-
A Safe First-Order Method for Pricing-Based Resource Allocation in Safety-Critical Networks
Authors:
Berkay Turan,
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers i…
▽ More
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to generate ``safe prices''. This means that at no iteration should the realized demand in response to the posted prices violate the safety constraints of the network. Thus, in contrast to existing distributed first-order methods, our algorithm, called safe pricing for NUM (SPNUM), is guaranteed to produce feasible primal iterates at all iterations. At the heart of the algorithm lie two key steps that must go hand in hand to guarantee safety and convergence: 1) applying a projected gradient method on a shrunk feasible set to get the desired demand, and 2) estimating the price response function of the users and determining the price so that the induced demand is close to the desired demand. We ensure safety by adjusting the shrinkage to account for the error between the induced demand and the desired demand. In addition, by gradually reducing the amount of shrinkage and the step size of the gradient method, we prove that the primal iterates produced by the SPNUM achieve a sublinear static regret of ${\cal O}(\log{(T)})$ after $T$ time steps.
△ Less
Submitted 17 May, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Directional Optimism for Safe Linear Bandits
Authors:
Spencer Hutchinson,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
The safe linear bandit problem is a version of the classical stochastic linear bandit problem where the learner's actions must satisfy an uncertain constraint at all rounds. Due its applicability to many real-world settings, this problem has received considerable attention in recent years. By leveraging a novel approach that we call directional optimism, we find that it is possible to achieve impr…
▽ More
The safe linear bandit problem is a version of the classical stochastic linear bandit problem where the learner's actions must satisfy an uncertain constraint at all rounds. Due its applicability to many real-world settings, this problem has received considerable attention in recent years. By leveraging a novel approach that we call directional optimism, we find that it is possible to achieve improved regret guarantees for both well-separated problem instances and action sets that are finite star convex sets. Furthermore, we propose a novel algorithm for this setting that improves on existing algorithms in terms of empirical performance, while enjoying matching regret guarantees. Lastly, we introduce a generalization of the safe linear bandit setting where the constraints are convex and adapt our algorithms and analyses to this setting by leveraging a novel convex-analysis based approach.
△ Less
Submitted 11 March, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
Safe Pricing Mechanisms for Distributed Resource Allocation with Bandit Feedback
Authors:
Spencer Hutchinson,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
In societal-scale infrastructures, such as electric grids or transportation networks, pricing mechanisms are often used as a way to shape users' demand in order to lower operating costs and improve reliability. Existing approaches to pricing design for safety-critical networks often require that users are queried beforehand to negotiate prices, which has proven to be challenging to implement in th…
▽ More
In societal-scale infrastructures, such as electric grids or transportation networks, pricing mechanisms are often used as a way to shape users' demand in order to lower operating costs and improve reliability. Existing approaches to pricing design for safety-critical networks often require that users are queried beforehand to negotiate prices, which has proven to be challenging to implement in the real-world. To offer a more practical alternative, we develop learning-based pricing mechanisms that require no input from the users. These pricing mechanisms aim to maximize the utility of the users' consumption by gradually estimating the users' price response over a span of $T$ time steps (e.g., days) while ensuring that the infrastructure network's safety constraints that limit the users' demand are satisfied at all time steps. We propose two different algorithms for the two different scenarios when, 1) the utility function is chosen by the central coordinator to achieve a social objective and 2) the utility function is defined by the price response under the assumption that the users are self-interested agents. We prove that both algorithms enjoy $\tilde{O} (T^{2/3})$ regret with high probability. We then apply these algorithms to demand response pricing for the smart grid and numerically demonstrate their effectiveness.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
The Impact of the Geometric Properties of the Constraint Set in Safe Optimization with Bandit Feedback
Authors:
Spencer Hutchinson,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. I…
▽ More
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. In order to do so, we introduce the notion of the sharpness of a particular constraint set, which characterizes the difficulty of performing learning within the constraint set in an uncertain setting. This concept of sharpness allows us to identify the class of constraint sets for which the proposed algorithm is guaranteed to enjoy sublinear regret. Simulation results for this algorithm support the sublinear regret bound and provide empirical evidence that the sharpness of the constraint set impacts the performance of the algorithm.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Safe Dual Gradient Method for Network Utility Maximization Problems
Authors:
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
In this paper, we introduce a novel first-order dual gradient algorithm for solving network utility maximization problems that arise in resource allocation schemes over networks with safety-critical constraints. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to…
▽ More
In this paper, we introduce a novel first-order dual gradient algorithm for solving network utility maximization problems that arise in resource allocation schemes over networks with safety-critical constraints. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to generate \textit{safe prices}. This means that at no iteration should the realized demand in response to the posted prices violate the safety constraints of the network. Thus, in contrast to existing first-order methods, our algorithm, called the safe dual gradient method (SDGM), is guaranteed to produce feasible primal iterates at all iterations. We ensure primal feasibility by 1) adding a diminishing safety margin to the constraints, and 2) using a sign-based dual update method with different step sizes for plus and minus directions. In addition, we prove that the primal iterates produced by the SDGM achieve a sublinear static regret of ${\cal O}(\sqrt{T})$.
