期刊文献+
共找到601篇文章
< 1 2 31 >
每页显示 20 50 100
A Nodal Electricity Market Design Based on Regulated Access to Transmission Network
1
作者 Jean Constantinescu 《Journal of Energy and Power Engineering》 2013年第12期2404-2408,共5页
Accomodation of power system constraints with the market mechanism is encountered as a major challenge along the way toward implementation of different electricity market designs. Allocation of fixe or flow-dependent ... Accomodation of power system constraints with the market mechanism is encountered as a major challenge along the way toward implementation of different electricity market designs. Allocation of fixe or flow-dependent inter-zone trading capacities by the PX (power exchange) can not be accepted unreservedly. The paper is meant to show that a nodal electricity market design that is based on bids for local energy and a regulated transmission access including allocation of "entry-exit" transmission capacity would be the desired solution. The market players could easily optimize their portfolio while the TSOs (transmission system operators) are requested to mobilize the network's in-built flexibility to increase the cross zonal capacity. In the proposed market design, the PX's allocation of trading capacity is clearly separate from the TSO's management of the power system operational constraint5. Clear operator roles would enlarge access to electricity market as well as market integration of variable RESs (renewable energy sources) that are critically dependent on short notice access to regionat markets, 展开更多
关键词 Electricity market design nodal model network access transmission capacity congestion management.
下载PDF
Challenges for beyond 5G:ultra-densification of radio access network 被引量:3
2
作者 Fumiyuki Adachi Ryo Takahashi Hidenori Matsuo 《通信学报》 EI CSCD 北大核心 2020年第11期1-11,共11页
Ultra-densification of radio access network(RAN)is a key to efficiently support the exponentially growing mobile data traffic in 5 G era.Furthermore,extremely high frequency band like mm Wave band was utilized to solv... Ultra-densification of radio access network(RAN)is a key to efficiently support the exponentially growing mobile data traffic in 5 G era.Furthermore,extremely high frequency band like mm Wave band was utilized to solve the bandwidth shortage problem.However,untra-dense reusing the same radio resource produced severe interference.And the mm Wave link was very harsh due to frequent blockage by obstacles.Therefore a new RAN architecture needed to be introduced to realize ultra-reliable communications in such a severe radio propagation environment.An architecture of distributed MIMO based RAN was presented.Then,enhanced interference coordination(e IC)was described.Finally,the effectiveness of distributed MIMO based RAN with e IC by computer simulation was showed. 展开更多
关键词 5G advanced systems distributed MIMO radio access network interference coordination cooperative signal transmission
下载PDF
