4.7 Article

Mobility-Aware Vehicle-to-Grid Control Algorithm in Microgrids

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2018.2816935

关键词

Vehicle-to-grid (V2G); electric vehicle (EV); microgrid; Markov decision process (MDP); reinforcement learning (RL)

资金

  1. Korean Government (MSIP) through the National Research Foundation (NRF) of Korea [2017R1E1A1A01073742]
  2. Basic Science Research Program through the NRF of Korea - Ministry of Education [2017R1A6A3A03006846]

向作者/读者索取更多资源

In a vehicle-to-grid (V2G) system, electric vehicles (EVs) can be efficiently used as power consumers and suppliers to achieve microgrid (MG) autonomy. Since EVs can act as energy transporters among different regions (i.e., MGs), it is an important issue to decide where and when EVs are charged or discharged to achieve the optimal performance in a V2G system. In this paper, we propose a mobility-aware V2G control algorithm (MACA) that considers the mobility of EVs, states of charge of EVs, and the estimated/actual demands of MGs and then determines charging and discharging schedules for EVs. To optimize the performance of MACA, the Markov decision process problem is formulated and the optimal policy on charging and discharging is obtained by a value iteration algorithm. Since the mobility of EVs and the estimated/actual demand profiles of MGs may not be easily obtained, a reinforcement learning approach is also introduced. Evaluation results demonstrate that MACA with the optimal and learning-based policies can effectively achieve MG autonomy and provide higher satisfaction on the charging.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks

Shao-Di Wang, Hui-Ming Wang, Zhetao Li, Victor C. M. Leung

Summary: For mission-critical massive machine-type communications, a novel UAJ detection method based on JSTS is proposed to address the serious threat of active jamming attack in uplink access. The proposed method detects UAJ in a sequential manner by processing received signals one by one, and does not rely on prior knowledge of the attackers. Numerical results validate the effectiveness of the method.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Data Distribution-Aware Online Client Selection Algorithm for Federated Learning in Heterogeneous Networks

Jaewook Lee, Haneul Ko, Sangwon Seo, Sangheon Pack

Summary: Federated learning (FL) is an alternative to traditional cloud-centric machine learning (ML) that has gained attention. The performance of FL is affected by the selection of clients with non-independent and identically distributed (non-IID) data. To minimize convergence time and improve learning accuracy, an optimization problem is formulated and a data distribution-aware online client selection (DOCS) algorithm is proposed.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR

Shao-Di Wang, Hui-Ming Wang, Chen Feng, Victor C. M. Leung

Summary: In this paper, we propose to detect DMRS spoofing in 5G NR by exploiting the spatial sparsity structure of the channel. We first extract the spatial sparsity structure of the channel using a sparse feature retrieval method, and then propose a sequential sparsity structure anomaly detection method to detect DMRS spoofing. Simulation results show that our method outperforms other existing methods.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Predictive and Adaptive Deep Coding for Wireless Image Transmission in Semantic Communication

Wenyu Zhang, Haijun Zhang, Hui Ma, Hua Shao, Ning Wang, Victor C. M. Leung

Summary: This paper proposes a predictive and adaptive deep coding (PADC) framework that achieves flexible code rate optimization with a given target transmission quality requirement. By using a variable code length enabled DeepJSCC model, an Oracle Network model, and a CR optimizer, PADC can minimize bandwidth consumption while guaranteeing the PSNR constraint for each image data in wireless image transmission tasks.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Joint Client Selection and Bandwidth Allocation Algorithm for Federated Learning

Haneul Ko, Jaewook Lee, Sangwon Seo, Sangheon Pack, Victor C. M. Leung

Summary: In federated learning, low computing power, poor wireless channel conditions, and insufficient data can result in a long convergence time. To address this, a constrained Markov decision process (CMDP) problem is formulated to minimize the average round time while maintaining minimum numbers of trained data and trained data classes. The CMDP problem is converted into a linear programming (LP) to obtain the optimal scheduling policy. Additionally, a joint client selection and bandwidth allocation algorithm (JCSBA) is developed to reduce the curse of dimensionality in CMDP and effectively reduce the convergence time by up to 49%.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks

Haoyuan Pan, Tse-Tin Chan, Victor C. M. Leung, Jianqiang Li

Summary: This paper investigates the information freshness in two-way relay networks (TWRNs) using physical-layer network coding (PNC). PNC reduces communication latency by converting electromagnetic waves into network-coded messages. The study focuses on the average age of information (AoI) in TWRNs with and without automatic repeat request (ARQ). The proposed uplink-lost-then-drop (ULTD) protocol combines packet drop and ARQ to improve average AoI in TWRNs.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Electrical & Electronic

CPAHP: Conditional Privacy-Preserving Authentication Scheme With Hierarchical Pseudonym for 5G-Enabled IoV

Jingwei Liu, Chuntian Peng, Rong Sun, Lei Liu, Ning Zhang, Schahram Dustdar, Victor C. M. Leung

