Battery energy storage systems (BESSs) are widely used in energy management applications to maximize arbitrage profits. The consideration of the power losses from both battery and inverter components in optimization s...
详细信息
The increasing penetration of photovoltaic systems (PV) in distribution grids can create significant over-voltage conditions due to intense reverse power flow. In addition to reactive power control, PV curtailments ar...
详细信息
Neural architecture search (NAS) has shown promise towards automating neural network design for a given task, but it is computationally demanding due to training costs associated with evaluating a large number of arch...
详细信息
As wireless systems have started to use millimeter-wave (mmWave) frequencies to exploit the abundant bandwidth, large antenna arrays with high beamforming gain have become necessary for compensating severe path loss. ...
详细信息
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e...
详细信息
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over *** plays a key role in modern industry since it connects physical an...
详细信息
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over *** plays a key role in modern industry since it connects physical and cyber *** order to meet ever-changing industrial requirements,its structures and functions are constantly ***,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and *** paper presents a survey of state-of-the-art results of cyber attacks on cyber physical ***,as typical system models are employed to study these systems,time-driven and event-driven systems are ***,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are *** particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and ***,both attack and defense strategies are discussed based on different system *** challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.
The vehicular edge computing model provides computational support to nearby vehicles requiring low-latency computation. However, existing algorithms typically only consider immediate neighbor nodes as potential vehicl...
详细信息
Ferroelectric field-effect transistors (FeFETs) are a promising emerging non-volatile memory, but the impact of manufacturing imperfections on these devices has yet to be studied comprehensively. We extend a previous ...
详细信息
Increasing demand for larger touch screen panels (TSPs) places more energy burden to mobile systems with conventional sensing methods. To mitigate this problem, taking advantage of the touch event sparsity, this brief...
详细信息
Compensated transmission lines are employed in power system networks to increase energy transmission capacity, improve system stability, decrease transmission losses, and provide more flexibility in power management. ...
详细信息
暂无评论