1,879 research outputs found
Three Branch Diversity Systems for Multi-Hop IoT Networks
Internet of Things (IoT) is an emerging technological paradigm connecting numerous smart objects for advanced applications ranging from home automation to industrial control to healthcare. The rapid development of wireless technologies and miniature embedded devices has enabled IoT systems for such applications, which have been deployed in a variety of environments. One of the factors limiting the performance of IoT devices is the multipath fading caused by reflectors and attenuators present in the environment where these devices are deployed. Leveraging polarization diversity is a well-known technique to mitigate the deep signal fades and depolarization effects caused by multipath. However, neither experimental validation of the performance of polarization diversity antenna with more than two branches nor the potency of existing antenna selection techniques on such antennas in practical scenarios has received much attention.
The objectives of this dissertation are threefold. First, to demonstrate the efficacy of a tripolar antenna, which is specifically designed for IoT devices, in harsh environments through simulations and experimental data. Second, to develop antenna selection strategies to utilize polarized signals received at the antenna, considering the restrictions imposed due to resource limitations of the IoT devices. Finally, to conduct comparative analyses on the existing standard diversity techniques and proposed approaches, in conjunction with experimental data.
Accordingly, this dissertation presents the testing results of tripolar antenna integrated with Arduino based IoT devices deployed in environments likely to be experienced by IoT devices in real life applications. Both simulation and experimental results from single point-to-point wireless links demonstrate the advantage of utilizing tripolar antennas in harsh propagation conditions over single branch antenna. Motivated by these empirical results, we deploy a small-scale IoT network with tripolar antenna based nodes to analyze the impact of tripolar antenna on neighbor nodes performance as well as to investigate end-to-end network performance. This work illustrates that the selection of antenna branches, while considering network architecture and the level of congestion on the repeater nodes, minimizes excessive antenna switching and energy consumption. Similar results are shown for IoT networks with predetermined and dynamic routing protocols, where the proposed techniques yielded lower energy consumption than the conventional diversity schemes. Furthermore, a probabilistic, low complexity antenna selection approach based on Hidden Markov model is proposed and implemented on wireless sensor nodes aiming to reduce energy consumption and improve diversity gain. Finally, we develop a dual-hop based technique where a node selects the antenna element for optimal performance based on its immediate network neighbors antenna configuration status during selection. The performance of the proposed technique, which is verified through simulation and measured data, illustrates the importance of considering network-wide evaluations of antenna selection techniques
Cross-layer design of multi-hop wireless networks
MULTI -hop wireless networks are usually defined as a collection of nodes
equipped with radio transmitters, which not only have the capability to
communicate each other in a multi-hop fashion, but also to route each others’ data
packets. The distributed nature of such networks makes them suitable for a variety of
applications where there are no assumed reliable central entities, or controllers, and
may significantly improve the scalability issues of conventional single-hop wireless
networks.
This Ph.D. dissertation mainly investigates two aspects of the research issues
related to the efficient multi-hop wireless networks design, namely: (a) network
protocols and (b) network management, both in cross-layer design paradigms to
ensure the notion of service quality, such as quality of service (QoS) in wireless mesh
networks (WMNs) for backhaul applications and quality of information (QoI) in
wireless sensor networks (WSNs) for sensing tasks. Throughout the presentation of
this Ph.D. dissertation, different network settings are used as illustrative examples,
however the proposed algorithms, methodologies, protocols, and models are not
restricted in the considered networks, but rather have wide applicability.
