The widespread adoption of renewable energy sources presents significant challenges for power system *** paper proposes a dynamic optimal power flow(DOPF)method based on reinforcement learning(RL)to ad-dress the dispa...
详细信息
The widespread adoption of renewable energy sources presents significant challenges for power system *** paper proposes a dynamic optimal power flow(DOPF)method based on reinforcement learning(RL)to ad-dress the dispatching *** proposed method consid-ers a scenario where large-scale offshore wind farms are inter-connected and have access to an onshore power grid through multiple points of common coupling(PCCs).First,the opera-tional area model of the offshore power grid at the PCCs is es-tablished by combining the prediction results and the transmis-sion capacity limit of the offshore power *** upon this,a dynamic optimization model of the power system and its RL en-vironment are constructed with the consideration of offshore power dispatching ***,an improved algorithm based on the conditional generative adversarial network(CGAN)and the soft actor-critic(SAC)algorithm is *** analyzing an improved IEEE 118-node system,the proposed method proves to have the advantage of economy over a longer *** resulting strategy satisfies power system opera-tion constraints,effectively addressing the constraint problem of action space of RL,and it has the added benefit of faster so-lution speeds.
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditional knowledge-based power system dynamic modeling methods are faced with unprecedented ***-driven modeling has been increasingly studied in recent years because of its lesser need for prior knowledge,higher capability of handling large-scale systems,and better adaptability to variations of system operating *** paper discusses about the motivations and the generalized process of datadriven modeling,and provides a comprehensive overview of various state-of-the-art techniques and *** also comparatively presents the advantages and disadvantages of these methods and provides insight into outstanding challenges and possible research directions for the future.
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
Transient stability analysis (TSA) of synchronous generators (SGs) is essential for reliable operation of electrical systems. Conventionally, the equal area criterion (EAC) is used to assess the transient stability of...
详细信息
In this paper, we consider a degree sum condition sufficient to imply the existence of k vertex-disjoint chorded cycles in a graph G. Let σ4(G) be the minimum degree sum of four independent vertices of G. We prove th...
详细信息
Malicious websites often install malware on user devices to gather user information or to disrupt device operations, violate user privacy, or adversely affect company interests. Many commercial tools are available to ...
详细信息
Given a directed graph G = (V, E) with n vertices, m edges and a designated source vertex s ∈ V, we consider the question of finding a sparse subgraph H of G that preserves the flow from s up to a given threshold λ ...
详细信息
Unmanned Aerial Vehicles (UAVs) have been recently leveraged in massive amount of Internet of Things (IoT) applications. However, given the stringent limitations of UAVs, investigating their performance in terms of th...
详细信息
The smart and autonomous learning and recognition of human activities will certainly lead to an incredible progression for several applications and services in public healthcare, education, entertainment, safety and s...
详细信息
Our project centers around creating and practically testing a pathfinding algorithm using a single ultrasonic sensor on a test RC car. The algorithm consists of two phases: normal and intensive detection. This algorit...
详细信息
暂无评论