365 research outputs found

    Communication-Efficient Design of Learning System for Energy Demand Forecasting of Electrical Vehicles

    Full text link
    Machine learning (ML) applications to time series energy utilization forecasting problems are a challenging assignment due to a variety of factors. Chief among these is the non-homogeneity of the energy utilization datasets and the geographical dispersion of energy consumers. Furthermore, these ML models require vast amounts of training data and communications overhead in order to develop an effective model. In this paper, we propose a communication-efficient time series forecasting model combining the most recent advancements in transformer architectures implemented across a geographically dispersed series of EV charging stations and an efficient variant of federated learning (FL) to enable distributed training. The time series prediction performance and communication overhead cost of our FL are compared against their counterpart models and shown to have parity in performance while consuming significantly lower data rates during training. Additionally, the comparison is made across EV charging as well as other time series datasets to demonstrate the flexibility of our proposed model in generalized time series prediction beyond energy demand. The source code for this work is available at https://github.com/XuJiacong/LoGTST_PSGFComment: 7 pages, 6 figure

    Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model

    Full text link
    Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this resource allocation issue by constructing a game theoretic model. A defender and an attacker are players and the interaction is formulated as a trade-off between protecting targets and consuming resources. The action cost which is a necessary role of consuming resource, is considered in the proposed model. Additionally, a bounded rational behavior model (Quantal Response, QR), which simulates a human attacker of the adversarial nature, is introduced to improve the proposed model. To validate the proposed model, we compare the different utility functions and resource allocation strategies. The comparison results suggest that the proposed resource allocation strategy performs better than others in the perspective of utility and resource effectiveness.Comment: 14 pages, 12 figures, 41 reference

    Does non-stationarity of extreme precipitation exist in the Poyang Lake Basin of China?

    Get PDF
    Study region Poyang Lake Basin, China. Study focus This study aimed to investigate whether there are non-stationary characteristics of extreme precipitation in the Poyang Lake Basin (PLB) of China, and the trends of non-stationary characteristics from 1959 to 2019. The spatio-temporal variations of extreme precipitation were analysed from three fundamental aspects: duration, frequency, and intensity, based on the prewhitening Mann-Kendall (PWMK) test. Non-stationary variations and the risk of extreme precipitation were investigated based on the generalized additive models for location, scale, and shape (GAMLSS). New hydrological insights for the region (1) the intensity and frequency of extreme precipitation increased significantly, whereas there was a significant decrease in extreme precipitation duration in the PLB. (2) The duration of extreme precipitation showed significant non-stationary characteristics in the western PLB. At the Nanchang site, 83.3 % of the extreme precipitation intensity indices showed non-stationary characteristics. The RX1day (maximum 1-day precipitation amount) and RX5day (maximum 5-day precipitation amount) increased significantly for different return periods under non-stationary conditions in the northwestern PLB. (3) The risk of extreme precipitation can be captured using the GAMLSS. The stationary method underestimated the extreme precipitation intensity (e.g., RX1day) compared to the GAMLSS for longer return periods in the PLB. More attention should be paid to the increase and fluctuation of the return period of extreme precipitation caused by the mean non-stationarity and variance non-stationarity

    Magnetic γ-Fe2O3-Loaded Attapulgite Sorbent for Hg0 Removal in Coal-Fired Flue Gas

    Get PDF
    A magnetically recoverable composite mercury removal sorbent was produced by introducing magnetic γ-Fe2O3 into attapulgite (ATT) (xFe1ATT) via the co-precipitation method and used to remove Hg0 in the simulated coal-fired power plant flue gas. The as-prepared 0.5Fe1ATT sorbent was characterized by X-ray diffraction, Brunauer–Emmett–Teller, transmission electron microscopy, vibrating sample magnetometer, X-ray photoelectron spectroscopy, and Fourier transform infrared spectroscopy analyses. The results showed that the Hg0 removal performance of the composite of γ-Fe2O3 and ATT was significantly promoted in comparison to pure γ-Fe2O3 and ATT individually. A relatively high magnetization value and good Hg0 removal performance were obtained by the sample of 0.5Fe1ATT. O2 could enhance Hg0 removal activity via the Mars–Maessen mechanism. NO displayed a significant promotion effect on Hg0 removal as a result of the formation of active species, such as NO2 and NO+. SO2 inhibited the removal of Hg0 as a result of its competition adsorption against Hg0 for the active sites and the sulfation of the sorbent. However, the introduction of NO could obviously alleviate the adverse effect of SO2 on the Hg0 removal capability. H2O showed a prohibitive effect on Hg0 removal as a result of its competition with Hg0 for the active sites. The findings of this study are of fundamental importance to the development of efficient and economic magnetic mercury sorbents for Hg0 removal from coal-fired boiler flue gases

    Performance analysis and optimization for workflow authorization

    Get PDF
    Many workflow management systems have been developed to enhance the performance of workflow executions. The authorization policies deployed in the system may restrict the task executions. The common authorization constraints include role constraints, Separation of Duty (SoD), Binding of Duty (BoD) and temporal constraints. This paper presents the methods to check the feasibility of these constraints, and also determines the time durations when the temporal constraints will not impose negative impact on performance. Further, this paper presents an optimal authorization method, which is optimal in the sense that it can minimize a workflow’s delay caused by the temporal constraints. The authorization analysis methods are also extended to analyze the stochastic workflows, in which the tasks’ execution times are not known exactly, but follow certain probability distributions. Simulation experiments have been conducted to verify the effectiveness of the proposed authorization methods. The experimental results show that comparing with the intuitive authorization method, the optimal authorization method can reduce the delay caused by the authorization constraints and consequently reduce the workflows’ response time
    • …
    corecore