ﻻ يوجد ملخص باللغة العربية
The proliferation of plug-in electric vehicles (PEVs) advocates a distributed paradigm for the coordination of PEV charging. Distinct from existing primal-dual decomposition or consensus methods, this paper proposes a cutting-plane based distributed algorithm, which enables an asynchronous coordination while well preserving individuals private information. To this end, an equivalent surrogate model is first constructed by exploiting the duality of the original optimization problem, which masks the private information of individual users by a transformation. Then, a cutting-plane based algorithm is derived to solve the surrogate problem in a distributed manner with intrinsic superiority to cope with various asynchrony. Critical implementation issues, such as the distributed initialization, cutting-plane generation and localized stopping criteria, are discussed in detail. Numerical tests on IEEE 37- and 123-node feeders with real data show that the proposed method is resilient to a variety of asynchrony and admits the plug-and-play operation mode. It is expected the proposed methodology provides an alternative path toward a more practical protocol for PEV charging.
With the advances in the Internet of Things technology, electric vehicles (EVs) have become easier to schedule in daily life, which is reshaping the electric load curve. It is important to design efficient charging algorithms to mitigate the negative
Electric vehicles (EVs) are an eco-friendly alternative to vehicles with internal combustion engines. Despite their environmental benefits, the massive electricity demand imposed by the anticipated proliferation of EVs could jeopardize the secure and
We describe the architecture and algorithms of the Adaptive Charging Network (ACN), which was first deployed on the Caltech campus in early 2016 and is currently operating at over 100 other sites in the United States. The architecture enables real-ti
In modern networks, the use of drones as mobile base stations (MBSs) has been discussed for coverage flexibility. However, the realization of drone-based networks raises several issues. One of the critical issues is drones are extremely power-hungry.
Resource Public Key Infrastructure (RPKI) is vital to the security of inter-domain routing. However, RPKI enables Regional Internet Registries (RIRs) to unilaterally takedown IP prefixes - indeed, such attacks have been launched by nation-state adver