skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Turning a coal state to a green state: Identifying themes of support and opposition to decarbonize the energy system in the United States
Award ID(s):
1658804
PAR ID:
10318732
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Energy Research & Social Science
Volume:
82
Issue:
C
ISSN:
2214-6296
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Traditional state estimation (SE) methods that are based on nonlinear minimization of the sum of localized measurement error functionals are known to suffer from nonconvergence and large residual errors. In this paper we propose an equivalent circuit formulation (ECF)-based SE approach that inherently considers the complete network topology and associated physical constraints. We analyze the mathematical differences between the two approaches and show that our approach produces a linear state-estimator that is mathematically a quadratic programming (QP) problem with closed-form solution. Furthermore, this formulation imposes additional topology-based constraints that provably shrink the feasible region and promote convergence to a more physically meaningful solution. From a probabilistic viewpoint, we show that our method applies prior knowledge into the estimate, thus converging to a more physics-based estimate than the traditional observation-driven maximum likelihood estimator (MLE). Importantly, incorporation of the entire system topology and underlying physics, while being linear, makes ECF-based SE advantageous for large-scale systems. 
    more » « less
  2. This paper is concerned with the global routing system of the Internet, its serious and persistent vulnerabilities, the multi-disciplinary considerations shaping this space, and recent trends that finally improve its security. We report real-world evidence of the state of routing security with the goal of discussing possible options for better security. We offer two high-level conclusions. First, in designing an approach it is all-important to understand complexities and incentives for deployment. Second, any scheme that is picked for deployment will take time to have an effect, so having a realistic view of how quickly change can be accomplished is essential. 
    more » « less