The variability of the output power of distributed renewable energy sources(DRESs)that originate from the fastchanging climatic conditions can negatively affect the grid ***,grid operators have incorporated ramp-rate ...
详细信息
The variability of the output power of distributed renewable energy sources(DRESs)that originate from the fastchanging climatic conditions can negatively affect the grid ***,grid operators have incorporated ramp-rate limitations(RRLs)for the injected DRES power in the grid *** the DRES penetration levels increase,the mitigation of high-power ramps is no longer considered as a system support function but rather an ancillary service(AS).Energy storage systems(ESSs)coordinated by RR control algorithms are often applied to mitigate these power ***,no unified definition of active power ramps,which is essential to treat the RRL as AS,currently *** paper assesses the various definitions for ramp-rate RR and proposes RRL method control for a central battery ESS(BESS)in distribution systems(DSs).The ultimate objective is to restrain high-power ramps at the distribution transformer level so that RRL can be traded as AS to the upstream transmission system(TS).The proposed control is based on the direct control of theΔP/Δt,which means that the control parameters are directly correlated with the RR requirements included in the grid *** addition,a novel method for restoring the state of charge(So C)within a specific range following a high ramp-up/down event is ***,a parametric method for estimating the sizing of central BESSs(BESS sizing for short)is *** BESS sizing is determined by considering the RR requirements,the DRES units,and the load mix of the examined *** BESS sizing is directly related to the constant RR achieved using the proposed ***,the proposed methodologies are validated through simulations in MATLAB/Simulink and laboratory tests in a commercially available BESS.
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(M...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(MILP)are popular approaches to solving ***,with many binary unit commitment variables,LR suffers from slow convergence and MILP presents heavy computation *** proposed data-driven variable reduction approach consists of offline and online calculations to accelerate computational performance of the MILP-based large-scale TCUC problems.A database including multiple nodal net load intervals and the corresponding TCUC solutions is first built offline via the data-driven and all-scenario-feasible(ASF)approaches,which is then leveraged to efficiently solve new TCUC instances ***/off statuses of considerable units can be fixed in the online calculation according to the database,which would reduce the computation burden while guaranteeing good solution quality for new TCUC instances.A feasibility proposition is proposed to promptly check the feasibility of the new TCUC instances with fixed binary variables,which can be used to dynamically tune parameters of binary variable fixing strategies and guarantee the existence of feasible UC solutions even when system structure *** tests illustrate the efficiency of the proposed approach.
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components of image preprocessing,fostering an improvement in the quality of remote sensing *** enhancement renders remote sensing data more indispensable,thereby enhancing the accuracy of target *** defogging techniques based on simplistic atmospheric degradation models have proven inadequate for mitigating non-uniform haze within remotely sensed *** response to this challenge,a novel UNet Residual Attention Network(URA-Net)is *** paradigmatic approach materializes as an end-to-end convolutional neural network distinguished by its utilization of multi-scale dense feature fusion clusters and gated jump *** essence of our methodology lies in local feature fusion within dense residual clusters,enabling the extraction of pertinent features from both preceding and current local data,depending on contextual *** intelligently orchestrated gated structures facilitate the propagation of these features to the decoder,resulting in superior outcomes in haze *** validation through a plethora of experiments substantiates the efficacy of URA-Net,demonstrating its superior performance compared to existing methods when applied to established datasets for remote sensing image *** the RICE-1 dataset,URA-Net achieves a Peak Signal-to-Noise Ratio(PSNR)of 29.07 dB,surpassing the Dark Channel Prior(DCP)by 11.17 dB,the All-in-One Network for Dehazing(AOD)by 7.82 dB,the Optimal Transmission Map and Adaptive Atmospheric Light For Dehazing(OTM-AAL)by 5.37 dB,the Unsupervised Single Image Dehazing(USID)by 8.0 dB,and the Superpixel-based Remote Sensing Image Dehazing(SRD)by 8.5 *** noteworthy,on the SateHaze1k dataset,URA-Net attains preeminence in overall performance,yieldi
The work proposes a methodology for five different classes of ECG signals. The methodology utilises moving average filter and discrete wavelet transformation for the remove of baseline wandering and powerline interfer...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
Deep neural networks have shown promising results in the classification of skin lesion images, particularly when they focus on the most significant regions of an image. However, the identification of melanoma continue...
详细信息
暂无评论