First, this dissertation proposes a cross-layer design framework integrating
a distributed proportional-fair scheduler and a QoS routing algorithm, while using
WMNs as an illustrative example. The proposed approach has significant performance
gain compared with other network protocols. Second, this dissertation proposes
a generic admission control methodology for any packet network, wired and
wireless, by modeling the network as a black box, and using a generic mathematical
0. Abstract 3
function and Taylor expansion to capture the admission impact. Third, this dissertation
further enhances the previous designs by proposing a negotiation process,
to bridge the applications’ service quality demands and the resource management,
while using WSNs as an illustrative example. This approach allows the negotiation
among different service classes and WSN resource allocations to reach the optimal
operational status. Finally, the guarantees of the service quality are extended to
the environment of multiple, disconnected, mobile subnetworks, where the question
of how to maintain communications using dynamically controlled, unmanned data
ferries is investigated
Application of Deep Learning Methods in Monitoring and Optimization of Electric Power Systems
This PhD thesis thoroughly examines the utilization of deep learning
techniques as a means to advance the algorithms employed in the monitoring and
optimization of electric power systems. The first major contribution of this
thesis involves the application of graph neural networks to enhance power
system state estimation. The second key aspect of this thesis focuses on
utilizing reinforcement learning for dynamic distribution network
reconfiguration. The effectiveness of the proposed methods is affirmed through
extensive experimentation and simulations.Comment: PhD thesi
Enabling flexibility through strategic management of complex engineering systems
”Flexibility is a highly desired attribute of many systems operating in changing or uncertain conditions. It is a common theme in complex systems to identify where flexibility is generated within a system and how to model the processes needed to maintain and sustain flexibility. The key research question that is addressed is: how do we create a new definition of workforce flexibility within a human-technology-artificial intelligence environment?
Workforce flexibility is the management of organizational labor capacities and capabilities in operational environments using a broad and diffuse set of tools and approaches to mitigate system imbalances caused by uncertainties or changes. We establish a baseline reference for managers to use in choosing flexibility methods for specific applications and we determine the scope and effectiveness of these traditional flexibility methods.
The unique contributions of this research are: a) a new definition of workforce flexibility for a human-technology work environment versus traditional definitions; b) using a system of systems (SoS) approach to create and sustain that flexibility; and c) applying a coordinating strategy for optimal workforce flexibility within the human- technology framework. This dissertation research fills the gap of how we can model flexibility using SoS engineering to show where flexibility emerges and what strategies a manager can use to manage flexibility within this technology construct”--Abstract, page iii
Promoting Coordination through Policy Regularization in Multi-Agent Deep Reinforcement Learning
In multi-agent reinforcement learning, discovering successful collective
behaviors is challenging as it requires exploring a joint action space that
grows exponentially with the number of agents. While the tractability of
independent agent-wise exploration is appealing, this approach fails on tasks
that require elaborate group strategies. We argue that coordinating the agents'
policies can guide their exploration and we investigate techniques to promote
such an inductive bias. We propose two policy regularization methods: TeamReg,
which is based on inter-agent action predictability and CoachReg that relies on
synchronized behavior selection. We evaluate each approach on four challenging
continuous control tasks with sparse rewards that require varying levels of
coordination as well as on the discrete action Google Research Football
environment. Our experiments show improved performance across many cooperative
multi-agent problems. Finally, we analyze the effects of our proposed methods
on the policies that our agents learn and show that our methods successfully
enforce the qualities that we propose as proxies for coordinated behaviors.Comment: 23 pages, 16 figures. This revised version contains additional
results and minor edit
Impact Assessment, Detection, and Mitigation of False Data Attacks in Electrical Power Systems
The global energy market has seen a massive increase in investment and capital flow in the last few decades. This has completely transformed the way power grids operate - legacy systems are now being replaced by advanced smart grid infrastructures that attest to better connectivity and increased reliability. One popular example is the extensive deployment of phasor measurement units, which is referred to PMUs, that constantly provide time-synchronized phasor measurements at a high resolution compared to conventional meters. This enables system operators to monitor in real-time the vast electrical network spanning thousands of miles. However, a targeted cyber attack on PMUs can prompt operators to take wrong actions that can eventually jeopardize the power system reliability. Such threats originating from the cyber-space continue to increase as power grids become more dependent on PMU communication networks. Additionally, these threats are becoming increasingly efficient in remaining undetected for longer periods while gaining deep access into the power networks. An attack on the energy sector immediately impacts national defense, emergency services, and all aspects of human life. Cyber attacks against the electric grid may soon become a tactic of high-intensity warfare between nations in near future and lead to social disorder. Within this context, this dissertation investigates the cyber security of PMUs that affects critical decision-making for a reliable operation of the power grid. In particular, this dissertation focuses on false data attacks, a key vulnerability in the PMU architecture, that inject, alter, block, or delete data in devices or in communication network channels.
