Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (6689)
- Computer Sciences (6678)
- Electrical and Computer Engineering (3780)
- Operations Research, Systems Engineering and Industrial Engineering (3381)
- Artificial Intelligence and Robotics (3289)
-
- Systems Science (3278)
- Numerical Analysis and Scientific Computing (3266)
- Social and Behavioral Sciences (583)
- Chemical Engineering (441)
- Civil and Environmental Engineering (440)
- Mechanical Engineering (440)
- Electrical and Electronics (436)
- Materials Science and Engineering (431)
- Civil Engineering (429)
- Metallurgy (428)
- Ocean Engineering (428)
- Structural Engineering (428)
- Law (347)
- Computer Law (321)
- Information Security (315)
- Forensic Science and Technology (292)
- Legal Studies (292)
- Digital Communications and Networking (258)
- Communication (211)
- Computer and Systems Architecture (207)
- Business (178)
- Communication Technology and New Media (159)
- Data Storage Systems (151)
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Universitas Indonesia (433)
- Embry-Riddle Aeronautical University (311)
- California State University, San Bernardino (128)
-
- Association of Arab Universities (111)
- Technological University Dublin (40)
- University of Central Florida (38)
- Stony Brook University (33)
- University of South Florida (22)
- University for Business and Technology in Kosovo (21)
- National Taiwan Ocean University (19)
- Universitas Negeri Yogyakarta (19)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (18)
- Southern Methodist University (17)
- Chinese Academy of Sciences (16)
- Purdue University (13)
- Sacred Heart University (12)
- Tashkent State Technical University (12)
- Rochester Institute of Technology (11)
- University of Arkansas, Fayetteville (11)
- Karbala International Journal of Modern Science (10)
- Kennesaw State University (10)
- DePaul University (9)
- Old Dominion University (9)
- United Arab Emirates University (8)
- Faculty of Engineering, Mansoura University (7)
- Maurer School of Law: Indiana University (7)
- Tsinghua University Press (6)
- University of Massachusetts Amherst (5)
- Keyword
-
- Simulation (148)
- Genetic algorithm (95)
- Deep learning (90)
- Optimization (87)
- Particle swarm optimization (84)
-
- Machine learning (82)
- Classification (77)
- Support vector machine (52)
- Virtual reality (51)
- Modeling (48)
- Feature extraction (43)
- Numerical simulation (43)
- Neural network (41)
- Artificial neural network (36)
- Fault diagnosis (36)
- Modeling and simulation (36)
- Wireless sensor networks (36)
- Digital forensics (34)
- Path planning (34)
- Induction motor (32)
- Feature selection (31)
- Privacy (31)
- Artificial neural networks (30)
- Clustering (30)
- Convolutional neural network (30)
- Visualization (29)
- Data mining (28)
- Electric vehicle (28)
- Fuzzy logic (28)
- Power quality (28)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Makara Journal of Technology (431)
- Journal of Digital Forensics, Security and Law (299)
- Journal of International Technology and Information Management (127)
-
- Future Computing and Informatics Journal (83)
- The ITB Journal (40)
- Human-Machine Communication (38)
- Journal of Network Music and Arts (33)
- International Journal of Business and Technology (21)
- Military Cyber Affairs (20)
- Elinvo (Electronics, Informatics, and Vocational Education) (19)
- Journal of Marine Science and Technology (19)
- SMU Data Science Review (17)
- Applied Mathematics & Information Sciences (16)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (16)
- Chemical Technology, Control and Management (12)
- School of Computer Science & Engineering Faculty Publications (12)
- Frameless (10)
- Karbala International Journal of Modern Science (10)
- Bulletin of TUIT: Management and Communication Technologies (7)
- Journal of the Arkansas Academy of Science (7)
- Mansoura Engineering Journal (7)
- Big Data Mining and Analytics (6)
- International Bulletin of Political Psychology (6)
- Acta of Turin Polytechnic University in Tashkent (5)
- Emirates Journal for Engineering Research (5)
- Federal Communications Law Journal (5)
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (5)
- Future Engineering Journal (5)
- File Type
Articles 1 - 30 of 7723
Full-Text Articles in Computer Engineering
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Human-Machine Communication
As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
Journal of Engineering Research
In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.
