Search results for "Tribute"

showing 10 items of 1455 documents

Numerical implementation of active power flow tracing methods: Practical implications on transmission networks and DR programs support

2015

The goal of this paper is to demonstrate the powerful contribution of the electric active power flow tracing methods on studying the electric transmission systems operating conditions. The tracing methods allow to impute to every generation unit and/or load the responsibility of the power flows of all the elements connected to the network. This study propose the numerical implementation of two different tracing methods on two transmission networks through Matlab® scripts developed on purpose; then the analysis is focused on identifying the loads which mostly affect the power line flows of the system. The results of this analysis point out the loads on which the application of the Demand Res…

Computer scienceDistributed computingupstream- and downstream-looking algorithmselectric transmission systemTracingDemand ResponseNeplan®computer.software_genrePower (physics)Demand responseSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaElectric power transmissionTransmission (telecommunications)Scripting languageMatlab®Point (geometry)MATLABcomputerpower flow tracingcomputer.programming_language
researchProduct

MCD: Overcoming the Data Download Bottleneck in Data Centers

2013

The data download problem in data centers describes the increasingly common task of coordinated loading of identical data to a large number of nodes. Data download is seen as a significant problem in exascale HPC applications. Uncoor-dinated reading from a central file server creates contention at the file server and its network interconnect. We propose and evaluation a reliable multicast based approach to solve the data download problem. The MCD system builds a logical multi-rooted tree based on the physical network topology and uses the logical view for a two-phase approach. In the first phase, the data is multicasted to all nodes. In the second phase, the logical tree is used for an effi…

Computer scienceDownloadbusiness.industryDistributed computingcomputer.file_formatNetwork topologyBottleneckFile serverPacket lossServerReliable multicastbusinessBitTorrentcomputerComputer network2013 IEEE Eighth International Conference on Networking, Architecture and Storage
researchProduct

Voltage Rise Issues and Mitigation Techniques Due to High PV Penetration into the Distribution Network

2018

Integration of photovoltaic systems (PV)into the low voltage (LV)grid is seen as a viable and globally accepted optionto meet the ever-increasing energy demands. However, the high PV penetration into the LV distribution grid has raised up many concerns for various stakeholders e.g. distribution company, industry partners, end users etc. The suddenchanges in the voltage level, is one of the main issues due to the reverse power flowfrom distributed energy sources to the grid, has significantly affected the behavior of the traditional LV grid. This paper has reviewed the impacts on voltage profile due to high PV penetration and different techniques used for mitigation these issues such as acti…

Computer scienceEnd userbusiness.industry020209 energyPhotovoltaic system02 engineering and technologyAC powerGridReliability engineeringDistributed generation0202 electrical engineering electronic engineering information engineeringMicrogridbusinessLow voltageVoltage2018 International Conference on Automation and Computational Engineering (ICACE)
researchProduct

Remarks on IEEE 802.11 DCF performance analysis

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

Computer scienceMarkov processThroughputDistributed coordination functionCarrier-sense multiple accesssymbols.namesakeIEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitectureElectrical and Electronic EngineeringThroughput (business)IEEE 802.11Markov chainSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science ApplicationsComputer Science::PerformanceModeling and SimulationMultiple access controlPerformance evaluationsymbolsIEEE 802.11; Multiple access control; Performance evaluationbusinessAlgorithmComputer networkIEEE Communications Letters
researchProduct

MPWCA-L: A New Clustering Algorithm to Improve Stability and QoS in MANETs

2013

Computer scienceModeling and SimulationDistributed computingQuality of serviceStability (learning theory)Cluster analysisSoftwareInternational Journal of Simulation Systems Science & Technology
researchProduct

Semantic and Logic Modeling of Disaster Simulation for Multi-agent Systems

2019

Computer scienceMulti-agent systemDistributed computing[INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationAND gateInternational Journal of Modeling and Optimization
researchProduct

The Holonic Production System: a Multi Agent Simulation Approach

2010

Today’s turbulent markets are facing unpredictable and sudden variations in demand. In this context, the Holonic Production System (HPS) seems to be able to overcome the operational and economic problems of traditional production systems. The HPS’ ability to adapt and react to business environment changes, whilst maintaining systemic synergies and coordination, leverage on its network organizational structure, assuring both flexibility and profitability. In this paper we study HPS experimentally, modeling holon-firms as agents. In our simulation, holon-firms interact both with each other and with the external environment without predetermined hierarchies and following their own aims and int…

Computer scienceMulti-agent systemmedia_common.quotation_subjectControl reconfigurationDecision ruleAdaptabilitySupply and demandHolonic Production System (HPS) Multi Agent System (MAS) Distributed Enterprise NetworkNegotiationRisk analysis (engineering)Organizational structureProfitability indexSettore SECS-P/08 - Economia E Gestione Delle ImpreseSimulationmedia_common
researchProduct

Distributed Symbolic Network Quality Assessment for Resource-constrained Devices

2021

After a Wireless Sensor Network (WSN) is deployed it is subject to significant variations of the quality of its radio links during its lifetime. Knowledge of the condition of the wireless links can be useful to optimize power consumption and increase the reliability of the network. However, resource-constrained nodes may not be able to spare the storage space for network monitoring code. Also, reprogramming deployed nodes can be costly or unfeasible. In this work, we show how an approach based on the exchange of symbolic executable code among nodes enables the assessment of the network status in terms of Packet Reception Rate (PRR) with no extra storage requirements on deployed networks. We…

Computer scienceQuality assessmentSymbolic programmingDistributed computingResource constrainedEmbedded SystemSymbolic code exchangeDistributed computingWireless Sensor Network
researchProduct

Fuzzy Logic based model for self-optimizing energy consumption in IoT environment

2021

Energy optimization is essential in IoT environments due to energy constraints for some IoT components. In fact, energy consumption has a direct impact on IoT system lifetime, which represents an important Quality of Service (QoS) parameter for IoT environments. In order to extend the IoT system lifetime, energy consumption optimization should be considered in several IoT components. In this paper, we specify an energy self-optimizing mechanism allowing to minimize data transmission energy consumption of IoT objects. This mechanism enables selecting specific objects to send the desired data while minimizing the energy consumed for the corresponding communication. Our proposal is made of a M…

Computer scienceQuality of serviceDistributed computingContext (language use)Energy consumptionObject (computer science)Energy minimizationFuzzy logicEnergy (signal processing)Data transmission2021 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct