computer Engineering and Industrial and Systems Engineering United States Uiuc
Faculty of Electrical and Computer Engineering United States
We address a problem involving a buyer seeking to train a logistic regression model by acquiring data from privacy-sensitive sellers. Along with compensating the sellers for their data, the buyer provides differential...
详细信息
作者:
Wang, Haozhe ZacWong, Yan TatMonash University
Department of Electrical and Computer Systems Engineering ClaytonVIC3800 Australia Monash University
Department of Electrical and Computer Systems Engineering Department of Physiology ClaytonVIC3800 Australia
Cortical visual prostheses can restore vision by directly stimulating the neurons in the visual cortex. The goal of these prostheses is to elicit sufficient light perception, known as phosphenes, to represent complex ...
详细信息
The IEEE 802.1Qbv (80.21Qbv) standard is designed for traffic requiring deterministic and bounded latencies through strict periodic time synchronization, as specified by IEEE 802.1AS standard. However, internal clock ...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural network(1DCNN)architectures to enhance ransomware detection *** common challenges in ransomware detection,particularly dataset class imbalance,the synthetic minority oversampling technique(SMOTE)is employed to generate synthetic samples for minority class,thereby improving detection *** integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features,resulting in comprehensive ransomware *** on the UNSW-NB15 dataset,the proposed ViT-1DCNN model achieved 98%detection accuracy with precision,recall,and F1-score metrics surpassing conventional *** approach not only reduces false positives and negatives but also offers scalability and robustness for real-world cybersecurity *** results demonstrate the model’s potential as an effective tool for proactive ransomware detection,especially in environments where evolving threats require adaptable and high-accuracy solutions.
The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of th...
详细信息
The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of the exact General-BranchFlow model are listed. The six formats are mathematically equivalent with each other. Linear approximation and second-order cone programming(SOCP) are then used to derive the six formats of the convex General-BranchFlow model. The branch ampacity constraints considering the shunt conductance and capacitance of the transmission line Π-model are derived. The key foundation of deriving the ampacity constraints is the correct interpretation of the physical meaning of the transmission line Π-model. An exact linear expression of the ampacity constraints of the power loss variable is derived. The applications of the General-BranchFlow model in deriving twelve formats of the exact optimal power flow(OPF) model and twelve formats of the approximate OPF model are formulated and analyzed. Using the Julia programming language, the extensive numerical investigations of all formats of the OPF models show the accuracy and computational efficiency of the General-BranchFlow model. A penalty function based approximation gap reduction method is finally proposed and numerically validated to improve the AC-feasibility of the approximate General-BranchFlow model.
We study the problem of approximately transforming a sample from a source statistical model to a sample from a target statistical model without knowing the parameters of the source model, and construct several computa...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
We consider a setting in which N agents aim to speedup a common Stochastic Approximation (SA) problem by acting in parallel and communicating with a central server. We assume that the up-link transmissions to the serv...
详细信息
暂无评论