△ Less
Submitted 8 August, 2022;
originally announced August 2022.
-
Interpretability Guarantees with Merlin-Arthur Classifiers
Authors:
Stephan Wäldchen,
Kartikey Sharma,
Berkant Turan,
Max Zimmer,
Sebastian Pokutta
Abstract:
We propose an interactive multi-agent classifier that provides provable interpretability guarantees even for complex agents such as neural networks. These guarantees consist of lower bounds on the mutual information between selected features and the classification decision. Our results are inspired by the Merlin-Arthur protocol from Interactive Proof Systems and express these bounds in terms of me…
▽ More
We propose an interactive multi-agent classifier that provides provable interpretability guarantees even for complex agents such as neural networks. These guarantees consist of lower bounds on the mutual information between selected features and the classification decision. Our results are inspired by the Merlin-Arthur protocol from Interactive Proof Systems and express these bounds in terms of measurable metrics such as soundness and completeness. Compared to existing interactive setups, we rely neither on optimal agents nor on the assumption that features are distributed independently. Instead, we use the relative strength of the agents as well as the new concept of Asymmetric Feature Correlation which captures the precise kind of correlations that make interpretability guarantees difficult. We evaluate our results on two small-scale datasets where high mutual information can be verified explicitly.
△ Less
Submitted 22 March, 2024; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Vehicular Visible Light Communications for Automated Valet Parking
Authors:
Bugra Turan,
Ali Uyrus,
Osman Nuri Koc,
Emrah Kar,
Sinem Coleri
Abstract:
Visible light communication (VLC) is a promising Optical Wireless Communications (OWC) scheme that is demonstrated to provide secure, line-of-sight (LoS), and short-distance vehicle-to-vehicle (V2V) and vehicle-to-infrastructure(V2I) communications. Recently, automated driving applications, supported by V2I links are proposed to increase the reliability of the autonomous vehicles. To this regard,…
▽ More
Visible light communication (VLC) is a promising Optical Wireless Communications (OWC) scheme that is demonstrated to provide secure, line-of-sight (LoS), and short-distance vehicle-to-vehicle (V2V) and vehicle-to-infrastructure(V2I) communications. Recently, automated driving applications, supported by V2I links are proposed to increase the reliability of the autonomous vehicles. To this regard, we propose a VLCbased V2I scheme to increase the V2I communication redundancy of autonomous valet parking (AVP) applications, through jam-free and location-based characteristics of VLC. In this paper, we demonstrate a novel architecture to support indoor parking-garage online-map update with vehicle on-board data transmissions and location-based map update dissemination through bidirectional VLC communications. The proposed system yields error-free LoS transmissions with Direct Current Biased Optical OFDM (DCO-OFDM) up to 33 m transmitter-receiver distance enabling vehicle CAN Bus data, infrastructure camera video, and LIDAR point cloud data sharing in an indoor parking garage.
△ Less
Submitted 20 November, 2021;
originally announced February 2022.
