scholarly journals A multi-agent based scheduling algorithm for adaptive electric vehicles charging

2016 ◽  
Vol 177 ◽  
pp. 354-365 ◽  
Author(s):  
Erotokritos Xydas ◽  
Charalampos Marmaras ◽  
Liana M. Cipcigan
Energies ◽  
2020 ◽  
Vol 13 (19) ◽  
pp. 5112 ◽  
Author(s):  
Monika Hall ◽  
Achim Geissler

Increasing numbers of photovoltaic systems and heat pumps in existing building clusters can lead to an overload of the associated electric grid substations. Based on a multi-agent-based simulation of three building cluster types the impact of building flexibility in regard to the residual substation load is studied. Each building announces its available flexibility, e.g., “heat pump can be switched off/on”. A cluster master coordinator evaluates the incoming offers and decides which offers are accepted in regard to the substation’s capacity utilization. The goal is to honour the substation’s limit by shifting the residual load. This paper presents results from three typical urban building clusters for different penetration scenarios in regard to heat pumps, photovoltaic systems, batteries and electric vehicles. It is shown that in the studied building clusters a high penetration of heat pumps and photovoltaic systems can violate the existing substation’s limits, regardless of the efforts by the master coordinator. Batteries of typical capacities cannot reduce the peak residual load. The load shifting options of the master coordinator are limited.


2013 ◽  
Vol 133 (9) ◽  
pp. 1652-1657 ◽  
Author(s):  
Takeshi Nagata ◽  
Kosuke Kato ◽  
Masahiro Utatani ◽  
Yuji Ueda ◽  
Kazuya Okamoto ◽  
...  

2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


Sign in / Sign up

Export Citation Format

Share Document