2021
DOI: 10.1089/big.2021.29048.cfp
|View full text |Cite
|
Sign up to set email alerts
|

Call for Special Issue Papers: Cloud Computing and Big Data for Cognitive IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The algorithm first determines the power balance of each distribution provider (such as the State Grid and renewable energy suppliers) by analyzing the load sharing relationship between different access servers and the central station and between each end user. Secondly, after the power required by each user is maximized according to the local optimal solution, the global optimal control is carried out for the whole distributed energy system, and the voltage deviation of the power supply and the generator set under the load at a single node is solved by the piecewise equilibrium state method [13][14].…”
Section: Distributed Energy Detectionmentioning
confidence: 99%
“…The algorithm first determines the power balance of each distribution provider (such as the State Grid and renewable energy suppliers) by analyzing the load sharing relationship between different access servers and the central station and between each end user. Secondly, after the power required by each user is maximized according to the local optimal solution, the global optimal control is carried out for the whole distributed energy system, and the voltage deviation of the power supply and the generator set under the load at a single node is solved by the piecewise equilibrium state method [13][14].…”
Section: Distributed Energy Detectionmentioning
confidence: 99%
“…Control user operation rights through user roles, permissions, etc., to prevent users from overstepping their authority to operate, data tampering; the existence of deliberate destruction of system data information, the need for timely backup of relevant business data, encryption of data processing. Also focus on the use of operation logs for user operation of core functional modules to facilitate timely repair of abnormal problems after they occur [14][15].…”
Section: Performance Requirements Analysis Of CD Intelligence Detecti...mentioning
confidence: 99%