-
Measurement Based Non-Line-Of-Sight Vehicular Visible Light Communication Channel Characterization
Authors:
Bugra Turan,
Omer Narmanlioglu,
Osman Nuri Koc,
Emrah Kar,
Sinem Coleri,
Murat Uysal
Abstract:
Vehicular visible light communication (V-VLC) aims to provide secure complementary vehicle to everything communications (V2X) to increase road safety and traffic efficiency. V-VLC provides directional transmissions, mainly enabling line-of-sight (LoS) communications. However, reflections due to nearby objects enable non-line-of-sight (NLoS) transmissions, extending the usage scenarios beyond LoS.…
▽ More
Vehicular visible light communication (V-VLC) aims to provide secure complementary vehicle to everything communications (V2X) to increase road safety and traffic efficiency. V-VLC provides directional transmissions, mainly enabling line-of-sight (LoS) communications. However, reflections due to nearby objects enable non-line-of-sight (NLoS) transmissions, extending the usage scenarios beyond LoS. In this paper, we propose a wide-band measurement-based NLoS channel characterization and evaluate the performance of direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) V-VLC scheme for NLoS channel. We propose a distance-based NLoS V-VLC channel path loss model considering reflection surface characteristics and NLoS V-VLC channel impulse response (CIR) incorporating the temporal broadening effect due to vehicle reflections through weighted double gamma function. The proposed path loss model yields higher accuracy up to 14 dB when compared to the single order reflection model whereas the CIR model estimates the full width at half maximum up to 2 ns accuracy. We further demonstrate that the target bit-error-rate of 10^-3 can be achieved up to 7.86 m, 9.79 m, and 17.62 m distances for black, orange, and white vehicle reflection induced measured NLoS V-VLC channels for DCO-OFDM transmissions.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Vehicular Visible Light Communications Noise Analysis and Autoencoder Based Denoising
Authors:
Bugra Turan,
O. Nuri Koc,
Emrah Kar,
Sinem Coleri
Abstract:
Vehicular visible light communications (V-VLC) is a promising intelligent transportation systems (ITS) technology for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications with the utilization of light-emitting diodes (LEDs). The main degrading factor for the performance of V-VLC systems is noise. Unlike traditional radio frequency (RF) based systems, V-VLC systems include ma…
▽ More
Vehicular visible light communications (V-VLC) is a promising intelligent transportation systems (ITS) technology for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications with the utilization of light-emitting diodes (LEDs). The main degrading factor for the performance of V-VLC systems is noise. Unlike traditional radio frequency (RF) based systems, V-VLC systems include many noise sources: solar radiation, background lighting from vehicles, streets, parking garages, and tunnel lights. Traditional V-VLC system noise modeling is based on the additive white Gaussian noise assumption in the form of shot and thermal noise. In this paper, to investigate both time-correlated and white noise components of the V-VLC channel, we propose a noise analysis based on Allan variance (AVAR), which provides a time-series analysis method to identify noise from the data. We also propose a generalized Wiener process-based V-VLC channel noise synthesis methodology to generate different noise components. We further propose a convolutional autoencoder(CAE) based denoising scheme to reduce V-VLC signal noise, which achieves reconstruction root mean square error (RMSE) of 0.0442 and 0.0474 for indoor and outdoor channels, respectively.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Robust Distributed Optimization With Randomly Corrupted Gradients
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents are prone to failure. We model each agent's state over time as a two-state Markov chain that indicates Byzantine or trustworthy behaviors at different time instants. We set no restrictions on the…
▽ More
In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents are prone to failure. We model each agent's state over time as a two-state Markov chain that indicates Byzantine or trustworthy behaviors at different time instants. We set no restrictions on the maximum number of Byzantine agents at any given time. We design our method based on three layers of defense: 1) temporal robust aggregation, 2) spatial robust aggregation, and 3) gradient normalization. We study two settings for stochastic optimization, namely Sample Average Approximation and Stochastic Approximation. We provide convergence guarantees of our method for strongly convex and smooth non-convex cost functions.
△ Less
Submitted 17 June, 2022; v1 submitted 28 June, 2021;
originally announced June 2021.
-
Feature and Parameter Selection in Stochastic Linear Bandits
Authors:
Ahmadreza Moradipari,
Berkay Turan,
Yasin Abbasi-Yadkori,
Mahnoosh Alizadeh,
Mohammad Ghavamzadeh
Abstract:
We study two model selection settings in stochastic linear bandits (LB). In the first setting, which we refer to as feature selection, the expected reward of the LB problem is in the linear span of at least one of $M$ feature maps (models). In the second setting, the reward parameter of the LB problem is arbitrarily selected from $M$ models represented as (possibly) overlap** balls in…
▽ More
We study two model selection settings in stochastic linear bandits (LB). In the first setting, which we refer to as feature selection, the expected reward of the LB problem is in the linear span of at least one of $M$ feature maps (models). In the second setting, the reward parameter of the LB problem is arbitrarily selected from $M$ models represented as (possibly) overlap** balls in $\mathbb R^d$. However, the agent only has access to misspecified models, i.e.,~estimates of the centers and radii of the balls. We refer to this setting as parameter selection. For each setting, we develop and analyze a computationally efficient algorithm that is based on a reduction from bandits to full-information problems. This allows us to obtain regret bounds that are not worse (up to a $\sqrt{\log M}$ factor) than the case where the true model is known. This is the best-reported dependence on the number of models $M$ in these settings. Finally, we empirically show the effectiveness of our algorithms using synthetic and real-world experiments.
