In this study, power distribution of a grid-connected hybrid power plant consisting of a 3.125 MVA diesel generator (DG) and 2 MW photovoltaic solar panels (PV) has been controlled. By using hourly solar radiation and...
In this study, power distribution of a grid-connected hybrid power plant consisting of a 3.125 MVA diesel generator (DG) and 2 MW photovoltaic solar panels (PV) has been controlled. By using hourly solar radiation and temperature values of a day recorded in 2020, the power produced by PV has been instantly estimated with artificial neural networks (ANN). The diesel generator has been controlled according to the estimated values to obtain the required power produced by the diesel generator. As a result, using the proposed coordinated control methods, the total maximum power generated by the power plant is kept constant while decreasing fuel consumption.
This paper focuses on the day-ahead scheduling of a multi-microgrid system that delivers electricity, heat, and hydrogen to their customers;hence, this system is a multi-carrier multi-microgrid. The microgrids are equ...
详细信息
Data storage in DNA is developing as a possible solution for archival digital data. Recently, to further increase the potential capacity of DNA-based data storage systems, the combinatorial composite DNA synthesis met...
详细信息
ISBN:
(数字)9798350382846
ISBN:
(纸本)9798350382853
Data storage in DNA is developing as a possible solution for archival digital data. Recently, to further increase the potential capacity of DNA-based data storage systems, the combinatorial composite DNA synthesis method was suggested. This approach extends the DNA alphabet by harnessing short DNA fragment reagents, known as shortmers. The shortmers are building blocks of the alphabet symbols, each consisting of a fixed number of shortmers. Thus, when information is read, it is possible that one of the shortmers that forms part of the composition of a symbol is missing and therefore the symbol cannot be determined. In this paper, we model this type of error as a type of asymmetric error and propose code constructions that can correct such errors in this setup. We also provide a lower bound on the redundancy of such error-correcting codes and give an explicit encoder and decoder for our construction. Our suggested error model is also supported by an analysis of data from actual experiments that produced DNA according to the combinatorial scheme. Lastly, we also provide a statistical evaluation of the probability of observing such error events, as a function of read depth.
In this paper, Fault Tolerant Control (FTC) for fractional-order systems (FOS) has not received as much attention in the literature as it has for standard integer-order systems. This work aims to bridge that gap. We p...
详细信息
ISBN:
(数字)9798331542726
ISBN:
(纸本)9798331542733
In this paper, Fault Tolerant Control (FTC) for fractional-order systems (FOS) has not received as much attention in the literature as it has for standard integer-order systems. This work aims to bridge that gap. We propose a practical approach to fault estimation and fault-tolerant control (FTC) specifically designed for linear (FOS) with sensor failures. Our method leverages fractional exponential stability within the Lyapunov framework and employs the Conformable formulation of fractional derivatives. Notably, the primary contribution of this paper is the first application of the Conformable fractional derivative (CFD) in the context of (FTC). To accurately estimate states and faults, the proposed approach utilizes an observer coupled with a customized adaptation law. To validate our theoretical contributions, we present a detailed simulation of a numerical case study.
Signal prediction of time-domain (TD) ground-penetrating radar (GPR) installed on drone by employing the ray-tracing technique is proposed. This work employs the TD uniform geometrical theory of diffraction (UTD) meth...
详细信息
Autonomous mobility on demand systems (AMoDS) will significantly affect the operation of coupled power distribution-urban transportation networks (PTNs) by the optimal dispatch of electric vehicles (EVs). This paper p...
详细信息
This paper investigates the achievable region of a K-user discrete memoryless (DM) multiple access wiretap (MAC-WT) channel, where each user transmits both secret and open (i.e., non-confidential) messages. All these ...
This paper investigates the achievable region of a K-user discrete memoryless (DM) multiple access wiretap (MAC-WT) channel, where each user transmits both secret and open (i.e., non-confidential) messages. All these messages are intended for the legitimate receiver (Bob), while the eavesdropper (Eve) is only interested in the secret messages. In the achievable coding strategy, the confidential information is protected by open messages and also by the introduction of auxiliary messages. When introducing an auxiliary message, one has to ensure that, on one hand, its rate is large enough for protecting the secret message from Eve and, on the other hand, the resulting sum rate (together with the secret and open message rate) does not exceed Bob's decoding capability. This yields an inequality structure involving the rates of all users' secret, open, and auxiliary messages. To obtain the rate region, the auxiliary message rates must be eliminated from the system of inequalities. A direct application of the Fourier-Motzkin elimination procedure is elusive since a) it requires that the number of users K is explicitly given, and b) even for small K = 3, 4, ..., the number of inequalities becomes extremely large. We prove the result for general K through the combined use of Fourier-Motzkin elimination procedure and mathematical induction. This paper adopts the strong secrecy metric, characterized by information leakage. To prove the achievability under this criterion, we analyze the resolvability region of a K-user DM-MAC channel (not necessarily a wiretap channel). In addition, we show that users with zero secrecy rate can play different roles and use different strategies in encoding their messages. These strategies yield non-redundant (i.e., not mutually dominating) rate inequalities. By considering all possible coding strategies, we provide a new achievable region for the considered channel, and show that it strictly improves those already known in the existing literatur
The paper discusses the challenges in controlling a two-stage photovoltaic (PV)-based shunt active power filter (SAPF) under distorted grid conditions and stochastic PV system behavior. To address this, the paper prop...
详细信息
Developing methods to process irregularly structured data is crucial in applications like gene-regulatory, brain, power, and socioeconomic networks. Graphs have been the go-to algebraic tool for modeling the structure...
详细信息
In our fast industrializing world, the need for more reliable and high-quality power production is highlighted by the growing need for electrical energy and the drive toward automation. In an effort to fulfill the gro...
In our fast industrializing world, the need for more reliable and high-quality power production is highlighted by the growing need for electrical energy and the drive toward automation. In an effort to fulfill the growing need for electrical power, sources of renewable electricity (RE) have surfaced as an eco-friendly substitute for traditional energy sources. However, because of their intrinsically erratic and fluctuating production patterns, integrating these sources of renewable energy into the utility grid poses difficulties for sustaining the quality of electricity (PQ) and system stability. Mitigating PQ difficulties related to the adoption of renewable energy has been made possible by the integration of a distributed flexibly AC transfer system gadgets such as distribute static compensator (DSTATCOM) as dynamic voltage restorer (DVR). The control algorithms that dictate the functioning of those DFACTS devices are substantially responsible for their effectiveness. This exploration leads an extensive examination of the ordinary and adjust control methods utilized in DFACTS frameworks to address power quality issues in utility organizations where sustainable power is being incorporated. The exhaustive assessment incorporates an assessment of in excess of 170 examination papers and offers a cautious classification and outline of the different control techniques. The survey investigates these calculations' plan, trying equipment, signs of execution, and reasonability as archived in the group of surviving exploration. This collection is an invaluable tool that provides engineers and scholars working in the dynamic subject of improving power quality in utility networks amid the increasing impact of renewable energy sources with a rapid reference.
暂无评论