HetNets Under Decoupled Uplink and Downlink Access with UE Random Discontinuous Transmission: Local Delay and Energy Efficiency
3
作者 Zhang Yue Zheng Fuchun Luo Jingjing 《China Communications》 SCIE CSCD 2024年第3期205-216,共12页
Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discon... Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability. 展开更多
关键词 decoupled uplink and downlink access(DUDA) heterogeneous networks(HetNets) random discontinuous transmission(DTX) stochastic geometry
下载PDF
Minimizing the Impact of Long Propagation Delay on Multiple Access for Wireless Networks 被引量:1
4
作者 刘凯 李亚燕 王新 《China Communications》 SCIE CSCD 2011年第7期21-33,共13页
A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in acces... A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in access reservation mini-slots, which is adaptively adjusted according to current traffic load and idle channel resources. A Central Control Node (CCN) coordinates channel reservation and allocates on-demand channel resources to the successfully accessed nodes on two channels. Each node can employ only one handshake to accomplish each communication session, and transmit one or multiple data packets piggybacked with acknowledgment (ACK) information to one or multiple destination nodes in each frame until the end of their communication sessions, which greatly minimizes the impact of long propagation delay caused by handshakes and improves channel efficiency. Simulation results show that the proposed protocol obviously outperforms the Centralized Scheduling-based Medium Access Control (CSMAC) protocol, especially in the presence of long propagation delay. 展开更多
关键词 wireless networks multiple access on-demand reservation conflict-free transmission long propagation delay
下载PDF
Deep Unfolding for Cooperative Rate Splitting Multiple Access in Hybrid Satellite Terrestrial Networks 被引量:1
5
作者 Qingmiao Zhang Lidong Zhu +1 位作者 Shan Jiang Xiaogang Tang 《China Communications》 SCIE CSCD 2022年第7期100-109,共10页
Rate splitting multiple access(RSMA)has shown great potentials for the next generation communication systems.In this work,we consider a two-user system in hybrid satellite terrestrial network(HSTN)where one of them is... Rate splitting multiple access(RSMA)has shown great potentials for the next generation communication systems.In this work,we consider a two-user system in hybrid satellite terrestrial network(HSTN)where one of them is heavily shadowed and the other uses cooperative RSMA to improve the transmission quality.The non-convex weighted sum rate(WSR)problem formulated based on this model is usually optimized by computational burdened weighted minimum mean square error(WMMSE)algorithm.We propose to apply deep unfolding to solve the optimization problem,which maps WMMSE iterations into a layer-wise network and could achieve better performance within limited iterations.We also incorporate momentum accelerated projection gradient descent(PGD)algorithm to circumvent the complicated operations in WMMSE that are not amenable for unfolding and mapping.The momentum and step size in deep unfolding network are selected as trainable parameters for training.As shown in the simulation results,deep unfolding scheme has WSR and convergence speed advantages over original WMMSE algorithm. 展开更多