This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
Journal of Engineering Research
The proliferation of fake news has become a complex and challenge problem in recent year, and presenting various unsolved issues within the research domain. Among these challenges, a critical concern is the development of effective models capable of accurately distinguish between fake and real news. While numerous techniques have been proposed for fake news detection, achieving optimal accuracy remains elusive. This paper introduces a novel fake news detection approach employing a two-layered weighted voting classifier. In contrast to conventional methods that assign equal weights to all classifiers, our proposed approach utilizes a selective weighting approach to solve the current issue. …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Turkish Journal of Electrical Engineering and Computer Sciences
This study aims to perform fast fault diagnosis and intelligent protection in an active distribution network (ADN) with high renewable energy penetration. Several time-domain simulations are carried out in EMTP-RV to extract time-synchronized current and voltage data. The Stockwell transform (ST) was used in MATLAB/SIMULINK to preprocess these input datasets to train the adaptive fault diagnosis deep convolutional neural network (AFDDCNN) for fault location identification, fault type identification, and fault phase-detection for different penetration levels. Based on the AFDDCNN output, the intelligent protection scheme (IDOCPS) generates the signal for isolating a faulty section of the ADN. An intelligent fault diagnosis …
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Technological developments in industrial areas also impact unmanned aerial vehicles (UAVs). Recent improvements in both software and hardware have significantly increased the use of many UAVs in social and military fields. In particular, the widespread use of these vehicles in social areas such as entertainment, shipping, transportation, and delivery and military areas such as surveillance, tracking, and offensive measures has accelerated the research on swarm systems. This study examined the previous investigations on swarm UAVs and aimed to create a more efficient algorithm. The effectiveness of the proposed algorithm was compared with other leader-based applications. A swarm consisting of 5 …
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Turkish Journal of Electrical Engineering and Computer Sciences
The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Turkish Journal of Electrical Engineering and Computer Sciences
The regulation of tie-line electricity flow and frequency of electrical power systems (EPS) is crucial for ensuring their robustness to parameter changes and efficient management of disturbances. To this end, a novel cascade control design approach utilizing a serial Proportional-Integral-Derivative controller with a filter (PIDF) is proposed in this paper. The parameters of the controllers are derived analytically, and it is employed in both loops of the cascade control system to regulate the Load Frequency Control (LFC) of EPS. The implementation of PIDF controllers in both loops is utilized in the cascade control scheme for various power systems featuring different …
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a fast antenna phase optimization scheme to enable microwave power focusing for breast cancer hyperthermia. The power focusing is achieved through the maximization of the deposited electric field on the target malignant tumor tissue. To do so, a malignant breast tumor, the surrounding breast medium, and the skin of the breast are modeled as a cylindrical structure composed of eccentric cylinders, and electric field distribution is computed analytically in terms of cylindrical harmonics. This approach minimized the computational cost and simplified the breast medium model. To ensure applicability across various breast types, the dielectric properties (DPs) of …
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, developments in quantum sensing, laser, and atomic sensor technologies have also enabled advancement in the field of quantum navigation. Atomic-based gyroscopes have emerged as one of the most critical atomic sensors in this respect. In this review, a brief technology statement of spin exchange relaxation free (SERF) and nuclear magnetic resonance (NMR) type atomic comagnetometer gyroscope (CG) is presented. Related studies in the literature have been gathered, and the fundamental compositions of CGs with technical basics are presented. A comparison of SERF and NMR CGs is provided. A basic simulation of SERF CG was carried out because …
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Turkish Journal of Electrical Engineering and Computer Sciences
Domain generalization (DG) techniques strive to attain the ability to generalize to an unfamiliar target domain solely based on training data originating from the source domains. Despite the increasing attention given to learning from multiple training domains through the application of various forms of invariance across those domains, the enhancements observed in comparison to ERM are nearly insignificant under specified evaluation rules. In this paper, we demonstrate that the disentanglement of spurious and invariant features is a challenging task in conventional training since ERM simply minimizes the loss and does not exploit invariance among domains. To address this issue, we …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
ELAIA
A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.
The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …
Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou
Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou
Journal of System Simulation
Abstract: To better meet the development needs of China's new power system, an optimal scheduling strategy of virtual power plant(VPP) with carbon emission and carbon penalty considering the uncertainty of wind power and photovoltaic power is proposed. The mathematical description of photovoltaic(PV), wind turbine(WT), combined heat and power(CHP) unit and energy storage system (ESS) is carried out, and a wind-solar output model considering the uncertainty is established. The scenario generation and reduction method is used to generate the typical scenario. To maximize the overall operation benefit of VPP, considering carbon emission cost and carbon penalty, an optimal scheduling model of …
Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang
Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang
Journal of System Simulation
Abstract: The development of electric vehicle provides an alternative to conventional fuel vehicles for logistics companies. Using electric vehicles has the merits of less pollution and low noise, but the characteristics of limited cruising range and limited number of charging stations are new challenges. Electric vehicle routing problems(EVRPs) have been widely used in transportation, logistics and other fields, and have received much attention. A comprehensive survey of EVRP and its many variants are presented and the respective backgrounds and applicable conditions are analyzed. The solving approaches of EVRPs are categorized, the strengths and weaknesses of each algorithm are analyzed, and …
Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie
Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie
Journal of System Simulation
Abstract: To ensure the economy and stability of microgrid operation, the power fluctuations of renewable energy source (RES) and the lifetime characteristics of battery energy storage system (BESS) should be considered. The influence of charging and discharging depth and rate on the lifetime of BESS is researched, a model of battery energy storage system for real-time optimal scheduling is established, and the alternating direction method of multipliers is adopted for the distributed optimal scheduling of microgrid clusters. The distributed optimization method does not require any global information and can protect the privacy of microgrid in the maximum extent. Simulation results …
Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo
Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo
Journal of System Simulation
Abstract: Broad learning system(BLS) is introduced to tackle the existed disadvantage that LSTM-based runoff prediction model is easy to fall into local optimization. To reduce the influence of noise on the prediction results, the variational mode decomposition (VMD) is adopted to transform the onedimensional time-domain runoff signal to the two-dimensional time-frequency plane. The runoff prediction model based on VMD-LSTM-BLS is proposed. The simulation results demonstrate that the prediction accuracy of the new model is more significantly improved compared with the baseline model and the existing LSTM-based runoff prediction model.
Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen
Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen
Journal of System Simulation
Abstract: As a complete automated guided vehicle(AGV) system scheduling algorithm, it must include conflict-handling strategy, together with common dispatching strategy and routing algorithm. However, due to the uncertainty, characteristics of such scheduling algorithm are difficult to be analyzed theoretically, and the relevant study is lacking. An AGV system simulation platform based on the discreteevent simulation technique is designed and developed, which can flexibly set the scheduling problem, choose the dispatching strategy, routing algorithm, and conflict-handling strategy for the scheduling algorithm, to run the simulation. The platform has a visual interface, from which the running status of AGVs and the performance …