This paper introduces an AC stochastic optimal power flow(SOPF)for the flexibility management of electric vehicle(EV)charging pools in distribution networks under *** AC SOPF considers discrete utility functions from ...
详细信息
This paper introduces an AC stochastic optimal power flow(SOPF)for the flexibility management of electric vehicle(EV)charging pools in distribution networks under *** AC SOPF considers discrete utility functions from charging pools as a compensation mechanism for eventual energy not served to their charging *** application of the AC SOPF is described where a distribution system operator(DSO)requires flexibility to each charging pool in a day-ahead time frame,minimizing the cost for flexibility while guaranteeing technical *** areas are defined for each charging pool and calculated as a function of a risk parameter involving the uncertainty of the *** show that all players can benefit from this approach,i.e.,the DSO obtains a riskaware solution,while charging pools/tasks perceive a reduction in the total energy payment due to flexibility services.
We study the behavior of deterministic methods for solving inverse problems in imaging. These methods are commonly designed to achieve two goals: (1) attaining high perceptual quality, and (2) generating reconstructio...
详细信息
We study the behavior of deterministic methods for solving inverse problems in imaging. These methods are commonly designed to achieve two goals: (1) attaining high perceptual quality, and (2) generating reconstructions that are consistent with the measurements. We provide a rigorous proof that the better a predictor satisfies these two requirements, the larger its Lipschitz constant must be, regardless of the nature of the degradation involved. In particular, to approach perfect perceptual quality and perfect consistency, the Lipschitz constant of the model must grow to infinity. This implies that such methods are necessarily more susceptible to adversarial attacks. We demonstrate our theory on single image super-resolution algorithms, addressing both noisy and noiseless settings. We also show how this undesired behavior can be leveraged to explore the posterior distribution, thereby allowing the deterministic model to imitate stochastic methods. Copyright 2024 by the author(s)
This paper presents a Half-Bridge (HB)/dual stacked switches, fully soft-switched bidirectional electrolytic capacitor-less AC/DC resonant converter, tailored for High-Voltage (HV) Electric Vehicle (EV) systems. The p...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(ETC),which is one of the services included in ITS systems,is an automated system that allows vehicles to pass through toll plazas without stopping for manual *** ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system *** ensure secure and efficient toll payments,designing a distributed model for sharing toll payment information among untrusted toll service providers is ***,the current ETC system operates under a centralized ***,both toll service providers and toll plazas know the toll usage history of *** raises concerns about revealing the entire driving routes and patterns of *** address these issues,blockchain technology,suitable for secure data management and data sharing in distributed systems,is being applied to the ETC *** enables efficient and transparent management of ETC ***,the public nature of blockchain poses a challenge where users’usage records are exposed to all *** tackle this,we propose a blockchain-based toll ticket model named AnonymousTollPass that considers the privacy of *** proposed model utilizes traceable ring signatures to provide unlinkability between tickets used by a vehicle and prevent the identity of the vehicle using the ticket from being identified among the ring members for the ***,malicious vehicles’identities can be traced when they attempt to reuse *** conducting simulations,we show the effectiveness of the proposed model and demonstrate that gas fees required for executing the proposed smart contracts are only 10%(when the ring size is 50)of the fees required in previous studies.
The fifth generation (5G) of wireless communication networks uses the advantages of Massive Multiple-Input Multiple-Output (MIMO) technologies to improve network coverage, increase data speeds, and enhance reliability...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being *** study presents a novel framework for generating animatable 3D cartoon faces from a single portrait *** First,we transferred an input real-world portrait to a stylized cartoon image using *** then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed *** two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark ***,we proposed a semantic-preserving face-rigging method based on manually created templates and deformation *** Compared with prior arts,the qualitative and quantitative results show that our method achieves better accuracy,aesthetics,and similarity ***,we demonstrated the capability of the proposed 3D model for real-time facial animation.
This innovative practice full paper describes an innovative pedagogical framework that integrates community engaged learning and social justice principles into a traditional web development course, fostering a holisti...
详细信息
This article reviews the electromagnetic framework used to model radio frequency interference (RFI) and the resulting development of mitigation methods. With the rise of IoT devices, wireless devices in which RF anten...
详细信息
In this paper, a new block diagonal chaotic model (BDC) is investigated due to higher necessity of advanced secure data transmission method in wireless medium and considerable limitation on computational storage space...
详细信息
Supervised multitasking machine learning is a prominent approach for predicting complex contexts where several target variables need to be addressed simultaneously. Predicting the team composition in cricket is such a...
详细信息
暂无评论