This dissertation addresses three important cyber security aspects - (1) impact assessment, (2) detection, and (3) mitigation of false data attacks. A comprehensive background of false data attack models targeting various steady-state control blocks is first presented. By investigating inter-dependencies between the cyber and the physical layers, this dissertation then identifies possible points of ingress and categorizes risk at different levels of threats. In particular, the likelihood of cyber attacks against the steady-state power system control block causing the worst-case impacts such as cascading failures is investigated. The case study results indicate that false data attacks do not often lead to widespread blackouts, but do result in subsequent line overloads and load shedding. The impacts are magnified when attacks are coordinated with physical failures of generators, transformers, or heavily loaded lines. Further, this dissertation develops a data-driven false data attack detection method that is independent of existing in-built security mechanisms in the state estimator. It is observed that a convolutional neural network classifier can quickly detect and isolate false measurements compared to other deep learning and traditional classifiers. Finally, this dissertation develops a recovery plan that minimizes the consequence of threats when sophisticated attacks remain undetected and have already caused multiple failures. Two new controlled islanding methods are developed that minimize the impact of attacks under the lack of, or partial information on the threats. The results indicate that the system operators can successfully contain the negative impacts of cyber attacks while creating stable and observable islands. Overall, this dissertation presents a comprehensive plan for fast and effective detection and mitigation of false data attacks, improving cyber security preparedness, and enabling continuity of operations
Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems
The global energy market has seen a massive increase in investment and capital flow in the last few decades. This has completely transformed the way power grids operate - legacy systems are now being replaced by advanced smart grid infrastructures that attest to better connectivity and increased reliability. One popular example is the extensive deployment of phasor measurement units, which is referred to PMUs, that constantly provide time-synchronized phasor measurements at a high resolution compared to conventional meters. This enables system operators to monitor in real-time the vast electrical network spanning thousands of miles. However, a targeted cyber attack on PMUs can prompt operators to take wrong actions that can eventually jeopardize the power system reliability. Such threats originating from the cyber-space continue to increase as power grids become more dependent on PMU communication networks. Additionally, these threats are becoming increasingly efficient in remaining undetected for longer periods while gaining deep access into the power networks. An attack on the energy sector immediately impacts national defense, emergency services, and all aspects of human life. Cyber attacks against the electric grid may soon become a tactic of high-intensity warfare between nations in near future and lead to social disorder. Within this context, this dissertation investigates the cyber security of PMUs that affects critical decision-making for a reliable operation of the power grid. In particular, this dissertation focuses on false data attacks, a key vulnerability in the PMU architecture, that inject, alter, block, or delete data in devices or in communication network channels.
This dissertation addresses three important cyber security aspects - (1) impact assessment, (2) detection, and (3) mitigation of false data attacks. A comprehensive background of false data attack models targeting various steady-state control blocks is first presented. By investigating inter-dependencies between the cyber and the physical layers, this dissertation then identifies possible points of ingress and categorizes risk at different levels of threats. In particular, the likelihood of cyber attacks against the steady-state power system control block causing the worst-case impacts such as cascading failures is investigated. The case study results indicate that false data attacks do not often lead to widespread blackouts, but do result in subsequent line overloads and load shedding. The impacts are magnified when attacks are coordinated with physical failures of generators, transformers, or heavily loaded lines. Further, this dissertation develops a data-driven false data attack detection method that is independent of existing in-built security mechanisms in the state estimator. It is observed that a convolutional neural network classifier can quickly detect and isolate false measurements compared to other deep learning and traditional classifiers. Finally, this dissertation develops a recovery plan that minimizes the consequence of threats when sophisticated attacks remain undetected and have already caused multiple failures. Two new controlled islanding methods are developed that minimize the impact of attacks under the lack of, or partial information on the threats. The results indicate that the system operators can successfully contain the negative impacts of cyber attacks while creating stable and observable islands. Overall, this dissertation presents a comprehensive plan for fast and effective detection and mitigation of false data attacks, improving cyber security preparedness, and enabling continuity of operations
ESTABLISHMENT OF CYBER-PHYSICAL CORRELATION AND VERIFICATION BASED ON ATTACK SCENARIOS IN POWER SUBSTATIONS
Insurance businesses for the cyberworld are an evolving opportunity. However, a quantitative model in today\u27s security technologies may not be established. Besides, a generalized methodology to assess the systematic risks remains underdeveloped. There has been a technical challenge to capture intrusion risks of the cyber-physical system, including estimating the impact of the potential cascaded events initiated by the hacker\u27s malicious actions.
