Load-serving entities which procure electricity from the wholesale electricity market to service end-users face significant quantity and price risks due to the volatile nature of electricity demand and quasi-fixed res...
详细信息
Load-serving entities which procure electricity from the wholesale electricity market to service end-users face significant quantity and price risks due to the volatile nature of electricity demand and quasi-fixed residential tariffs at which electricity is sold. This paper investigates strategies for load serving entities to hedge against such price risks. Specifically, we compute profit-maximizing portfolios of forward contract and call options as a function of uncertain aggregate user demand and wholesale electricity prices. We compare the profit to the case of Demand Response, where users are offered monetary incentives to temporarily reduce their consumption during periods of supply shortages. Using smart meter data of residential customers in California, we simulate optimal portfolios and derive conditions under which Demand Response outperforms call options and forward contracts. Our analysis suggests that Demand Response becomes more competitive as wholesale electricity prices increase.
The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to si...
详细信息
Orthodontic craniometric landmarks provide critical information in oral and maxillofacial imaging diagnosis and treatment planning. The Dent-landmark, defined as the odontoid process of the epistropheus, is one of the...
详细信息
ISBN:
(纸本)9781424441211
Orthodontic craniometric landmarks provide critical information in oral and maxillofacial imaging diagnosis and treatment planning. The Dent-landmark, defined as the odontoid process of the epistropheus, is one of the key landmarks to construct the midsagittal reference plane. In this paper, we propose a learning-based approach to automatically detect the Dent-landmark in the 3D cone-beam computed tomography (CBCT) dental data. Specifically, a detector is learned using the random forest with sampled context features. Furthermore, we use spacial prior to build a constrained search space other than use the full three dimensional space. The proposed method has been evaluated on a dataset containing 73 CBCT dental volumes and yields promising results.
Remote sensing map products are used to estimate regression coefficients relating environmental variables, such as the effect of conservation zones on deforestation. However, the quality of map products varies, and —...
详细信息
Energy consumption is becoming a growing concern in data centers. Many energy-conservation techniques have been proposed to address this problem. However, an integrated method is still needed to evaluate energy effici...
详细信息
Energy consumption is becoming a growing concern in data centers. Many energy-conservation techniques have been proposed to address this problem. However, an integrated method is still needed to evaluate energy efficiency of storage systems and various power conservation techniques. Extensive measurements of different workloads on storage systems are often very time-consuming and require expensive equipments. We have analyzed changing characteristics such as power and performance of stand-alone disks and RAID arrays, and then defined MIND as a black box power model for RAID arrays. MIND is devised to quantitatively measure the power consumption of redundant disk arrays running different workloads in a variety of execution modes. In MIND, we define five modes (idle, standby, and several types of access) and four actions, to precisely characterize power states and changes of RAID arrays. In addition, we develop corresponding metrics for each mode and action, and then integrate the model and a measurement algorithm into a popular trace tool - blktrace. With these features, we are able to run different IO traces on large-scale storage systems with power conservation techniques. Accurate energy consumption and performance statistics are then collected to evaluate energy efficiency of storage system designs and power conservation techniques. Our experiments running both synthetic and real-world workloads on enterprise RAID arrays show that MIND can estimate power consumptions of disk arrays with an error rate less than 2%.
The Matter standard, formerly known as Connected Home over IP, has emerged as the preferred choice for most smart home IoT vendors and service providers for the next-generation smart home IoT systems. It enhances inte...
The Matter standard, formerly known as Connected Home over IP, has emerged as the preferred choice for most smart home IoT vendors and service providers for the next-generation smart home IoT systems. It enhances interoperability across different smart home ecosystems and introduces the multi-admin feature, allowing a device to be commissioned and managed by multiple platforms simultaneously. While this standard offers considerable convenience, it also presents challenges for security policy enforcement. Policy enforcement has been highlighted in various studies as a crucial countermeasure against smart home IoT system vulnerabilities. Existing smart home policy enforcement methods, designed for individual IoT admin platforms, operate under the assumption of having a global view and control over all IoT devices in a smart home. This assumption, however, is untenable in a multi-admin environment, where an admin may only have partial device access or a partial view. In this work, we thoroughly analyze these challenges in a multi-admin setting and propose the first cross-admin policy enforcement solution. Our solution can parse complex policies into deployable sub-policies for each admin, and create virtual device instances and virtual automation rules to interconnect various admins. We test our solution on a real-world testbed involving 12 IoT devices and three popular Matter-enabled IoT platforms. Our results show that our solution can enforce cross-admin policies with a 100% success rate and a very small delay.
This research focused on distance measurement using Received Signal Strength Indicator (RSSl) that utilizing Pythagoras theory to get the position of a smartphone with the help of 4 Access Point (AP) in indoor environ...
详细信息
ISBN:
(纸本)9781509051311
This research focused on distance measurement using Received Signal Strength Indicator (RSSl) that utilizing Pythagoras theory to get the position of a smartphone with the help of 4 Access Point (AP) in indoor environment. There were many research have been done in this area, but the issue is about the accuracy. From studies that have been done before, there are differences between the results of calculation using RSSl with the actual distance with the average of 1.6 meters. Our result indicate that when calculating the distance using optimization RSSl method, we can reduce the distance difference average value between Access Point (AP) and smartphone is 0.6 meters with an accuracy of 86.1%. Coordinate measurement using Pythagoras Theory also produce average of localization error valued of 0.6 meters.
This book constitutes the refereed proceedings of workshops, held at the 29th International Conference on Conceptual Modeling, ER 2010, in Vancouver, Canada, in November 2010. The 31 revised full papers presented were...
详细信息
ISBN:
(数字)9783642163852
ISBN:
(纸本)9783642163845
This book constitutes the refereed proceedings of workshops, held at the 29th International Conference on Conceptual Modeling, ER 2010, in Vancouver, Canada, in November 2010. The 31 revised full papers presented were carefully reviewed and selected from 82 submissions. The papers are organized in sections on the workshops Semantic and Conceptual Issues in GIS (SeCoGIS); Conceptual Modeling of Life Sciences Applications (CMLSA); Conceptual Modelling of Services (CMS); Active Conceptual Modeling of Learning (ACM-L); Web informationsystems Modeling (WISM); Domain engineering (DE@ER); and Foundations and Practices of UML (FP-UML).
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi...
详细信息
Entity Homepage Recognition(EHR) is an important part of entity finding. In this paper, a method of EHR based on AdaBoost is proposed. With the help of Google, this method recalls pages related to answer entities and ...
详细信息
暂无评论