This paper presents a differential energy-based protection scheme for microgrid using Ensemble Empirical Mode Decomposition (EEMD). Current signal from both ends of the line is retrieved and processed through EEMD and...
详细信息
ISBN:
(纸本)9781538659069
This paper presents a differential energy-based protection scheme for microgrid using Ensemble Empirical Mode Decomposition (EEMD). Current signal from both ends of the line is retrieved and processed through EEMD and first Intrinsic Mode Function (IMF) is selected for energy calculation. Differential energy is calculated for each line and a threshold is set for fault detection. IEEE 34 bus distribution system is modified as a microgrid for fault analysis and simulated on PSCAD/EMTDC platform. LG and LLLG faults are simulated at different fault location for island and grid connected mode. The results obtained shows that the proposed method can detect the fault successfully in the system.
The proceedings contain 25 papers. The special focus in this conference is on Stabilization, Safety, and Security of distributed Systems. The topics include: A Privacy-Preserving Collaborative Caching Approach in Info...
ISBN:
(纸本)9783030643478
The proceedings contain 25 papers. The special focus in this conference is on Stabilization, Safety, and Security of distributed Systems. The topics include: A Privacy-Preserving Collaborative Caching Approach in Information-Centric networking;affine Tasks for k-Test-and-Set;a Combinatorial Characterization of Self-stabilizing Population Protocols;smoothed Analysis of Leader Election in distributed Networks;brief Announcement: Byzantine Geoconsensus;brief Announcements: Verifiable Data Sharing in distributedcomputing;fast Uniform Scattering on a Grid for Asynchronous Oblivious Robots;Brief Announcement: Leader Election in the ADD Communication Model;physical Zero-Knowledge Proof for Suguru Puzzle;invited Paper: Homomorphic Operations Techniques Yielding Communication Efficiency;uniform Deployment of Mobile Agents in Dynamic Rings;partial Gathering of Mobile Robots from Multiplicity-Allowed Configurations in Rings;efficient Dispersion of Mobile Agents without Global Knowledge;Brief Announcement: TRIX: Low-Skew Pulse Propagation for Fault-Tolerant Hardware;time-Optimal Self-stabilizing Leader Election on Rings in Population Protocols;brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software;boosting the Efficiency of Byzantine-Tolerant Reliable Communication;stand Up Indulgent Rendezvous;brief Announcement: Gathering in Linear Time: A Closed Chain of Disoriented and Luminous Robots with Limited Visibility;a Discrete and Continuous Study of the Max-Chain-Formation Problem: Slow down to Speed Up;Invited Paper: Reactive PLS for distributed Decision;k-Immediate Snapshot and x-Set Agreement: How Are They Related?;brief Announcement: Local Deal-Agreement Based Monotonic distributed Algorithms for Load Balancing in General Graphs.
Software-defined networking (SDN) is a relatively new technology that promotes network revolution. The most distinct characteristic of SDN is the transformation of control logic from the basic packet forwarding equipm...
详细信息
ISBN:
(数字)9781728152868
ISBN:
(纸本)9781728152868
Software-defined networking (SDN) is a relatively new technology that promotes network revolution. The most distinct characteristic of SDN is the transformation of control logic from the basic packet forwarding equipment to a centralized management unit called controller. However, the centralized control of the network resources is like a double-edged sword, for it not only brings beneficial features but also introduces single point of failure if the controller is under distributed denial of service (DDoS) attacks. In this paper, we introduce a light-weight approach based on conditional entropy to improve the SDN security with an aim of defending DDoS at the early stage. The experimental results show that the proposed method has a high average detection rate of 99.372%.
The increasing interest in utilizing distributed Generation (DG) in transmission system is due to rise in energy demand, restriction in new transmission lines, deregulated power and utility limitations. Introduction D...
详细信息
ISBN:
(纸本)9781538659069
The increasing interest in utilizing distributed Generation (DG) in transmission system is due to rise in energy demand, restriction in new transmission lines, deregulated power and utility limitations. Introduction DG into the electrical network can improve its performance technically. Both DG placement and its penetration level become critical issue for both utility and DG owners. This paper presents the extent to which DG effect the power losses depending on the type of DG, its penetration level (PL) and its optimal location. In this paper, optimal DG placement and sizing in electrical network is found by using a Directed Bee Colony (DBC) optimization algorithm. The objective is to reduce the power losses and enhance voltage profile of the electrical system. The effectiveness of the DBC had been tested on IEEE 14-bus sub-transmission system and is compared with results obtained with Particle Swarm Optimization (PSO) method. As the PL of 55-60% and 70-75% is achieved the real and reactive power losses begin to increase respectively for DGs of type-2 in the electrical system. It is also observed that the net saving cost due to DG placement is beneficial up to 65% PL of DG.
Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that c...
详细信息
ISBN:
(纸本)9781665443999;9781665444002
Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types of malicious traffic. To mitigate this potential waste of resources and improve scalability across an entire network, we propose a methodology which deploys distributed IDS in a Software Defined Network allowing them to be used for specific types of traffic as and when it appears on a network. The core of our work is the creation of an SDN application that takes input from a Snort IDS instances, thus working as a classifier for incoming network traffic with a static ruleset for those classifications. Our application has been tested on a virtualised platform where it performed as planned holding its position for limited use on static and controlled test environments.
Modern pace of Information and Communication Technologies (ICT) progress requires rapid development of completely new approaches to data processing. One of the most important criteria that should be taken into account...
详细信息
ISBN:
(数字)9781728171272
ISBN:
(纸本)9781728171289
Modern pace of Information and Communication Technologies (ICT) progress requires rapid development of completely new approaches to data processing. One of the most important criteria that should be taken into account in every computing system nowadays is its energy efficiency. Strict requirements to service availability and timeliness must be taken into account as well. In this paper new comprehensive energy efficient approach to workload processing in distributedcomputing environment is proposed. The goal of this approach is to get as close as possible to the energy-proportional computing model. Proposed approach combines the advantages of horizontal scaling and energy efficient scheduling taking into account individual power consumption characteristics of computing nodes and dynamicity of workload in modern computing systems. The efficiency of the proposed approach is proven using Matlab modeling.
The DiffServ Code Point (DSCP) field in the IP header allows to specify a desired per-hop behavior as packets traverse routers. Setting the DSCP field opportunistically, without prior contractual agreement, has recent...
详细信息
ISBN:
(纸本)9781538692233
The DiffServ Code Point (DSCP) field in the IP header allows to specify a desired per-hop behavior as packets traverse routers. Setting the DSCP field opportunistically, without prior contractual agreement, has recently become accepted practice for Internet end hosts. Measurement studies find that there is reason to hope for a DSCP setting to have an effect on traffic, and at least configuring this value is not heavily detrimental: systematic drops of packets due to non-zero DSCP values are rare, and the value is often left intact along an end-to-end path. What these studies do not discuss is whether per-hop behaviors truly are honored: what happens to packets in terms of the delay they experience? In this paper, we make an attempt to find a first answer to this by mining a dataset of our own recent large-scale measurement study. Using a deep neural network, we obtain the importance of the factors which help us understand the delay impact of the DSCP.
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) help...
详细信息
ISBN:
(纸本)9781538659069
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) helps in smooth monitoring and accounting of information and goods traversal among multiple users. However, the existing supply chain management processes lack in offering transparency of information, user's privacy, timely updates on demand peaks, improper tracing of information, quality management, deal repudiation and trust among users. To address these problems, we propose a novel framework for pharmaceutical supply chain management which uses an ethereum blockchain, a distributed ledger technology. We propose different smart contracts to manage pharmaceutical supply chain processes over an ethereum blockchain. This framework helps in achieving user privacy, transparency of the supplied drug, tracking of drugs, quality management, non-repudiation and demand supply management with the improved trust among the users. At the end, we analyze the proposed framework in terms of fulfilling the pharmaceutical supply chain management requirements.
Knowledge centric networking (KCN) is a new future internet paradigm that directly accesses key content by assigning each piece of the content a unique knowledge identifier. Knowledge transmission is realized via know...
详细信息
ISBN:
(纸本)9781538692233
Knowledge centric networking (KCN) is a new future internet paradigm that directly accesses key content by assigning each piece of the content a unique knowledge identifier. Knowledge transmission is realized via knowledge routing and forwarding. The knowledge-based routing information has more and longer prefixes than the IP-based ones. Therefore, there are more challenges to achieve the knowledge-based forwarding on the knowledge router in terms of shorter latency, low memory consumption, and fast routing table update. In this paper, we propose a tensorial knowledge-based data structure for the knowledge routing table index. The tensorial knowledge-based data structure employs the CANDECOMP/PARAFAC (CP) decomposition algorithm to extract low-dimensional information features, so the massive memory consumption can be effectively reduced. Meanwhile, we propose a distributed update method which divides the large-scale tensor to many sub-tensors during the content forwarding, leading to computing complexity reduction and low search time. Evaluation results indicate that we can restore the data from the low-dimensional information features with no error which illustrates the feasibility of proposed scheme.
暂无评论