Fuzzy sets and fuzzy logic can be used for efficient data mining, classification, and value prediction. We propose a genetically evolved fuzzy predictor to estimate the output of a Photovoltaic Power Plant. Photovoltaic Power Plants (PVPPs) are classified as power energy sources with unstable supply of electrical energy. It is necessary to back up power energy from PVPPs for stable electric network operation. An optimal value of back up power can be set with reliable prediction models and significantly contribute to the robustness of the electric network and therefore help in the building of intelligent power grids.
Owing to the constantly rising energy demand, Internal Combustion Engine (ICE)-equipped vehicles are being replaced by Electric Vehicles (EVs). The other advantage of using EVs is that the batteries can be utilised as an energy storage device to increase the penetration of renewable energy sources. Integrating EVs with the grid is one of the recent advancements in EVs using Vehicle-to-Grid (V2G) technology. A bidirectional technique enables power transfer between the grid and the EV batteries. Moreover, the Bidirectional Wireless Power Transfer (BWPT) method can support consumers in automating the power transfer process without human intervention. However, an effective BWPT requires a proper vehicle and grid coordination with reasonable control and compensation networks. Various compensation techniques have been proposed in the literature, both on the transmitter and receiver sides. Selecting suitable compensation techniques is a critical task affecting the various design parameters. In this study, the basic compensation topologies of the Series–Series (SS), Series–Parallel (SP), Parallel–Parallel (PP), Parallel–Series (SP), and hybrid compensation topology design requirements are investigated. In addition, the typical control techniques for bidirectional converters, such as Proportional–Integral–Derivative (PID), sliding mode, fuzzy logic control, model predictive, and digital control, are discussed. In addition, different switching modulation schemes, including Pulse-Width Modulation (PWM) control, PWM + Phase Shift control, Single-Phase Shift, Dual-Phase Shift, and Triple-Phase Shift methods, are discussed. The characteristics and control strategies of each are presented, concerning the typical applications. Based on the review analysis, the low-power (Level 1/Level 2) charging applications demand a simple SS compensation topology with a PID controller and a Single-Phase Shift switching method. However, for the medium- or high-power applications (Level 3/Level 4), the dual-side LCC compensation with an advanced controller and a Dual-Side Phase-Shift switching pattern is recommended.
Power quality (PQ) monitoring and detection has emerged as an essential requirement due to the proliferation of sensitive power electronic interfacing devices, electric vehicle charging stations, energy storage devices, and distributed generation energy sources in the recent smart grid and microgrid scenarios. Even though, to date, the traditional approaches play a vital role in providing a solution to the above issue, the limitations, such as the requirement of significant human effort and not being scalable for large-scale power systems, force us to think of alternative approaches. Looking at a better perspective, deep-learning (DL) has gained the main attraction for various researchers due to its inherent capability to classify the data by extracting dominating and prominent features. This manuscript attempts to provide a comprehensive review of PQ detection and classification based on DL approaches to explore its potential, efficiency, and consistency to produce results accurately. In addition, this state-of-the-art review offers an overview of the novel concepts and the step-by-step method for detecting and classifying PQ events. This review has been presented categorically with DL approaches, such as convolutional neural networks (CNNs), autoencoders, and recurrent neural networks (RNNs), to analyze PQ data. This paper also highlights the challenges and limitations of using DL for PQ analysis, and identifies potential areas for future research. This review concludes that DL algorithms have shown promising PQ detection and classification results, and could replace traditional methods.
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process and enable appropriately secure wider deployment after standardization. However, lattice-based key-encapsulation mechanisms (KEMs), which are prominently represented among the finalists, have thus far received little attention when it comes to fault attacks.Interestingly, many of these KEMs exhibit structural similarities. They can be seen as variants of the encryption scheme of Lyubashevsky, Peikert, and Rosen, and employ the Fujisaki-Okamoto transform (FO) to achieve CCA2 security. The latter involves re-encrypting a decrypted plaintext and testing the ciphertexts for equivalence. This corresponds to the classic countermeasure of computing the inverse operation and hence prevents many fault attacks.In this work, we show that despite this inherent protection, practical fault attacks are still possible. We present an attack that requires a single instruction-skipping fault in the decoding process, which is run as part of the decapsulation. After observing if this fault actually changed the outcome (effective fault) or if the correct result is still returned (ineffective fault), we can set up a linear inequality involving the key coefficients. After gathering enough of these inequalities by faulting many decapsulations, we can solve for the key using a bespoke statistical solving approach. As our attack only requires distinguishing effective from ineffective faults, various detection-based countermeasures, including many forms of double execution, can be bypassed.We apply this attack to Kyber and NewHope, both of which belong to the aforementioned class of schemes. Using fault simulations, we show that, e.g., 6,500 faulty decapsulations are required for full key recovery on Kyber512. To demonstrate practicality, we use clock glitches to attack Kyber running on a Cortex M4. As we argue that other schemes of this class, such as Saber, might also be susceptible, the presented attack clearly shows that one cannot rely on the FO transform’s fault deterrence and that proper countermeasures are still needed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.