Selected Node

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 30549 Experts worldwide ranked by ideXlab platform

Audun Botterud - One of the best experts on this subject based on the ideXlab platform.

  • Enhanced Representations of Lithium-Ion Batteries in Power Systems Models and Their Effect on the Valuation of Energy Arbitrage Applications
    Journal of Power Sources, 2017
    Co-Authors: Apurba Sakti, Nestor A. Sepulveda, Canan Uckun, Claudio Vergara, Fernando J. De Sisternes, Kevin G. Gallagher, Dennis W Dees, Audun Botterud
    Abstract:

    Abstract We develop three novel enhanced mixed integer-linear representations of the power limit of the battery and its efficiency as a function of the charge and discharge power and the state of charge of the battery, which can be directly implemented in large-scale power systems models and solved with commercial optimization solvers. Using these battery representations, we conduct a techno-economic analysis of the performance of a 10 MWh lithium-ion battery system testing the effect of a 5-min vs. a 60-min price signal on profits using real time prices from a Selected Node in the MISO electricity market. Results show that models of lithium-ion batteries where the power limits and efficiency are held constant overestimate profits by 10% compared to those obtained from an enhanced representation that more closely matches the real behavior of the battery. When the battery system is exposed to a 5-min price signal, the energy arbitrage profitability improves by 60% compared to that from hourly price exposure. These results indicate that a more accurate representation of li-ion batteries as well as the market rules that govern the frequency of electricity prices can play a major role on the estimation of the value of battery technologies for power grid applications.

  • enhanced representations of lithium ion batteries in power systems models and their effect on the valuation of energy arbitrage applications
    2016
    Co-Authors: Apurba Sakti, Canan Uckun, Claudio Vergara, Fernando J. De Sisternes, Kevin G. Gallagher, Audun Botterud, Dennis W Dees, Nestor Sepulveda
    Abstract:

    We develop three novel enhanced mixed integer-linear representations of the power limit of the battery and its efficiency as a function of the charge and discharge power and the state of charge of the battery, which can be directly implemented in large-scale power systems models and solved with commercial solvers. Using these representations, we conduct a techno-economic analysis of the performance of a 10MWh lithium-ion battery system testing the effect of a 5-min vs. a 60-min period price signal on profits using real time prices from a Selected Node in the MISO electricity market. Results show that models of lithium-ion batteries where the power limits and efficiency are held constant overestimate profits by 10% compared to those obtained from an enhanced representation that closely matches the real behavior of the battery. When the battery system is exposed to a 5-min price signal, the profitability from energy arbitrage improves by 60% compared to that from hourly price exposure. These results indicate that a more accurate representation of li-ion batteries as well as the market rules that govern the frequency of electricity prices can play a major role on the estimation of the value of battery technologies for power grid applications.

Bing-li Jiao - One of the best experts on this subject based on the ideXlab platform.

  • Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
    IEEE Transactions on Information Forensics and Security, 2012
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with the constraints of physical-layer security. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the malicious eavesdropper. First, we find that in a topology where the intermediate Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional nonjamming schemes within a certain transmitted power regime. We also find that, in the scenario where the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their nonjamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and nonjamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.

  • joint relay and jammer selection for secure two way relay networks
    arXiv: Information Theory, 2011
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with the constraints of physical layer security. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper Node. Firstly, we find that in a topology where the intermediate Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional non-jamming schemes within a certain transmitted power regime. We also find that, in the scenario in which the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.

  • joint relay and jammer selection for secure two way relay networks
    International Conference on Communications, 2011
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with secrecy constraints. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations via the amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper Node. Firstly, we find that in a topology where the relay and jamming Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperforms the conventional non-jamming schemes within a certain transmitted power regime. We also find that, in the scenario in which the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis that the hybrid switching scheme further improves the secrecy rate.

Apurba Sakti - One of the best experts on this subject based on the ideXlab platform.

