The work deals with usage of classical PID controller to maintain balance between electricity consumption and production using concepts of smart grid and virtual power plant. Aggregated control of large groups of ther...
详细信息
ISBN:
(纸本)9781467383844
The work deals with usage of classical PID controller to maintain balance between electricity consumption and production using concepts of smart grid and virtual power plant. Aggregated control of large groups of thermostatically controlled loads can be used for ancillary services provision. The focus is on secondary control and peak-shaving, which are a part of the power balance problem. Calculation of PID controller parameters are based on the localization method. The main idea of the localization method is using a derivatives vector of the controlled variable for manipulated variable calculation. The highest derivative implicitly contains full information about plant's state at the current moment. The dynamics of individual building with heaters is described by second order equivalent thermal parameters (ETP) model. The obtained results show that aggregate response of large population of electrical space heaters can meet the requirements on both of the problems. Nevertheless, there are still a lot of issues remaining open: influence of the hysteresis parameter, and using suitable sampling time in order to lower demand on the communication infrastructure.
Nowadays, crucial parts of modern Building Automation and Control Systems (BACS) are active control and monitoring functions. Many of research have been conducted to investigate the support of location-based services ...
详细信息
ISBN:
(纸本)9781509013159
Nowadays, crucial parts of modern Building Automation and Control Systems (BACS) are active control and monitoring functions. Many of research have been conducted to investigate the support of location-based services (LBS) for individuals in the BACS. Since microlocation technology could be used to enable reliable and precise indoor positioning and navigation, an indoor positioning system (IPS) has been proposed as an attractive way for activity recognition and support LBS. In this paper an investigation of using microlocation with Bluetooth Low Energy technology to develop an active BACS has been presented. Case study of such system is described and the results from verification of reliability and accuracy of localization process have been discussed.
In this paper the problem of existence of parasitic components in a real memristor has been analysed. These unwanted components have some impacts on behaviour of the memristors causing discrepancies in the observed dy...
详细信息
In this paper the problem of existence of parasitic components in a real memristor has been analysed. These unwanted components have some impacts on behaviour of the memristors causing discrepancies in the observed dynamic characteristics. To model this kind of behaviour additional L and C elements have to be introduced in the memristor model. Simulation tests have been carried out to uncover the changes of behaviour caused by the introduced parasitics. Several graphs show comparisons between characteristics of an ideal element and the model of real one with parasitics.
In this study, the dynamics and control aspects of a spherical rolling robot's lateral motion are investigated. An approximate, simplified to a single plane, mathematical model is derived using Lagrange equations ...
In this study, the dynamics and control aspects of a spherical rolling robot's lateral motion are investigated. An approximate, simplified to a single plane, mathematical model is derived using Lagrange equations to check stability of the system. Utilizing the fusion of sensor data, a precise orientation measurement is achieved. Document focuses on a synthesis of a PID controller reducing sideway oscillations that occur in motion of a spherical robot with internal pendulum mechanism.
In this paper will be described the way of using data understanding techniques for semantic information extraction and data meaning evaluation. Extracted information may be then used for performing some management tas...
详细信息
In this paper will be described the way of using data understanding techniques for semantic information extraction and data meaning evaluation. Extracted information may be then used for performing some management tasks and security actions. It may play important role in advanced secure management applications and intelligent access control to secure data. Such techniques allow extending security procedures and have a great influence for creation new areas of security like personalized cryptography.
作者:
Sirakoulis, Georgios Ch.Wąs, Jaroslaw
Department of Electrical and Computer Engineering University Campus DUTh Xanthi671 00 Greece AGH University of Science and Technology
Faculty of Electrical Engineering Automatics IT and Biomedical Engineering Department of Applied Computer Science al. Mickiewicza 30 Kraków30-059 Poland
Mobile robots are the subject of many studies in robotics. Nevertheless, there is still a lot to be done in this field of knowledge, especially if it comes to ball-shaped constructions. This document focuses on a desi...
详细信息
The paper presents a method proposed by the authors to generate a single user-selected waveguide cut-on mode by means of mode synthesizer consisting of a set of point sources, each of them modelled by thin pipe outlet...
详细信息
Nowadays, virtual and remote laboratories play an important role in the students' learning process. For distance education in scientific areas, where the laboratories are an essential part, this importance is espe...
详细信息
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to sati...
详细信息
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.
暂无评论