This paper discusses the advantages of orchestrating distribution energy resources (DERs) within the distribution network and integrating third generation (Gen3) blockchain technology among a diverse range of customer...
详细信息
ISBN:
(数字)9798350364965
ISBN:
(纸本)9798350364972
This paper discusses the advantages of orchestrating distribution energy resources (DERs) within the distribution network and integrating third generation (Gen3) blockchain technology among a diverse range of customers. The implementation of peer-to-peer (P2P) energy trading aims to optimize local energy utilization, reduce energy costs for participants, and provide insights into profit margins for aggregators and the distribution system operator (DSO). The study focuses on three types of DERs, namely electric vehicles (EVs), photovoltaic (PV) systems, and battery energy storage systems (BESSs), to facilitate transparent and secure P2P energy trading. The results underscore the importance of Gen3 blockchain technology in expediting and enhancing energy trading processes, thereby benefiting a wide range of participants.
In this paper, we propose a novel nonconvex approach to robust principal component analysis for HSI denoising, which focuses on simultaneously developing more accurate approximations to both rank and column-wise spars...
详细信息
The traditional natural product discovery approach has accessed only a fraction of the chemical diversity in nature. The use of bioinformatic tools to interpret the instructions encoded in microbial biosynthetic genes...
详细信息
This study compares the effectiveness of various Generative Adversarial Network architectures, including WGAN and WGAN-GP, in data clustering using the Iris dataset. Performance was evaluated with metrics such as Silh...
详细信息
ISBN:
(数字)9798331542634
ISBN:
(纸本)9798331542641
This study compares the effectiveness of various Generative Adversarial Network architectures, including WGAN and WGAN-GP, in data clustering using the Iris dataset. Performance was evaluated with metrics such as Silhouette Score, Davies-Bouldin Index, Adjusted rand Index, and Mutual Information. WGANs demonstrated the best clustering performance, while GANs showed promising results but were outperformed by WGAN. Contrary to expectations, WGAN-GP performed the worst. The research underscores the potential of GANs in clustering and highlights the need for further optimization based on specific datasets.
Some methods in the world university ranking institutions still have weaknesses. Among the university rankings, Webometrics focused on quantitative studies related to website and content phenomena and is considered ea...
详细信息
This paper analyzes the performance of a single-input multiple-output (SIMO) wireless communication system employing one- and two-sided amplitude shift keying (ASK) modulation schemes for data transmission and operati...
详细信息
White matter alterations are increasingly implicated in neurological diseases and their progression. Diffusion-weighted magnetic resonance imaging (DW-MRI) has been included in many international-scale studies to iden...
详细信息
Academics increasingly acknowledge the predictive power of social media for a wide variety of events and, more specifically, for financial markets. Anecdotal and empirical findings show that cryptocurrencies are among...
详细信息
This is the era of I-way. The development of high-speed computing and huge storage devices change the working culture of human. It affects the traditional business processes and shifted towards online business. It cre...
详细信息
There has been a meteoric rise in the use of online payment systems recently. Multiple e-payment systems exist, each designed to provide the highest degree of security while maintaining the greatest possible convenien...
There has been a meteoric rise in the use of online payment systems recently. Multiple e-payment systems exist, each designed to provide the highest degree of security while maintaining the greatest possible convenience for online shoppers. Cyber-attack techniques, on the other hand, are developing at the same rapid pace as security mechanisms. The authors of this paper examine the history of electronic payment systems, from the development of the corresponding language through the emergence of today's standard electronic payment systems. It also reveals a lack of security measures and approaches to fixing the problem. The current survey research makes a significant contribution by outlining the state of the electronic payment system framework and the possibilities it presents for the development of e-commerce in the future. The rates of suspicious purchases, which will serve as a yardstick in the creation of a trustworthy e-payment system, have been briefly discussed and analyzed.
暂无评论