关键词 hybrid satellite terrestrial network rate splitting multiple access cooperative transmission deep unfolding weighted minimum mean square error
下载PDF
Performance Analysis in Cloud Radio Access Networks:User-Centralized Coordination Approach
6
作者 Munzali Ahmed Abana SUN Yaohua +2 位作者 Manzoor Ahmed Lukman A.Olawoyin LI Yong 《China Communications》 SCIE CSCD 2015年第11期12-23,共12页
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per... The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes. 展开更多
关键词 CLOUD radio access network POISSON point process COVERAGE probability joint COORDINATED transmission BASEBAND unit
下载PDF
Effective and Extensive Virtual Private Network
7
作者 Tarek S. Sobh Yasser Aly 《Journal of Information Security》 2011年第1期39-49,共11页
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh... A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment. 展开更多
关键词 VIRTUAL private network network Security SECURE Data transmission
下载PDF
Access VPN浅析及其PPTP实现 被引量:3
8
作者 吴娟 王书伟 张茜萍 《邮电设计技术》 2006年第9期47-51,共5页
介绍了AccessVPN的工作原理、功能及实现的基本要求,对VPN常用的协议进行了分析、对比,并以应用比较广泛的PPTP协议为例,给出了软件实现虚拟专用网的具体配置方法。
关键词 虚拟专用网 access VPN 协议 配置
下载PDF
An application-layer based centralized information access control for VPN 被引量:2
9
作者 欧阳凯 周敬利 +1 位作者 夏涛 余胜生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期240-249,共10页
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality... With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper. 展开更多
关键词 Virtual private network access control TUNNELING Centralized management STREAM
下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
10
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote access Communications Security User Authentication 2FA Virtual private network (VPN) TELECOMMUTING Threats VULNERABILITIES
下载PDF
Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access 被引量:1
11
作者 J.V.Anand R.Praveena T.R.Ganesh Babu 《Journal on Internet of Things》 2021年第4期139-147,共9页
The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink.Underwater Sensor Transmission with Attenuation Calcula... The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink.Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA)protocol has been proposed.This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference.Successive Interference Cancellation has been used at the receiving sensor to decode the information sent.The network level performance of sensors and increasing the data rate improves the overall throughput.Simultaneously,connecting several sensors to sink based on its depth region of deployment has been achieved using Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA).The analytical background of attenuation never confuted the simulation results of the proposed protocol in NS2 simulator.Simulation results shows that the throughput,average bit error rate and residual energy of sink performance. 展开更多
