46,119 research outputs found
Efficient Database Generation for Data-driven Security Assessment of Power Systems
Power system security assessment methods require large datasets of operating
points to train or test their performance. As historical data often contain
limited number of abnormal situations, simulation data are necessary to
accurately determine the security boundary. Generating such a database is an
extremely demanding task, which becomes intractable even for small system
sizes. This paper proposes a modular and highly scalable algorithm for
computationally efficient database generation. Using convex relaxation
techniques and complex network theory, we discard large infeasible regions and
drastically reduce the search space. We explore the remaining space by a highly
parallelizable algorithm and substantially decrease computation time. Our
method accommodates numerous definitions of power system security. Here we
focus on the combination of N-k security and small-signal stability.
Demonstrating our algorithm on IEEE 14-bus and NESTA 162-bus systems, we show
how it outperforms existing approaches requiring less than 10% of the time
other methods require.Comment: Database publicly available at:
https://github.com/johnnyDEDK/OPs_Nesta162Bus - Paper accepted for
publication at IEEE Transactions on Power System
Chance Constrained Mixed Integer Program: Bilinear and Linear Formulations, and Benders Decomposition
In this paper, we study chance constrained mixed integer program with
consideration of recourse decisions and their incurred cost, developed on a
finite discrete scenario set. Through studying a non-traditional bilinear mixed
integer formulation, we derive its linear counterparts and show that they could
be stronger than existing linear formulations. We also develop a variant of
Jensen's inequality that extends the one for stochastic program. To solve this
challenging problem, we present a variant of Benders decomposition method in
bilinear form, which actually provides an easy-to-use algorithm framework for
further improvements, along with a few enhancement strategies based on
structural properties or Jensen's inequality. Computational study shows that
the presented Benders decomposition method, jointly with appropriate
enhancement techniques, outperforms a commercial solver by an order of
magnitude on solving chance constrained program or detecting its infeasibility
A component-oriented programming framework for developing embedded mobile robot software using PECOS model
A practical framework for component-based software engineering of embedded real-time systems, particularly for autonomous mobile robot embedded software development using PECOS component model is proposed The main features of this framework are: (1) use graphical representation for components definition and composition; (2) target C language for optimal code generation with small micro-controller; and (3) does not requires run-time support except for real-time kernel. Real-time implementation indicates that, the PECOS component model together with the proposed framework is suitable for resource constrained embedded systems
MoPS: A Modular Protection Scheme for Long-Term Storage
Current trends in technology, such as cloud computing, allow outsourcing the
storage, backup, and archiving of data. This provides efficiency and
flexibility, but also poses new risks for data security. It in particular
became crucial to develop protection schemes that ensure security even in the
long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic
primitives. However, all current solutions fail to provide optimal performance
for different application scenarios. Thus, in this work, we present MoPS, a
modular protection scheme to ensure authenticity and integrity for data stored
over long periods of time. MoPS does not come with any requirements regarding
the storage architecture and can therefore be used together with existing
archiving or storage systems. It supports a set of techniques which can be
plugged together, combined, and migrated in order to create customized
solutions that fulfill the requirements of different application scenarios in
the best possible way. As a proof of concept we implemented MoPS and provide
performance measurements. Furthermore, our implementation provides additional
features, such as guidance for non-expert users and export functionalities for
external verifiers.Comment: Original Publication (in the same form): ASIACCS 201
Checking-in on Network Functions
When programming network functions, changes within a packet tend to have
consequences---side effects which must be accounted for by network programmers
or administrators via arbitrary logic and an innate understanding of
dependencies. Examples of this include updating checksums when a packet's
contents has been modified or adjusting a payload length field of a IPv6 header
if another header is added or updated within a packet. While static-typing
captures interface specifications and how packet contents should behave, it
does not enforce precise invariants around runtime dependencies like the
examples above. Instead, during the design phase of network functions,
programmers should be given an easier way to specify checks up front, all
without having to account for and keep track of these consequences at each and
every step during the development cycle. In keeping with this view, we present
a unique approach for adding and generating both static checks and dynamic
contracts for specifying and checking packet processing operations. We develop
our technique within an existing framework called NetBricks and demonstrate how
our approach simplifies and checks common dependent packet and header
processing logic that other systems take for granted, all without adding much
overhead during development.Comment: ANRW 2019 ~ https://irtf.org/anrw/2019/program.htm
Behavioral Modelling of Digital Devices Via Composite Local-Linear State-Space Relations
This paper addresses the generation of accurate and efficient behavioral models of digital ICs. The proposed approach is based on the approximation of the device port characteristics by means of composite local linear state-space relations whose parameters can effectively be estimated from device port transient responses via well-established system identification techniques. The proposedmodels have been proven to overcome some inherent limitations of the state-of-the-art models used so far, and they can effectively be implemented in any commercial tool as Simulation Program with Integrated Circuit Emphasis (SPICE) subcircuits or VHDL-AMS hardware descriptions. A systematic study of the performances of the proposed state-space models is carried out on a synthetic test device. The effectiveness of the proposed approach has been demonstrated on a real application problem involving commercial devices and a data link of a mobile phon
- ā¦