Search results for "Protocol"
showing 10 items of 1808 documents
NB PLC and Software Defined Networking for Smart Grid Applications
2017
During the last years, the installation of Distributed Energy Resources (DERs) and the expected diffusion of Electrical Vehicles (EVs), is increasing the complexity of the distribution grid, making the management of the grid operated by Distribution System Operators (DSOs) more difficult. The Smart Grid approach tries to provide a response to these troubles, by means of a strong interaction between the power grid and Information and Communication Technology (ICT) infrastructures. The drawback of this approach is an increase in the management effort of the ICT infrastructures, for which the DSO are not prepared. Software Defined Networking (SDN) is an approach developed to manage complex ICT…
Guidelines for the design and implementation of the ARPCC control applied to grid-connected converters
2013
Abstract This paper presents implementation details of the adaptive robust predictive current control (ARPCC) applied to a grid-connected converter, such as feed-forward cancellation protocol, the selection of the observer gain and adaptive parameters or the sampling options, needed to get the best performance of this control. The feed-forward term cancellation permits to achieve a very low harmonic distortion in current waveforms when the voltage sensing circuits are well calibrated. A detailed gain adjustment protocol of the voltage sensing circuits is presented in this paper. Moreover, a control design procedure based on the observer gain L o boundaries and the adaptive parameters has be…
Disturbing Load Detection in Three-Wire and Four-Wire Systems Based on Novel Nonactive Powers From IEEE 1459-2000
2010
This paper presents an enhanced approach for the detection of disturbing loads in distorted and/or unbalanced three-phase power systems, both three-wire and four-wire. It is based on the IEEE Std. 1459-2000 effective apparent power resolution, and it requires only the separation of the fundamental components of voltage and current from the remaining harmonic content. In this paper, the formulation of the novel approach is given, and its effectiveness is discussed by means of several simulation tests, which were carried out on a simple test system.
Mobile Wireless Interfaces: In Search for the Limits
2002
With the proliferation of 2G and 3G Telecom and other wireless networks hundred of millions of users will be able to access wireless services with their terminals in only a few years. In this paper we discuss the possibilities and limitations of existing and emerging mobile technologies and methodologies for porting information and functionality from traditional PCs to mobile devices and vice versa. We argue that in order to be able to properly port things between devices an equivalence concept for user interfaces is required.
A Novel Wireless Sensor Network for Electric Power Metering
2015
Wireless sensor network with lightweight and efficient communication infrastructures are today a great interest, both at research and industrial level, as they are the basis for reliable monitoring services. Mesh networks are ideal candidates in this scenario, as they can be very fault-tolerant. After introducing wireless network systems requirements, we show the design of a mesh network routing protocol based on AODV schemas. Its implementation runs on top of low-cost off-the-shelf components, and allowed us to build a custom power meter wireless sensor node.
New method for real-time dynamic focusing through interfaces
2013
[EN] In nondestructive evaluation (NDE) a coupling medium (wedge) is frequently inserted between the array probe and the object being evaluated. In this situation, focal law computing is complicated by the refraction effects at the interface. Furthermore, there are not known techniques to perform dynamic focusing by hardware in these conditions. This work addresses these problems by following a two-step procedure. First, a virtual array that operates in a single medium with nearly equivalent time-of-flight to the foci is obtained. Then, simple hardware is proposed to perform dynamic focusing in real-time. It operates with arrays of any geometry as required by the virtual array in presence o…
Decentralized intrusion detection for secure cooperative multi-agent systems
2007
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A novel decentralized and scalable architecture that can be adopted to realize a monitor of the agents’ behavior is proposed. We consider agents which may perform different independent tasks, but cooperate to guarantee the entire system’s safety. Agents plan their next actions by following a set of rules which is shared among them. Such rules are decentralized, i.e. they dictate actions that depend only on configurations of neighboring agents. Some agents may not be acting according to this cooperation protocol, due to tampering or spontaneous failure. To detect such misbehaviors we propose a so…
Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
2008
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…
Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems
2014
Abstract This paper addresses the problem of detecting possible intruders in a group of autonomous robots which coexist in a shared environment and interact with each other according to a set of common rules. We consider intruders as robots which misbehave, i.e. do not follow the rules, because of either spontaneous failures or malicious reprogramming. Our goal is to detect intruders by observing the congruence of their behavior with the social rules as applied to the current state of the overall system. Moreover, in accordance with the fully distributed nature of the problem, the detection itself must be performed by individual robots, based only on local information. We present a general …
Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments
2013
In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…