  • Enhanced Representations of Lithium-Ion Batteries in Power Systems Models and Their Effect on the Valuation of Energy Arbitrage Applications
    Journal of Power Sources, 2017
    Co-Authors: Apurba Sakti, Nestor A. Sepulveda, Canan Uckun, Claudio Vergara, Fernando J. De Sisternes, Kevin G. Gallagher, Dennis W Dees, Audun Botterud
    Abstract:

    Abstract We develop three novel enhanced mixed integer-linear representations of the power limit of the battery and its efficiency as a function of the charge and discharge power and the state of charge of the battery, which can be directly implemented in large-scale power systems models and solved with commercial optimization solvers. Using these battery representations, we conduct a techno-economic analysis of the performance of a 10 MWh lithium-ion battery system testing the effect of a 5-min vs. a 60-min price signal on profits using real time prices from a Selected Node in the MISO electricity market. Results show that models of lithium-ion batteries where the power limits and efficiency are held constant overestimate profits by 10% compared to those obtained from an enhanced representation that more closely matches the real behavior of the battery. When the battery system is exposed to a 5-min price signal, the energy arbitrage profitability improves by 60% compared to that from hourly price exposure. These results indicate that a more accurate representation of li-ion batteries as well as the market rules that govern the frequency of electricity prices can play a major role on the estimation of the value of battery technologies for power grid applications.

  • enhanced representations of lithium ion batteries in power systems models and their effect on the valuation of energy arbitrage applications
    2016
    Co-Authors: Apurba Sakti, Canan Uckun, Claudio Vergara, Fernando J. De Sisternes, Kevin G. Gallagher, Audun Botterud, Dennis W Dees, Nestor Sepulveda
    Abstract:

    We develop three novel enhanced mixed integer-linear representations of the power limit of the battery and its efficiency as a function of the charge and discharge power and the state of charge of the battery, which can be directly implemented in large-scale power systems models and solved with commercial solvers. Using these representations, we conduct a techno-economic analysis of the performance of a 10MWh lithium-ion battery system testing the effect of a 5-min vs. a 60-min period price signal on profits using real time prices from a Selected Node in the MISO electricity market. Results show that models of lithium-ion batteries where the power limits and efficiency are held constant overestimate profits by 10% compared to those obtained from an enhanced representation that closely matches the real behavior of the battery. When the battery system is exposed to a 5-min price signal, the profitability from energy arbitrage improves by 60% compared to that from hourly price exposure. These results indicate that a more accurate representation of li-ion batteries as well as the market rules that govern the frequency of electricity prices can play a major role on the estimation of the value of battery technologies for power grid applications.

Yinghai Wang - One of the best experts on this subject based on the ideXlab platform.

Jingchao Chen - One of the best experts on this subject based on the ideXlab platform.

  • Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
    IEEE Transactions on Information Forensics and Security, 2012
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with the constraints of physical-layer security. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the malicious eavesdropper. First, we find that in a topology where the intermediate Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional nonjamming schemes within a certain transmitted power regime. We also find that, in the scenario where the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their nonjamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and nonjamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.

  • joint relay and jammer selection for secure two way relay networks
    arXiv: Information Theory, 2011
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with the constraints of physical layer security. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper Node. Firstly, we find that in a topology where the intermediate Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional non-jamming schemes within a certain transmitted power regime. We also find that, in the scenario in which the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.

  • joint relay and jammer selection for secure two way relay networks
    International Conference on Communications, 2011
    Co-Authors: Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bing-li Jiao
    Abstract:

    In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate Nodes, and one eavesdropper, with secrecy constraints. Specifically, the proposed algorithms select two or three intermediate Nodes to enhance security against the malicious eavesdropper. The first Selected Node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations via the amplify-and-forward protocol. The second and third Nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper Node. Firstly, we find that in a topology where the relay and jamming Nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperforms the conventional non-jamming schemes within a certain transmitted power regime. We also find that, in the scenario in which the intermediate Nodes gather as a close cluster, the jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis that the hybrid switching scheme further improves the secrecy rate.