△ Less
Submitted 17 June, 2022; v1 submitted 9 June, 2021;
originally announced June 2021.
-
On Robustness of the Normalized Subgradient Method with Randomly Corrupted Subgradients
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabi…
▽ More
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabilistic corruption scenario, we prove that the normalized subgradient method, whose updates rely solely on directional information of the subgradient, converges to a minimizer for convex, strongly convex, and weakly-pseudo convex functions satisfying certain conditions. Numerical evidence on linear regression and logistic classification problems support our results.
△ Less
Submitted 21 March, 2021; v1 submitted 28 September, 2020;
originally announced September 2020.
-
Competition in Electric Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the…
▽ More
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the duopoly, the equilibrium prices for rides have to be symmetric between the firms. Then, in order to study the benefits of introducing competition in the market, we derive universal theoretical bounds on the ratio of prices for rides, aggregate demand served, profits of the firms, and consumer surplus between the monopolistic and the duopolistic setting. We discuss how consumers' firm loyalty affects each of the aforementioned metrics. Finally, using the Manhattan network and demand data, we quantify the efficacy of static pricing and routing policies and compare it to real-time model predictive policies.
△ Less
Submitted 15 July, 2021; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Machine Learning Based Channel Modeling for Vehicular Visible Light Communication
Authors:
Bugra Turan,
Sinem Coleri
Abstract:
Optical Wireless Communication (OWC) propagation channel characterization plays a key role on the design and performance analysis of Vehicular Visible Light Communication (VVLC) systems. Current OWC channel models based on deterministic and stochastic methods, fail to address mobility induced ambient light, optical turbulence and road reflection effects on channel characterization. Therefore, alte…
▽ More
Optical Wireless Communication (OWC) propagation channel characterization plays a key role on the design and performance analysis of Vehicular Visible Light Communication (VVLC) systems. Current OWC channel models based on deterministic and stochastic methods, fail to address mobility induced ambient light, optical turbulence and road reflection effects on channel characterization. Therefore, alternative machine learning (ML) based schemes, considering ambient light, optical turbulence, road reflection effects in addition to intervehicular distance and geometry, are proposed to obtain accurate VVLC channel loss and channel frequency response (CFR). This work demonstrates synthesis of ML based VVLC channel model frameworks through multi layer perceptron feed-forward neural network (MLP), radial basis function neural network (RBF-NN) and Random Forest ensemble learning algorithms. Predictor and response variables, collected through practical road measurements, are employed to train and validate proposed models for various conditions. Additionally, the importance of different predictor variables on channel loss and CFR is assessed, normalized importance of features for measured VVLC channel is introduced. We show that RBF-NN, Random Forest and MLP based models yield more accurate channel loss estimations with 3.53 dB, 3.81 dB, 3.95 dB root mean square error (RMSE), respectively, when compared to fitting curve based VVLC channel model with 7 dB RMSE. Moreover, RBF-NN and MLP models are demonstrated to predict VVLC CFR with respect to distance, ambient light and receiver inclination angle predictor variables with 3.78 dB and 3.60 dB RMSE respectively.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Resilient Primal-Dual Optimization Algorithms for Distributed Resource Allocation
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient di…
▽ More
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient distributed algorithms based on primal-dual optimization when Byzantine attackers are present in the system. In particular, we design attack-resilient primal-dual algorithms for static and dynamic impersonation attacks by means of robust statistics. For static impersonation attacks, we formulate a robustified optimization model and show that our algorithm guarantees convergence to a neighborhood of the optimal solution of the robustified problem. On the other hand, a robust optimization model is not required for the dynamic impersonation attack scenario and we are able to design an algorithm that is shown to converge to a near-optimal solution of the original problem. We analyze the performances of our algorithms through both theoretical and computational studies.
△ Less
Submitted 15 September, 2020; v1 submitted 2 January, 2020;
originally announced January 2020.