This dissertation attempts to integrate both modeling aspects: 1) steady-state probabilities for the Internet protocol-based substation switching attack events based on hypothetical cyberattacks, 2) potential electricity losses. The phenomenon of sequential attacks can be characterized using a time-domain simulation that exhibits dynamic cascaded events. Such substation attack simulation studies can establish an actuarial framework for grid operation.
The novelty is three-fold. First, the development to extend features of steady-state probabilities is established based on 1) modified password models, 2) new models on digital relays with two-step authentications, and 3) honeypot models. A generalized stochastic Petri net is leveraged to formulate the detailed statuses and transitions of components embedded in a Cyber-net. Then, extensive modeling of steady-state probabilities is qualitatively performed. Methodologies on how transition probabilities and rates are extracted from network components and actuarial applications are summarized and discussed.
Second, dynamic models requisite for switching attacks against multiple substations or digital relays deployed in substations are formulated. Imperative protection and control models to represent substation attacks are clarified with realistic model parameters. Specifically, wide-area protections, i.e., special protection systems (SPSs), are elaborated, asserting that event-driven SPSs may be skipped for this type of case study.
Third, the substation attack replay using a proven commercially available time-domain simulation tool is validated in IEEE system models to study attack combinations\u27 critical paths. As the time-domain simulation requires a higher computational cost than power flow-based steady-state simulation, a balance of both methods is established without missing the critical dynamic behavior. The direct impact of substation attacks, i.e., electricity losses, is compared between steady-state and dynamic analyses. Steady-state analysis results are prone to be pessimistic for a smaller number of compromised substations.
Finally, simulation findings based on the risk-based metrics and technical implementation are extensively discussed with future work
Modeling, Simulation, and Analysis of Cascading Outages in Power Systems
Interconnected power systems are prone to cascading outages leading to large-area blackouts. Modeling, simulation, analysis, and mitigation of cascading outages are still challenges for power system operators and planners.Firstly, the interaction model and interaction graph proposed by [27] are demonstrated on a realistic Northeastern Power Coordinating Council (NPCC) power system, identifying key links and components that contribute most to the propagation of cascading outages. Then a multi-layer interaction graph for analysis and mitigation of cascading outages is proposed. It provides a practical, comprehensive framework for prediction of outage propagation and decision making on mitigation strategies. It has multiple layers to respectively identify key links and components, which contribute the most to outage propagation. Based on the multi-layer interaction graph, effective mitigation strategies can be further developed. A three-layer interaction graph is constructed and demonstrated on the NPCC power system.Secondly, this thesis proposes a novel steady-state approach for simulating cascading outages. The approach employs a power flow-based model that considers static power-frequency characteristics of both generators and loads. Thus, the system frequency deviation can be calculated under cascading outages and control actions such as under-frequency load shedding can be simulated. Further, a new AC optimal power flow model considering frequency deviation (AC-OPFf) is proposed to simulate remedial control against system collapse. Case studies on the two-area, IEEE 39-bus, and NPCC power systems show that the proposed approach can more accurately capture the propagation of cascading outages when compared with a conventional approach using the conventional power flow and AC optimal power flow models.Thirdly, in order to reduce the potential risk caused by cascading outages, an online strategy of critical component-based active islanding is proposed. It is performed when any component belonging to a predefined set of critical components is involved in the propagation path. The set of critical components whose fail can cause large risk are identified based on the interaction graph. Test results on the NPCC power system show that the cascading outage risk can be reduced significantly by performing the proposed active islanding when compared with the risk of other scenarios without active islanding
