Source: Energies, Vol. 10, No. 12, November 2017

Slides:



Advertisements
Similar presentations
Completing the EU internal energy market IFIEC, 22 November 2011
Advertisements

Review of Results from Double Auctions 20 different markets 10 buyers and 10 sellers in each market – the 5 buyers and 5 sellers on page plus.
Nan Cheng Smart Grid & VANETs Joint Group Meeting Economics of Electric Vehicle Charging - A Game Theoretic Approach IEEE Trans. on Smart Grid,
Seyed Mohamad Alavi, Chi Zhou, Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology, Chicago, IL, USA ICC 2009.
Common Cents Investment Group Monday February 2 th Welcome Christian Gabis!
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Company Name Business Plan. Business Concept Clearly state your company’s long-term mission. –Try to use words that will help direct the growth of your.
Autonomous Distributed V2G (Vehicle- to-Grid) Satisfying Scheduled Charging Authors: H. Taniguchi, T. Nakajima, K.M. Liyanage, J. Baba Presenter: Jian.
Source: KSII Transactions On Internet And Information Systems Vol. 3, No. 2, April 2009 Authors: Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee.
PAPER PRESENTATION Real-Time Coordination of Plug-In Electric Vehicle Charging in Smart Grids to Minimize Power Losses and Improve Voltage Profile IEEE.
Frankfurt (Germany), 6-9 June 2011 Hugo Morais – Portugal – Session 4 – 0810 ENERGY RESOURCES SCHEDULING IN COMPETITIVE ENVIRONMENT Authors Zita Vale,
1 A Novel Time and Frequency Synchronization Scheme for OFDM Systems Ching-Yu Wang Graduate Institute of Communication Engineering National Chi Nan University.
An Optimized EV Charging Model Considering TOU price and SOC curve Authors: Y. Cao, S. Tang, C. Li, P. Zhang, Y. Tan, Z. Zhang and J. Li Presenter: Nan.
WE`RE PERFECTIONISTS IN MAKING TRADING AND PROJECTS cc PLUMBING MENKWE CEILING ELECTRICAL PAINTING GLAZING BUILDING SPECIALIZING.
Intelligent Agent Based Auction by Economic Generation Scheduling for Microgrid Operation Wu Wen-Hao Oct 26th, 2013 Innovative Smart Grid Technologies.
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Enforcing Hard Budget Constraints Introduction The Problem: Bailouts and Soft Budget Constraints Two Types of Solution: –Markets and Hierarchies Three.
BY: A. Mahmood, I. Khan, S. Razzaq, N. Javaid, Z. Najam, N. A. Khan, M. A. Rehman COMSATS Institute of Information Technology, Islamabad, Pakistan.
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Watermarking Scheme Capable of Resisting Sensitivity Attack
Raihana Ferdous, Vallipuram Muthukkumarasamy
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Distributed Financial Technology in Payments
Capacity Market – Introduction & Illustration
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Ph.D. Research Defense Hung Khanh Nguyen Advisor: Dr. Zhu Han
Instability Of Bitcoin Without the Block Reward.
Information Unchained
THE ROLE OF DISTRIBUTION NETWORK OPERATOR IN PROMOTING COST-EFFECTIVE DISTRIBUTED GENERATION: LESSONS FROM THE UNITED STATES FOR EUROPE Karim L. Anaya,
Picode: A New Picture-Embedding 2D Barcode
Top 6 Strategies of Digital Marketing.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Life skill presentation
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
Marketers and the Internet
Crypto Mining LLC.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
البيئة السياسية للإدارة الدولية
Pricing Model In Cloud Computing
Setting the Stage for a Community Blockchain Incubator
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Distributed Ledger Technology (DLT) and Blockchain
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Source: arXiv preprint arXiv:  (2018)
EnergyNet The National Technology Initiative
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Decentralized Energy Demand Regulation in Smart Homes
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
TrustChain: A Sybil-resistant scalable blockchain
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source: Pattern Recognition Letters 29 (2008)
Smart Meter Data Privacy: A Survey
Designing Blockchain-based Applications a Case Study for Imported
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Renovating Blockchain with Distributed Database: An Open Source System
Source : Digital Signal Processing. Vol. 73, pp , Feb
Cryptocurrency Zili Zhou.
Not about digital currencies
Cryptocurrency and Blockchain Technology
Looking to the power system future An ENTSO-E perspective
Presentation transcript:

A Novel electricity Transaction Mode of Microgrids Based on Blockchain and Continuous Double Auction Source: Energies, Vol. 10, No. 12, November 2017 Authors: Jian Wang, Qiang-Gang Wang, Nian-Cheng Zhou, and Yuan Chi Speaker: Chit-Jie Chew Date: 10/11/2018

Outline Introduction Related works Proposed scheme Performance analysis Conclusions

Introduction Consumer Distributed generation(DG) Consumer Power grid Markets Distributed generation(DG) Consumer

Related work Market Low-to-high High-to-low Price: 10200/unit Unit: 3 Consumer1 DG1 Price: 10500/unit Unit: 1 Price: 10000/unit Unit: 3 Consumer2 DG2 Price: 10800/unit Unit: 4 Price: 9900/unit Unit: 4 Consumer3 DG1

