134,113 research outputs found
An Optimal and Distributed Method for Voltage Regulation in Power Distribution Systems
This paper addresses the problem of voltage regulation in power distribution
networks with deep-penetration of distributed energy resources, e.g.,
renewable-based generation, and storage-capable loads such as plug-in hybrid
electric vehicles. We cast the problem as an optimization program, where the
objective is to minimize the losses in the network subject to constraints on
bus voltage magnitudes, limits on active and reactive power injections,
transmission line thermal limits and losses. We provide sufficient conditions
under which the optimization problem can be solved via its convex relaxation.
Using data from existing networks, we show that these sufficient conditions are
expected to be satisfied by most networks. We also provide an efficient
distributed algorithm to solve the problem. The algorithm adheres to a
communication topology described by a graph that is the same as the graph that
describes the electrical network topology. We illustrate the operation of the
algorithm, including its robustness against communication link failures,
through several case studies involving 5-, 34-, and 123-bus power distribution
systems.Comment: To Appear in IEEE Transaction on Power System
Topology design and performance analysis of an integrated communication network
A research study on the topology design and performance analysis for the Space Station Information System (SSIS) network is conducted. It is begun with a survey of existing research efforts in network topology design. Then a new approach for topology design is presented. It uses an efficient algorithm to generate candidate network designs (consisting of subsets of the set of all network components) in increasing order of their total costs, and checks each design to see if it forms an acceptable network. This technique gives the true cost-optimal network, and is particularly useful when the network has many constraints and not too many components. The algorithm for generating subsets is described in detail, and various aspects of the overall design procedure are discussed. Two more efficient versions of this algorithm (applicable in specific situations) are also given. Next, two important aspects of network performance analysis: network reliability and message delays are discussed. A new model is introduced to study the reliability of a network with dependent failures. For message delays, a collection of formulas from existing research results is given to compute or estimate the delays of messages in a communication network without making the independence assumption. The design algorithm coded in PASCAL is included as an appendix
Dynamic Interference Mitigation for Generalized Partially Connected Quasi-static MIMO Interference Channel
Recent works on MIMO interference channels have shown that interference
alignment can significantly increase the achievable degrees of freedom (DoF) of
the network. However, most of these works have assumed a fully connected
interference graph. In this paper, we investigate how the partial connectivity
can be exploited to enhance system performance in MIMO interference networks.
We propose a novel interference mitigation scheme which introduces constraints
for the signal subspaces of the precoders and decorrelators to mitigate "many"
interference nulling constraints at a cost of "little" freedoms in precoder and
decorrelator design so as to extend the feasibility region of the interference
alignment scheme. Our analysis shows that the proposed algorithm can
significantly increase system DoF in symmetric partially connected MIMO
interference networks. We also compare the performance of the proposed scheme
with various baselines and show via simulations that the proposed algorithms
could achieve significant gain in the system performance of randomly connected
interference networks.Comment: 30 pages, 10 figures, accepted by IEEE Transaction on Signal
Processin
Distributed Algorithms for Scheduling on Line and Tree Networks
We have a set of processors (or agents) and a set of graph networks defined
over some vertex set. Each processor can access a subset of the graph networks.
Each processor has a demand specified as a pair of vertices , along
with a profit; the processor wishes to send data between and . Towards
that goal, the processor needs to select a graph network accessible to it and a
path connecting and within the selected network. The processor requires
exclusive access to the chosen path, in order to route the data. Thus, the
processors are competing for routes/channels. A feasible solution selects a
subset of demands and schedules each selected demand on a graph network
accessible to the processor owning the demand; the solution also specifies the
paths to use for this purpose. The requirement is that for any two demands
scheduled on the same graph network, their chosen paths must be edge disjoint.
The goal is to output a solution having the maximum aggregate profit. Prior
work has addressed the above problem in a distibuted setting for the special
case where all the graph networks are simply paths (i.e, line-networks).
Distributed constant factor approximation algorithms are known for this case.
The main contributions of this paper are twofold. First we design a
distributed constant factor approximation algorithm for the more general case
of tree-networks. The core component of our algorithm is a tree-decomposition
technique, which may be of independent interest. Secondly, for the case of
line-networks, we improve the known approximation guarantees by a factor of 5.
Our algorithms can also handle the capacitated scenario, wherein the demands
and edges have bandwidth requirements and capacities, respectively.Comment: Accepted to PODC 2012, full versio
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
- …