Extensive loss of cell-cycle and DNA repair genes in an ancient lineage of bipolar budding yeasts
Cell-cycle checkpoints and DNA repair processes protect organisms from potentially lethal mutational damage. Compared to other budding yeasts in the subphylum Saccharomycotina, we noticed that a lineage in the genus Hanseniaspora exhibited very high evolutionary rates, low Guanine–Cytosine (GC) content, small genome sizes, and lower gene numbers. To better understand Hanseniaspora evolution, we analyzed 25 genomes, including 11 newly sequenced, representing 18/21 known species in the genus. Our phylogenomic analyses identify two Hanseniaspora lineages, a faster-evolving lineage (FEL), which began diversifying approximately 87 million years ago (mya), and a slower-evolving lineage (SEL), which began diversifying approximately 54 mya. Remarkably, both lineages lost genes associated with the cell cycle and genome integrity, but these losses were greater in the FEL. E.g., all species lost the cell-cycle regulator WHIskey 5 (WHI5), and the FEL lost components of the spindle checkpoint pathway (e.g., Mitotic Arrest-Deficient 1 [MAD1], Mitotic Arrest-Deficient 2 [MAD2]) and DNA-damage–checkpoint pathway (e.g., Mitosis Entry Checkpoint 3 [MEC3], RADiation sensitive 9 [RAD9]). Similarly, both lineages lost genes involved in DNA repair pathways, including the DNA glycosylase gene 3-MethylAdenine DNA Glycosylase 1 (MAG1), which is part of the base-excision repair pathway, and the DNA photolyase gene PHotoreactivation Repair deficient 1 (PHR1), which is involved in pyrimidine dimer repair. Strikingly, the FEL lost 33 additional genes, including polymerases (i.e., POLymerase 4 [POL4] and POL32) and telomere-associated genes (e.g., Repressor/ activator site binding protein-Interacting Factor 1 [RIF1], Replication Factor A 3 [RFA3], Cell Division Cycle 13 [CDC13], Pbp1p Binding Protein [PBP2]). Echoing these losses, molecular evolutionary analyses reveal that, compared to the SEL, the FEL stem lineage underwent a burst of accelerated evolution, which resulted in greater mutational loads, homopolymer instabilities, and higher fractions of mutations associated with the common endogenously damaged base, 8-oxoguanine. We conclude that Hanseniaspora is an ancient lineage that has diversified and thrived, despite lacking many otherwise highly conserved cell-cycle and genome integrity genes and pathways, and may represent a novel, to our knowledge, system for studying cellular life without them.Fil: Steenwyk, Jacob L.. Vanderbilt University; Estados UnidosFil: Opulente, Dana A.. University of Wisconsin; Estados UnidosFil: Kominek, Jacek. University of Wisconsin; Estados UnidosFil: Shen, Xing-Xing. Vanderbilt University; Estados UnidosFil: Zhou, Xiaofan. South China Agricultural University; ChinaFil: Labella, Abigail L.. Vanderbilt University; Estados UnidosFil: Bradley, Noah P.. Vanderbilt University; Estados UnidosFil: Eichman, Brandt F.. Vanderbilt University; Estados UnidosFil: Cadez, Neza. University of Ljubljana; EsloveniaFil: Libkind Frati, Diego. Universidad Nacional del Comahue. Centro Regional Universitario Bariloche; ArgentinaFil: DeVirgilio, Jeremy. United States Department of Agriculture. Agricultural Research Service; ArgentinaFil: Hulfachor, Amanda Beth. University of Wisconsin; Estados UnidosFil: Kurtzman, Cletus P.. United States Department of Agriculture. Agricultural Research Service; ArgentinaFil: Hittinger, Chris Todd. University of Wisconsin; Estados UnidosFil: Rokas, Antonis. Vanderbilt University; Estados Unido
- …