Related work Miners Miner Transaction DG1 Consumer1

Proposed scheme Markets Quotes Quotes DGs Information Information Consumers Digital certificate Digital certificate Transaction costs Blockchain Transaction costs Grid Power energy

Proposed scheme Update Transaction price Market information 𝑝 𝑜𝑏𝑖𝑑 , 𝑝 𝑜𝑎𝑠𝑘 Markets Competitive equilibrium price estimation 𝜏 𝑝 𝑝 ′ Aggressiveness model Pricing strategy 𝑣,𝑐 𝑀𝑖𝑛,𝑀𝑎𝑥 𝑣,𝑐 𝑀𝑖𝑛,𝑀𝑎𝑥 𝑟,𝜃 Price constraints 𝑝 ′ Adaptive learning

Proposed scheme Aggressiveness model Intra-marginal Extra-marginal 𝜏 𝑖𝑛,𝑏 = 𝑝 ′ −𝑀𝐼𝑁 1− 𝑒 −𝑟𝜃 −1 𝑒 𝜃 −1 +𝑀𝐼𝑁 𝑟∈(−1,0) 𝑝 ′ + 𝑣− 𝑝 ′ 𝑒 𝑟𝜃 −1 𝑒 𝜃 −1 𝑟∈ 0,1 𝜏 𝑒𝑥,𝑏 = 𝑣−𝑀𝐼𝑁 1− 𝑒 −𝑟𝜃 −1 𝑒 𝜃 −1 +𝑀𝐼𝑁 𝑟∈(−1,0) 𝑣 𝑟∈ 0,1 𝜏 𝑖𝑛,𝑠 = 𝑝 ′ + 𝑀𝐴𝑋− 𝑝 ′ 𝑒 −𝑟𝜃 −1 𝑒 𝜃 −1 𝑟∈ −1,0 𝑐+ 𝑝 ′ −𝑐 1− 𝑒 𝑟𝜃 −1 𝑒 𝜃 −1 𝑟∈ 0,1 𝜏 𝑖𝑛,𝑠 = 𝑐+ 𝑀𝐴𝑋−𝑐 𝑒 −𝑟𝜃 −1 𝑒 𝜃 −1 𝑟∈ −1,0 𝑐 𝑟∈ 0,1

Proposed scheme Competitive 𝑝 ′ equilibrium price Aggressiveness estimation 𝑝 ′ Aggressiveness model 𝑟 𝑡+1 =𝑟 𝑡 + 𝛽 1 𝛿 𝑡 −𝑟 𝑡 𝛿 𝑡 = 1+𝜆 𝑟 𝑠ℎ𝑜𝑢𝑡 𝑡 ,𝜆= −0.05, 0, 0.05 𝑝 ′ = 𝑖=𝑚−𝑛 𝑛 𝑤 𝑖 𝑝 𝑖 𝜃 𝑡+1 =𝜃 𝑡 + 𝛽 2 𝜃 ′ 𝛼 +𝜃 𝑡 𝛼= 1 𝑛 𝑖=𝑚−𝑛 𝑛 𝑝 𝑖 − 𝑝 ′ 2 𝑝 ′ 𝜃 ′ 𝛼 = 𝜃 𝑚𝑎𝑥 − 𝜃 𝑚𝑖𝑛 1− 𝛼− 𝛼 𝑚𝑖𝑛 𝛼 𝑚𝑎𝑥 − 𝛼 𝑚𝑖𝑛 𝑒 2 𝛼− 𝛼 𝑚𝑖𝑛 𝛼 𝑚𝑎𝑥 − 𝛼 𝑚𝑖𝑛 −1 + 𝜃 𝑚𝑖𝑛 𝑟,𝜃 𝑤 𝑖−1 =𝜌 𝑤 𝑖 𝑖=𝑚−𝑛 𝑛 𝑤 𝑖 =1 Adaptive learning

Proposed scheme 𝜏 Aggressiveness model Pricing strategy 𝑝 𝑏 𝑡 = 𝑝 𝑂𝑏𝑖𝑑 𝑡 +𝜂 𝑚𝑖𝑛 𝑣, 𝑝 𝑂𝑎𝑠𝑘 𝑡 − 𝑝 𝑂𝑏𝑖𝑑 𝑡 , 𝑡=1 𝑝 𝑂𝑏𝑖𝑑 𝑡 +𝜂 𝜏 𝑏 𝑡 − 𝑝 𝑂𝑏𝑖𝑑 𝑡 , 𝑡≥2 𝑝 𝑠 𝑡 = 𝑝 𝑂𝑎𝑠𝑘 𝑡 −𝜂 𝑝 𝑂𝑎𝑠𝑘 𝑡 −𝑚𝑎𝑥 𝑐, 𝑝 𝑂𝑏𝑖𝑑 𝑡 , 𝑡=1 𝑝 𝑂𝑎𝑠𝑘 𝑡 −𝜂 𝑝 𝑂𝑎𝑠𝑘 𝑡 −𝜏 𝑠 𝑡 , 𝑡≥2

Proposed scheme Blockchain Transferring bitcoins Issuing energy money Arbitration refund DGs Consumers Third party

Performance analysis

Performance analysis

Performance analysis

Performance analysis

Conclusions Decentralized transactions Market equilibrium Multi-signature