关键词 Underwater sensor and sink networking absorption loss transmission loss channel gain resource allocation interference mitigation Non Orthogonal Multiple access
下载PDF
Recent Advances of Multi-Channel Transmission in Metro Access Networks
12
作者 H.J. Thiele L.E. Nelson +1 位作者 B. Eichenbaum S.K. Das 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期731-732,共2页
We discuss the concept of coarse wavelength-division multiplexing (CWDM) for metro networks. After reviewing the requirements on components such as lasers and fiber, we propose different architectures for a flexible u... We discuss the concept of coarse wavelength-division multiplexing (CWDM) for metro networks. After reviewing the requirements on components such as lasers and fiber, we propose different architectures for a flexible upgrade of existing CWDM systems. 展开更多
关键词 CWDM on AS of Recent Advances of Multi-Channel transmission in Metro access networks DWDM in
原文传递
Design of Wireless Optical Access System using LED
13
作者 Liwei Ding Fang Liu +2 位作者 Yingjie He Hongbo Zhu Yongjin Wang 《Optics and Photonics Journal》 2013年第2期148-152,共5页
This paper develops a prototype to demonstrate a full-duplex wireless visible light communication (VLC) system based on Universal Serial Bus (USB) port. Combing with a USB 2.0 port on one board, it can achieve up to 2... This paper develops a prototype to demonstrate a full-duplex wireless visible light communication (VLC) system based on Universal Serial Bus (USB) port. Combing with a USB 2.0 port on one board, it can achieve up to 2 Mbps bit rates error free, which is mainly limited to the USB bridge circuit, between two computers for data transmission, such as text, audio and video. Hyper Terminal and self-written software are used to allow setting the transmission data rate, control bits, check bits and achieve real-time transmission between any two mobile devices with a USB port. The work is based on the research of VLC local access network. This paper also shows the experimental results and the relationship between system transmission eye diagram and bit rate. 展开更多
关键词 VISIBLE LIGHT COMMUNICATIONS VISIBLE LIGHT access networkING USB Interface Real-time transmission Full-duplex
下载PDF
基于RTD1296的私有存储设备的设计
14
作者 农丽萍 吕嘉嘉 +1 位作者 梁梓辰 黄一平 《现代电子技术》 北大核心 2024年第2期26-30,共5页
为满足私有存储设备传输安全、传输数据高效、节省电能的需求,设计一种以RTD1296为控制核心的千兆私有存储设备。该设备搭载Ubuntu系统和SFTP服务器,确保数据传输安全;采用千兆以太网和千兆无线网卡无缝连接互联网,确保数据高效传输;使... 为满足私有存储设备传输安全、传输数据高效、节省电能的需求,设计一种以RTD1296为控制核心的千兆私有存储设备。该设备搭载Ubuntu系统和SFTP服务器,确保数据传输安全;采用千兆以太网和千兆无线网卡无缝连接互联网,确保数据高效传输;使用ZeroTier异地组网技术实现内网穿透;使用MQTT技术实现设备远程开关机,达到节省电能和保护磁盘数据安全的效果;使用AIRKISS+ESPTOUCH技术实现智能手机配网;具有蓝牙连接一键唤醒设备,提醒用户备份,易用高效。实验结果表明,所设计的私有存储设备能够保证数据传输安全,相比于RTD1195存储设备,该设备的下载速度快3倍,上传速度快7倍,整机节能高达50%,可实现安全、高效、节能、易用的目标。 展开更多
关键词 私有存储设备 RTD1296 Ubuntu系统 SFTP服务器 数据传输 异地组网
下载PDF
面向集成的VPN解决方案
15
作者 陶志勇 阳王东 《计算机科学》 CSCD 北大核心 2024年第9期357-364,共8页