-
A highly integrated, stand-alone photoelectrochemical device for large-scale solar hydrogen production
Authors:
Minoh Lee,
Bugra Turan,
Jan-Philipp Becker,
Katharina Welter,
Benjamin Klingebiel,
Elmar Neumann,
Yoo Jung Sohn,
Tsvetelina Merdzhanova,
Thomas Kirchartz,
Friedhelm Finger,
Uwe Rau,
Stefan Haas
Abstract:
Although photoelectrochemical water splitting is likely to be an important and powerful tool to provide environmentally friendly hydrogen, most developments in this field have been conducted on a laboratory scale so far. In order for the technology to make a sizeable impact on the energy transition, scaled up devices made of inexpensive and earth abundant materials must be developed. In this work,…
▽ More
Although photoelectrochemical water splitting is likely to be an important and powerful tool to provide environmentally friendly hydrogen, most developments in this field have been conducted on a laboratory scale so far. In order for the technology to make a sizeable impact on the energy transition, scaled up devices made of inexpensive and earth abundant materials must be developed. In this work, we demonstrate a scalable (64 cm2 aperture area) artificial photoelectrochemical device composed of triple-junction thin-film silicon solar cells in conjunction with an electrodeposited bifunctional nickel iron molybdenum water splitting catalyst. Our device shows a solar to hydrogen efficiency of up to 4.67% (5.33% active area) without bias assistance and wire connection. Furthermore, gas separation was enabled by incorporating a membrane in a 3D printed device frame.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
Dynamic Pricing and Fleet Management for Electric Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Ramtin Pedarsani,
Mahnoosh Alizadeh
Abstract:
The proliferation of ride sharing systems is a major drive in the advancement of autonomous and electric vehicle technologies. This paper considers the joint routing, battery charging, and pricing problem faced by a profit-maximizing transportation service provider that operates a fleet of autonomous electric vehicles. We first establish the static planning problem by considering time-invariant sy…
▽ More
The proliferation of ride sharing systems is a major drive in the advancement of autonomous and electric vehicle technologies. This paper considers the joint routing, battery charging, and pricing problem faced by a profit-maximizing transportation service provider that operates a fleet of autonomous electric vehicles. We first establish the static planning problem by considering time-invariant system parameters and determine the optimal static policy. While the static policy provides stability of customer queues waiting for rides even if consider the system dynamics, we see that it is inefficient to utilize a static policy as it can lead to long wait times for customers and low profits. To accommodate for the stochastic nature of trip demands, renewable energy availability, and electricity prices and to further optimally manage the autonomous fleet given the need to generate integer allocations, a real-time policy is required. The optimal real-time policy that executes actions based on full state information of the system is the solution of a complex dynamic program. However, we argue that it is intractable to exactly solve for the optimal policy using exact dynamic programming methods and therefore apply deep reinforcement learning to develop a near-optimal control policy. The two case studies we conducted in Manhattan and San Francisco demonstrate the efficacy of our real-time policy in terms of network stability and profits, while kee** the queue lengths up to 200 times less than the static policy.
△ Less
Submitted 1 October, 2020; v1 submitted 15 September, 2019;
originally announced September 2019.
-
Online Charge Scheduling for Electric Vehicles in Autonomous Mobility on Demand Fleets
Authors:
Nathaniel Tucker,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
In this paper, we study an online charge scheduling strategy for fleets of autonomous-mobility-on-demand electric vechicles (AMoD EVs). We consider the case where vehicles complete trips and then enter a between-ride state throughout the day, with their information becoming available to the fleet operator in an online fashion. In the between-ride state, the vehicles must be scheduled for charging…
▽ More
In this paper, we study an online charge scheduling strategy for fleets of autonomous-mobility-on-demand electric vechicles (AMoD EVs). We consider the case where vehicles complete trips and then enter a between-ride state throughout the day, with their information becoming available to the fleet operator in an online fashion. In the between-ride state, the vehicles must be scheduled for charging and then routed to their next passenger pick-up locations. Additionally, due to the unknown daily sequences of ride requests, the problem cannot be solved by any offline approach. As such, we study an online welfare maximization heuristic based on primal-dual methods that allocates limited fleet charging resources and rebalances the vehicles while avoiding congestion at charging facilities and pick-up locations. We discuss a competitive ratio result comparing the performance of our online solution to the clairvoyant offline solution and provide numerical results highlighting the performance of our heuristic.
