Access to electricity is a persistent, endemic challenge impeding development in Sub-Saharan Africa. Decades of postcolonial underinvestment have resulted in just 80 GW of installed generation capacity?less than that ...
详细信息
The purpose of this work is to calculate Surge and Swab pressure in oil wells with eccentricity between drill string and wellbore or casing string. Analysis of this phenomenon, in which the fluid is confined between t...
详细信息
ISBN:
(纸本)9781509023219
The purpose of this work is to calculate Surge and Swab pressure in oil wells with eccentricity between drill string and wellbore or casing string. Analysis of this phenomenon, in which the fluid is confined between two eccentric cylinders, are made. The conformal mapping is used to lead the eccentric domain into the concentric domain, since the usual models correspond to concentric geometries. The results of this study, using the proposed methodology, are presented and discussed.
Recently cognitive radio technology gets attention to enhance the performance of smart grid communication networks. In this paper, we present a cognitive radio enabled smart grid architecture. We then discuss major cy...
详细信息
Recently cognitive radio technology gets attention to enhance the performance of smart grid communication networks. In this paper, we present a cognitive radio enabled smart grid architecture. We then discuss major cyber security challenges in smart grid deployment and additional challenges introduced by cognitive radio technology. Spectrum sensing is one of the important aspect for opportunistic spectrum access in cognitive radio enabled smart grid networks. Cooperative spectrum sensing can improve the sensing performance in which multiple cognitive radio users cooperate to sense primary user bands. However, cooperative spectrum sensing is vulnerable to incumbent emulation and spectrum sensing data falsification (SSDF) attacks. Thus, we propose a two-stage scheme for defense against SSDF attacks. Simulation results show that the proposed two-stage scheme can identify and exclude the attackers accurately.
This paper presents a novel method of actuation for multiple untethered microrobots with a global magnetic field generated by a single conical permanent magnet. The microrobots in our experiments were chrome-steel sph...
详细信息
ISBN:
(纸本)9781467381840
This paper presents a novel method of actuation for multiple untethered microrobots with a global magnetic field generated by a single conical permanent magnet. The microrobots in our experiments were chrome-steel spheres with a diameter size of 500 μm and cubical neodymium magnets of 250 μm and 500 μm in size. These robots can perform cooperative planar motions compatible with micromanipulation tasks such as grasping. The cooperative grasping behavior is produced by the magnetic field gradient controlled by the 5 DOF position of the conical permanent magnet with respect to the robots' workspace. The microrobots are also capable of swarming motion with a leader and formation following behavior. Simulation and experimental results are offered to validate the potential of this method for automation at the micro-scale.
In deregulated electricity markets, generation companies with the aim of maximum revenue need to provide trading strategies to the electricity trading market, which contributed to a self-scheduling model. When conside...
详细信息
With the proliferation of mobile devices, ubiquitous connectivity is becoming more and more desirable. Enterprise Wireless Local Area Network (WLAN) technologies provide such connectivity in several environments. In s...
详细信息
With the proliferation of mobile devices, ubiquitous connectivity is becoming more and more desirable. Enterprise Wireless Local Area Network (WLAN) technologies provide such connectivity in several environments. In such deployments, configuration and management is done centrally using the vendor independent Control and Provisioning of Wireless Access Points (CAPWAP) protocol. However, the controllers provide little to no room for network programmability. In this paper, we propose a Software Defined Networking (SDN) framework for enterprise WLANs. This framework will provide network programmability allowing the network administrators to deploy customized applications for utilizing the WLANs. We also propose a seamless, client-unaware mobility mechanism which runs on the proposed framework.
Robotic skin with embedded pressure, temperature, and distance sensors are increasingly useful in safe and intuitive human-robot collaboration scenarios. Design problems for distributed arrays of skin sensors. Such as...
详细信息
This work proposes itself through mathematical modeling, simulating the electrical interactions between two electrical generators, an induction generator and a synchronous generator connected to a common bus in steady...
详细信息
ISBN:
(纸本)9781467387576
This work proposes itself through mathematical modeling, simulating the electrical interactions between two electrical generators, an induction generator and a synchronous generator connected to a common bus in steady state, subject to non-linear load. By comparing the modeling of the two machines, we can see that the induction generator will present best way for the harmonic currents flowing in common bus. Experimental tests have confirmed the results of comparative modeling of the electric generators. It was evident that the induction generator, in addition to increasing the active power to the electrical system, could reduce current harmonics components present at the connection point improving the voltage profile in the network.
Android robots with human-like appearance can engage in superior conversational interaction with humans due to their ability to generate expressive faces. In this paper we describe a learning algorithm to map the rich...
详细信息
暂无评论