针对传统方式构建的VPN不支持承载多种数据类型、承载数据缺乏安全性、标签边缘设备负载过重等问题,提出了集成的VPN解决方案。该方案设计包含GRE VPN的建立、IPSEC VPN的建立、网络设备虚拟化、MPLS VPN的建立、私网数据的识别与隔离5... 针对传统方式构建的VPN不支持承载多种数据类型、承载数据缺乏安全性、标签边缘设备负载过重等问题,提出了集成的VPN解决方案。该方案设计包含GRE VPN的建立、IPSEC VPN的建立、网络设备虚拟化、MPLS VPN的建立、私网数据的识别与隔离5个关键步骤,实现了各VPN技术数据的嵌套与各VPN技术的相互融合,融合后的VPN既支持承载多种数据类型,又支持数据交互的安全,且能实现私网数据访问控制与地址复用,还能实现数据的负载分担。为验证方案的可行性,对方案建立的隧道、网络资源池、标签转发路径等方面进行了测试与验证,达到了预期设定的目标。为凸显方案的优势,与传统方式在背板带宽、端口速率等方面进行了对比分析。分析结果表明,该方案的背板带宽与端口速率随着资源池中设备数的增加而增长,其数据传输能力相比传统方式成倍增长,且在数据的负载分担、数据安全、可管理性与可维护性等方面优于传统方案,为构建实用、可靠、安全的VPN提供了思路。 展开更多
关键词 虚拟私有网 多协议标签交换 边界网络路由协议 虚拟化 标签边缘设备
下载PDF
校企共建多网融合下的“5G+智慧校园”研究
16
作者 余鹏 张淼 +1 位作者 高杰欣 李艳 《中国现代教育装备》 2024年第17期20-24,共5页
以5G技术为信息化新基建载体,设计“5G+智慧校园”的实施框架。从运用5G技术全面赋能高校智慧校园实现共建、共融、共享为切入点,剖析智慧校园视域下5G智慧应用的现实需求,分析“5G+智慧应用”的作用与研究意义。结合某高校 “5G+智慧... 以5G技术为信息化新基建载体,设计“5G+智慧校园”的实施框架。从运用5G技术全面赋能高校智慧校园实现共建、共融、共享为切入点,剖析智慧校园视域下5G智慧应用的现实需求,分析“5G+智慧应用”的作用与研究意义。结合某高校 “5G+智慧应用”多类应用场景实践,从部署模式、分流及认证、信息安全保障三个方面探究校园5G专网模式下基建新生态关键技术方案,为构筑泛在接入、多网融合、部署灵活、安全可控的5G创新应用提供支撑。 展开更多
关键词 “5G+智慧应用” 校园5G专网 泛在接入 多网融合
下载PDF
一种基于虚拟专用网的网络安全解决方法
17
作者 刘开芬 《软件》 2024年第7期105-107,共3页
随着信息社会化的到来,网络安全形势日益严峻。组织单位内的个人身份信息、生物识别信息、单位财务信息、商业机密等敏感信息一旦泄露,可能会导致组织单位遭受重大财产损失。本文提供一种组织内部敏感信息安全访问的解决方案,其思路是... 随着信息社会化的到来,网络安全形势日益严峻。组织单位内的个人身份信息、生物识别信息、单位财务信息、商业机密等敏感信息一旦泄露,可能会导致组织单位遭受重大财产损失。本文提供一种组织内部敏感信息安全访问的解决方案,其思路是将网络划分成三个区域,将组织单位服务器及敏感信息置于授权的虚拟专用网络中,其他区域均应通过严格的身份认证和授权方可访问授权区域,同时通过高强度的加密技术和安全传输通道实现信息的安全传输。 展开更多
关键词 网络安全 授权访问 虚拟专用网
下载PDF
5G技术在气象专网备份链路中的创新应用与性能分析
18
作者 许燕 舒宇锋 +2 位作者 廖丹 谢礼清 任华阳 《移动信息》 2024年第8期22-24,共3页
在气象数据的传输过程中,通常依赖内网有线宽带进行。然而,面对设备故障、人为失误或自然灾害等不可预见因素,有线专网可能会出现中断,导致数据传输受阻。这种情况下,急需一种可靠的应急通信手段来替代内网有线通信,以确保数据的连续性... 在气象数据的传输过程中,通常依赖内网有线宽带进行。然而,面对设备故障、人为失误或自然灾害等不可预见因素,有线专网可能会出现中断,导致数据传输受阻。这种情况下,急需一种可靠的应急通信手段来替代内网有线通信,以确保数据的连续性和实时性。此外,随着气象高质量发展需要,如何实现移动应急观测数据、水文数据、交通数据等外部数据与气象内部数据的交互,成为了一个亟待解决的问题。为了应对这些问题,文中研究了5G技术在气象专网备份链路中的创新应用。通过性能分析和实际测试,验证了5G技术在气象数据传输中的可行性及显著优势。研究结果表明,5G技术以其高带宽和低时延的特性,能有效增强气象专网的备份能力和扩展能力。这不仅保证了气象数据通信的连续性和稳定性,还提升了气象服务的可靠性和准确性。 展开更多
关键词 5G技术 气象专网 备份链路 数据传输 性能分析
下载PDF
基站无线回传技术研究 被引量:1
19
作者 刘振 《邮电设计技术》 2024年第3期69-75,共7页
有些场景光纤传输部署困难、成本高、周期长,需研究使用无线传输将基站和核心网连通。首先介绍了无线回传的应用场景,详细论述和对比了实现无线回传的可行技术方案,分析了无线回传中头开销、MTU和时延的影响,为特定场景使用无线回传方... 有些场景光纤传输部署困难、成本高、周期长,需研究使用无线传输将基站和核心网连通。首先介绍了无线回传的应用场景,详细论述和对比了实现无线回传的可行技术方案,分析了无线回传中头开销、MTU和时延的影响,为特定场景使用无线回传方案提供了参考。 展开更多
关键词 无线回传 接入回传一体化 桥接模式 虚拟专用网
下载PDF
考虑输变电设备温度约束的配电网空调负荷实时聚合调控
20
作者 张艺涵 李瑞杰 +5 位作者 方家琨 崔世常 陈兴 刘军会 艾小猛 田春筝 《电力自动化设备》 EI CSCD 北大核心 2024年第12期76-84,共9页
为解决迎峰度夏期间因输变电设备温度限制而引发的紧急切负荷问题,充分考虑新能源出力和负荷的随机波动,提出考虑输变电设备温度约束的配电网多冷水机组暖通空调负荷实时聚合调控方法。建立考虑多冷水机组负荷分配策略的暖通空调线性能... 为解决迎峰度夏期间因输变电设备温度限制而引发的紧急切负荷问题,充分考虑新能源出力和负荷的随机波动,提出考虑输变电设备温度约束的配电网多冷水机组暖通空调负荷实时聚合调控方法。建立考虑多冷水机组负荷分配策略的暖通空调线性能耗模型,设计基于聚合虚拟储能模型的统一信号调控方法,并根据输变电设备的物理结构,构建输变电设备的线性化温度约束模型;计及交流潮流、电压和输变电设备温度等运行约束,以系统经济性最优为目标建立配电网暖通空调负荷调控模型;为应对配电网的强随机性,提出基于近似动态规划的配电网暖通空调负荷实时调控策略,并采用与暖通空调虚拟储能荷电状态相关的分段线性函数对值函数进行近似,解决传统动态规划方法面临的“维数爆炸”问题。算例分析结果表明,所提方法可满足实时调控的快速性和准确性要求,并有效提升配电网供电的可靠性和经济性。 展开更多
关键词 配电网 输变电设备 暖通空调 负荷聚合 近似动态规划
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部