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
Smart Charging Benefits in Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Nathaniel Tucker,
Mahnoosh Alizadeh
Abstract:
In this paper, we study the potential benefits from smart charging for a fleet of electric vehicles (EVs) providing autonomous mobility-on-demand (AMoD) services. We first consider a profit-maximizing platform operator who makes decisions for routing, charging, rebalancing, and pricing for rides based on a network flow model. Clearly, each of these decisions directly influence the fleet's smart ch…
▽ More
In this paper, we study the potential benefits from smart charging for a fleet of electric vehicles (EVs) providing autonomous mobility-on-demand (AMoD) services. We first consider a profit-maximizing platform operator who makes decisions for routing, charging, rebalancing, and pricing for rides based on a network flow model. Clearly, each of these decisions directly influence the fleet's smart charging potential; however, it is not possible to directly characterize the effects of various system parameters on smart charging under a classical network flow model. As such, we propose a modeling variation that allows us to decouple the charging and routing problems faced by the operator. This variation allows us to provide closed-form mathematical expressions relating the charging costs to the maximum battery capacity of the vehicles as well as the fleet operational costs. We show that investing in larger battery capacities and operating more vehicles for rebalancing reduces the charging costs, while increasing the fleet operational costs. Hence, we study the trade-off the operator faces, analyze the minimum cost fleet charging strategy, and provide numerical results illustrating the smart charging benefits to the operator.
△ Less
Submitted 17 September, 2019; v1 submitted 28 June, 2019;
originally announced July 2019.
-
From leaf to tree: upscaling of artificial photosynthesis
Authors:
Bugra Turan,
Jan-Philipp Becker,
Felix Urbain,
Friedhelm Finger,
Uwe Rau,
Stefan Haas
Abstract:
Energy storage becomes crucial for energy systems with an increasing share of renewable energy sources. Artificial photosynthesis, in particular photovoltaic water splitting, provides both sustainable energy generation and energy storage in the form of hydrogen. However, only a few concepts for scalable devices were reported in the literature. Here, we introduce a new concept which, by design, is…
▽ More
Energy storage becomes crucial for energy systems with an increasing share of renewable energy sources. Artificial photosynthesis, in particular photovoltaic water splitting, provides both sustainable energy generation and energy storage in the form of hydrogen. However, only a few concepts for scalable devices were reported in the literature. Here, we introduce a new concept which, by design, is scalable and compatible with every thin-film photovoltaic technology. The concept allows for independent geometrical optimization of the photovoltaic and the electrochemical part. The scalability is achieved by continuous mirroring of a base unit. We demonstrate a fully integrated, wireless device with a stable and bias-free operation for 40 hours. The concept was scaled to an area of 64 cm2 comprising 13 base units and exhibited a solar-to-hydrogen efficiency of 3.9%. The concept and its successful realization is an important contribution towards the large scale application of artificial photosynthesis.
△ Less
Submitted 11 April, 2016;
originally announced April 2016.
-
A note on the equivalence of some metric, non-Newtonian and multiplicative metric results
Authors:
Bahri Turan,
Cuneyt Cevik
Abstract:
In this short note is on the equivalence between non-Newtonian metric (particularly multiplicative metric) and metric. We present a different proof the fact that the notion of a non-Newtonian metric space is not more general than that of a metric space. Also, we emphasize that a lot of fixed point results in the non-Newtonian metric setting can be directly obtained from their metric counterparts.
In this short note is on the equivalence between non-Newtonian metric (particularly multiplicative metric) and metric. We present a different proof the fact that the notion of a non-Newtonian metric space is not more general than that of a metric space. Also, we emphasize that a lot of fixed point results in the non-Newtonian metric setting can be directly obtained from their metric counterparts.
△ Less
Submitted 11 March, 2016;
originally announced March 2016.
-
A concept for Lithography-free patterning of silicon heterojunction back-contacted solar cells by laser processing
Authors:
Bugra Turan,
Kaining Ding,
Stefan Haas
Abstract:
Silicon heterojunction (SHJ) solar cells with an interdigitated back-contact (IBC) exhibit high conversion efficiencies of up to 25.6%. However, due to the sophisticated back-side pattern of the doped layers and electrode structure many processing and patterning steps are required. A simplification of the patterning steps could ideally increase the yield and/or lower the production costs. We propo…
▽ More
Silicon heterojunction (SHJ) solar cells with an interdigitated back-contact (IBC) exhibit high conversion efficiencies of up to 25.6%. However, due to the sophisticated back-side pattern of the doped layers and electrode structure many processing and patterning steps are required. A simplification of the patterning steps could ideally increase the yield and/or lower the production costs. We propose a patterning approach for IBC SHJ solar cells free of any photo-lithography with the help of laser-induced forward transfer (LIFT) of the individual layer stacks to create the required back-contact pattern. The concept has the potential to lower the number of processing steps significantly while at the same time giving a large degree of freedom in the processing conditions optimization of emitter and BSF since deposition of the intrinsic/doped layers and processing of the wafer are all independent from each other.
△ Less
Submitted 10 June, 2015; v1 submitted 9 June, 2015;
originally announced June 2015.