To reduce greenhouse gas emissions, countries around the world are pursuing electrification policies. In residential areas, electrification will increase electricity supply and demand, which is expected to increase grid congestion at a faster rate than grids can be reinforced. Battery energy storage (BES) has the potential to reduce grid congestion and defer grid reinforcement, thus supporting the energy transition. But, BES could equally exacerbate grid congestion. This leads to the question: What are the trade-offs between different battery control strategies, considering battery performance and battery grid impacts? This paper addresses this question using the battery energy storage evaluation method (BESEM), which interlinks a BES model with an electricity grid model to simulate the interactions between these two systems. In this paper, the BESEM is applied to a case study, wherein the relative effects of different BES control strategies are compared. The results from this case study indicate that batteries can reduce grid congestion if they are passively controlled (i.e., constraining battery power) or actively controlled (i.e., overriding normal battery operations). Using batteries to reduce congestion was found to reduce the primary benefits provided by the batteries to the battery owners, but could increase secondary benefits. Further, passive battery controls were found to be nearly as effective as active battery controls at reducing grid congestion in certain situations. These findings indicate that the trade-offs between different battery control strategies are not always obvious, and should be evaluated using a method like the BESEM.
DOCUMENT
Battery energy storage (BES) can provide many grid services, such as power flow management to reduce distribution grid overloading. It is desirable to minimise BES storage capacities to reduce investment costs. However, it is not always clear how battery sizing is affected by battery siting and power flow simultaneity (PFS). This paper describes a method to compare the battery capacity required to provide grid services for different battery siting configurations and variable PFSs. The method was implemented by modelling a standard test grid with artificial power flow patterns and different battery siting configurations. The storage capacity of each configuration was minimised to determine how these variables affect the minimum storage capacity required to maintain power flows below a given threshold. In this case, a battery located at the transformer required 10–20% more capacity than a battery located centrally on the grid, or several batteries distributed throughout the grid, depending on PFS. The differences in capacity requirements were largely attributed to the ability of a BES configuration to mitigate network losses. The method presented in this paper can be used to compare BES capacity requirements for different battery siting configurations, power flow patterns, grid services, and grid characteristics.
DOCUMENT
The neighborhood of Houtlaan in Assen, the Netherlands, has ambitious targets for reducing the neighborhood’scarbon emissions and increasing their production of their own, sustainable energy. Specifically, they wish toincrease the percentage of houses with a heat pump, electric vehicle (EV) and solar panels (PV) to 60%, 70%and 80%, respectively, by the year 2030. However, it was unclear what the impacts of this transition would be onthe electricity grid, and what limitations or problems might be encountered along the way.Therefore, a study was carried out to model the future energy load and production patterns in Houtlaan. Thepurpose of the model was to identify and quantify the problems which could be encountered if no steps are takento prevent these problems. In addition, the model was used to simulate the effectiveness of various proposedsolutions to reduce or eliminate the problems which were identified.
DOCUMENT
Peer-to-peer (P2P) energy trading has been recognized as an important technology to increase the local self-consumption of photovoltaics in the local energy system. Different auction mechanisms and bidding strategies haven been investigated in previous studies. However, there has been no comparatively analysis on how different market structures influence the local energy system’s overall performance. This paper presents and compares two market structures, namely a centralized market and a decentralized market. Two pricing mechanisms in the centralized market and two bidding strategies in the decentralized market are developed. The results show that the centralized market leads to higher overall system self-consumption and profits. In the decentralized market, some electricity is directly sold to the grid due to unmatchable bids and asks. Bidding strategies based on the learning algorithm can achieve better performance compared to the random method.
DOCUMENT
Existing unreinforced masonry buildings in seismically active regions are in urgent need of consolidation and preservation against seismic action to prevent damage and loss of financial resources. In this research, an experimental study of externally confined brick masonry piers, which are frequently preferred as load-bearing elements in historical buildings, was conducted. The confinement system included a combination of open-grid basalt textile and mortar. Eighteen masonry pier specimens were produced using solid bricks collected from a historical building constructed in approximately the 1930s and a local mortar with substandard mechanical characteristics to simulate mortar properties in existing heritage buildings. All the square/rectangular pier specimens were tested under concentric compressive loads. In general, confinement of the tested textile-reinforced mortar (TRM) improved the energy dissipation of the masonry piers significantly. A comparison was made between the experimental results and theoretical predictions using the available analytical models. The compressive strengths predicted by the models are satisfactory.
LINK
In order to design effective Persuasive Technology (PT) interventions, it is essential that designers understand the multitude of factors that lead to behavioral change, rather than guessing at a solution or imitating successful techniques without understanding why. The few available PT design frameworks solely distinguish behavioral determinants on an individual (micro) level (e.g., motivation), whereas successfully persuading a user is a multifaceted and complex task depending also on factors on a meso (e.g., available resources) and macro (e.g., social support and praise) level. We developed an analysis grid that enables PT designers to acknowledge the multifaceted character of determinants leading to behavioral change and select appropriate PT channels and strategies, preventing the failure of PT design. This analysis grid was validated in a case study in which we designed a PT intervention aimed at reporting minor crime incidents among citizens.
DOCUMENT
The security of online assessments is a major concern due to widespread cheating. One common form of cheating is impersonation, where students invite unauthorized persons to take assessments on their behalf. Several techniques exist to handle impersonation. Some researchers recommend use of integrity policy, but communicating the policy effectively to the students is a challenge. Others propose authentication methods like, password and fingerprint; they offer initial authentication but are vulnerable thereafter. Face recognition offers post-login authentication but necessitates additional hardware. Keystroke Dynamics (KD) has been used to provide post-login authentication without any additional hardware, but its use is limited to subjective assessment. In this work, we address impersonation in assessments with Multiple Choice Questions (MCQ). Our approach combines two key strategies: reinforcement of integrity policy for prevention, and keystroke-based random authentication for detection of impersonation. To the best of our knowledge, it is the first attempt to use keystroke dynamics for post-login authentication in the context of MCQ. We improve an online quiz tool for the data collection suited to our needs and use feature engineering to address the challenge of high-dimensional keystroke datasets. Using machine learning classifiers, we identify the best-performing model for authenticating the students. The results indicate that the highest accuracy (83%) is achieved by the Isolation Forest classifier. Furthermore, to validate the results, the approach is applied to Carnegie Mellon University (CMU) benchmark dataset, thereby achieving an improved accuracy of 94%. Though we also used mouse dynamics for authentication, but its subpar performance leads us to not consider it for our approach.
DOCUMENT
Lectorale redeboekje naar aanleiding van de intrede in het lectoraat Systeemintegratie in de energietransitie
MULTIFILE