Summary: As a representative application scenario of the Internet of Things (IoT), Internet of Vehicles (IoV) plays an important role in intelligent transportation. However, the data traffic exchanged in IoV is vulnerable to privacy leakage. To address this issue, a conditional privacy-preserving authentication scheme with hierarchical pseudonyms (CPAHP), based on elliptic curve Diffie-Hellman (ECDH) problem, is proposed for 5G-enabled IoV. The scheme ensures protection of real identities and movement tracks of vehicles while allowing recovery of malicious vehicles' identities through corresponding pseudonyms. Furthermore, blockchain technology is introduced to facilitate smooth sharing of traffic information among vehicles. The scheme not only meets security requirements but also provides higher computational efficiency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Trusted Collaboration for MEC-Enabled VR Video Streaming: A Multi-Agent Reinforcement Learning Approach

Yueqiang Xu, Heli Zhang, Xi Li, F. Richard Yu, Victor C. M. Leung, Hong Ji

Summary: This paper presents a trusted collaboration framework for managing video buffering in VR devices in a distributed environment. By collaboratively processing rendering tasks and using a trust evaluation method for collaborator selection, an optimization problem is solved through joint optimization. Simulation results show that this approach achieves good performance.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Situation-Aware Cluster and Quantization Level Selection Algorithm for Fast Federated Learning

Sangwon Seo, Jaewook Lee, Haneul Ko, Sangheon Pack

Summary: The selection of clients and quantization levels in federated learning has a significant impact on learning time and accuracy. Considering factors such as computational power, communication capacity, and data distribution, we propose a joint optimization problem for clustering and selecting clusters with quantization levels. To address the complexity of the problem, we introduce the situation-aware cluster and quantization level selection (SITUA-CQ) algorithm. Simulation results demonstrate that SITUA-CQ reduces round time by up to 80.3% compared to conventional algorithms.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Privacy-Preserving Proxy Re-Encryption With Decentralized Trust Management for MEC-Empowered VANETs

Xu Han, Daxin Tian, Jianshan Zhou, Xuting Duan, Zhengguo Sheng, Victor C. M. Leung

Summary: This paper proposes an aggregated security solution for MEC applications in VANETs, which can protect the privacy of vehicle identities while enabling confidential, efficient, and trustworthy data sharing.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2023)

Article Computer Science, Artificial Intelligence

Blockchain-Based Cooperative Computation Offloading and Secure Handover in Vehicular Edge Computing Networks

Ping Lang, Daxin Tian, Xuting Duan, Jianshan Zhou, Zhengguo Sheng, Victor C. M. Leung

Summary: In response to the data processing needs of intelligent vehicles, vehicular edge computing (VEC) uses roadside computing resources to provide proximity computing services for vehicles, forming a new computing paradigm. This article proposes a cooperative computation offloading (CO) and secure handover framework utilizing blockchain technology to ensure efficient and secure CO. The framework includes models for vehicle mobility and CO handover, along with a consensus mechanism for data synchronization and immutability. A cooperative CO decision optimization is formulated and solved using multiagent deep reinforcement learning. Extensive simulations validate the performance and effectiveness of the proposed method.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2023)

Article Computer Science, Artificial Intelligence

Influence Maximization in Complex Networks by Using Evolutionary Deep Reinforcement Learning

Lijia Ma, Zengyang Shao, Xiaocong Li, Qiuzhen Lin, Jianqiang Li, Victor C. M. Leung, Asoke K. Nandi

Summary: This article proposes an evolutionary deep reinforcement learning algorithm called EDRL-IM for influence maximization in complex networks. By combining evolutionary algorithm and deep reinforcement learning algorithm, EDRL-IM outperforms state-of-the-art methods in finding seed nodes.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2023)

Article Computer Science, Hardware & Architecture

Collaborative Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud Network

Shihao Shen, Yiwen Han, Xiaofei Wang, Shiqiang Wang, Victor C. M. Leung

Summary: This paper introduces KaiS, a learning-based scheduling framework, to improve the long-term throughput rate of edge-cloud networks. KaiS utilizes a coordinated multi-agent actor-critic algorithm for decentralized request dispatch and dynamic dispatch spaces within the edge cluster. It also employs graph neural networks to embed system state information and reduce orchestration dimensionality through stepwise scheduling.

IEEE-ACM TRANSACTIONS ON NETWORKING (2023)

Article Computer Science, Information Systems

Efficient Resource Scheduling for Interference Alleviation in Dynamic Coexisting WBANs

Ling Fan, Xuxun Liu, Huan Zhou, Victor C. M. Leung, Jian Su, Alex X. Liu

Summary: In this paper, an exchange-free resource scheduling scheme is proposed to address the interference problem in dynamic coexisting WBANs. Transmission channel/slot allocation scheme based on a Latin square and retransmission time-slot selection scheme based on a hash function are designed for data transmission and retransmission respectively. Compared with existing solutions, this work enables independent resource allocation and coordination, ensuring adaptability to fast changes in WBANs, and guarantees contention-free resource allocation for both transmission and retransmission, effectively addressing the interference problem.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Cybernetics

Multidocument Aspect Classification for Aspect-Based Abstractive Summarization

Ye Wang, Yingmin Zhou, Mengzhu Wang, Zhenghan Chen, Zhiping Cai, Junyang Chen, Victor C. M. Leung

Summary: Multidocument aspect-based summarization aims to generate focused summaries based on target aspects from relevant documents. A two-stage framework is proposed that first discovers the latent relationship among aspects and then uses relevant sentences to generate abstractive summaries. The model utilizes tag mask training strategy to exploit latent dependencies among aspects and improve the interpretability of the model. Experimental results show accurate aspect discovery and improvements in summarization compared to strong baselines.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

暂无数据