Reliable virtual sensing for wireless sensor networks

Several “energy-hungry” sensors such as gas detectors, radar, and cameras have excessive energy dissipation. Virtual sensing is a technique which “breaks the downward spiral” between energy expenditure and events-miss probabilities. The idea is to deactivate main sensors and utilize a set of energy-friendly HW & SW components instead. However, reliability of such systems composed of […]

A Multiple Train Trajectory Optimization to Minimize Energy Consumption and Delay

In railway operations, if the journey of a preceding train is disturbed, the service interval between it and the following trains may fall below the minimum line headway distance. If this occurs, train interactions will happen, which will result in extra energy usage, knock-on delays, and penalties for the operators. This paper describes a train […]

Real-Time Optimal Voltage Regulation for Distribution Networks Incorporating High Penetration of PEVs

This paper proposes a vehicle-to-grid reactive power support (V2GQ) strategy for optimal coordinated voltage regulation in distribution networks with high distributed generation (DG) penetration. The proposed algorithm employs plug-in electric vehicles (PEVs), DG, and on-load tap changer (OLTC) to satisfy PEV charging demand and grid voltage requirements with relaxed tap operation, and minimum DG active power curtailment. […]

Voltage control algorithm for distribution systems with distributed generation

This paper proposes an automatic voltage control method for distribution networks using distributed generators connected to the grid in order to maintain voltage levels and to provide reactive power. This method consists in exchanging information withn a two-layer hierarchical control structure. The first one is the local control, responsible for monitoring each generator operating conditions. The second […]

Cyber Security and Operational Reliability

This paper presents a new proposed infrastructure that enables simultaneous cyber security and operational security. The basis of the method is command interception and fast authentication from the cyber security point of view (reliable detection of cyber intrusions) and from the operational reliability point of view. To simplify the process, the command authentication is done […]

Enquire Now