نتایج جستجو برای: dr aggregator

تعداد نتایج: 81241  

2017
Keita Emura

Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since the aggregator does not learn individual data that may reveal users’ habits and behaviors, several applications, such as privacy-preserving smart metering, have been considered. In this paper, we ...

Journal: :CoRR 2017
Jesus E. Contreras-Ocaña Miguel A. Ortega-Vazquez Baosen Zhang

An important function of aggregators is to enable the participation of small energy storage units in electricity markets. This paper studies two generally overlooked aspects related to aggregators of energy storage: i) the relationship between the aggregator and its constituent storage units and ii) the aggregator’s effect on system welfare. Regarding i), we show that short-term outcomes can be...

Journal: :IEEE Access 2022

Demand Response (DR) programs show great promise for energy saving and load profile flattening. They bring about an opportunity indirect control of end-users’ demand based on different price policies. However, the difficulty in characterizing price-responsive behavior customers is a significant challenge towards optimal selection these This paper proposes Aggregator (DRA) transactive policy gen...

2012
R. M. S. Parvathi

Problem statement: Wireless sensor networks, brings out variety of different challenges at energy level, integrity, authentication, communication cost. Approach: In the secure data aggregation techniques, reduction in the energy consumption was not elaborated in detail, since aggregator means of connection to sink was either direct or through other aggregators which need high energy level. Resu...

2014
Yonglei Yao Jingfa Liu Naixue Xiong

Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data...

2014
Marina González Vayá Luis Baringo Göran Andersson

With a large-scale introduction of plug-in electric vehicles (PEVs), a new entity, the PEV fleet aggregator, is expected to be responsible for managing the charging of, and for purchasing electricity for, the vehicles. This book chapter deals with the problem of an aggregator bidding into the day-ahead electricity market with the objective of minimizing charging costs while satisfying the PEVs’...

Journal: :IEEE Transactions on Smart Grid 2021

Power utilities are adopting Automated Demand Response (ADR) to replace the costly fuel-fired generators and preempt congestion during peak electricity demand. Similarly, third-party (DR) aggregators leveraging controllable small-scale electrical loads provide on-demand grid support services utilities. Some have started employing Artificial Intelligence (AI) learn energy usage patterns of consu...

Journal: :Frontiers in Energy Research 2022

Multiple 5G base stations (BSs) equipped with distributed photovoltaic (PV) generation devices and energy storage (ES) units participate in active distribution network (ADN) demand response (DR), which is expected to be the best way reduce cost of BSs provide flexibility resources for ADN. However, standalone PV-integrated BS has characteristics wide distribution, small volume, large load fluct...

Journal: :IACR Cryptology ePrint Archive 2015
Iraklis Leontiadis Ming Li

The progress in communication and hardware technology increases the computational capabilities of personal devices. Data is produced massively from ubiquitous devices that cannot be stored locally. Moreover, third party authorities in order to increase their value in the market with more knowledge, seek to collect individual data inputs, such that they can make a decision with more relevant inf...

2011
Elaine Shi T.-H. Hubert Chan Eleanor G. Rieffel Richard Chow Dawn Xiaodong Song

We consider how an untrusted data aggregator can learn desired statistics over multiple participants’ data, without compromising each individual’s privacy. We propose a construction that allows a group of participants to periodically upload encrypted values to a data aggregator, such that the aggregator is able to compute the sum of all participants’ values in every time period, but is unable t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید