452 research outputs found
A new hybrid multilevel thyristor-based DC-DC converter
The rapid growth in HVDC grids is becoming inevitable for long-distance power transmission. Therefore, the idea of interconnection between the point-to-point links becomes essential. However, these point-to-point connections face several challenges such as the requirement of DC fault blocking capability, interfacing of different grounding schemes, offering multi-vendor interoperability, and difficulty to achieve high DC voltage stepping. DC-DC converters are considered the optimum solution to tackle these challenges in DC grids interconnection. In this paper, a new hybrid modular DC-DC converter is proposed that achieves a low number of semiconductors, low losses, and cost in comparison to other DC-DC converters due to the utilization of thyristors. The new DC-DC converter consists of two hybrid MMC bridges connected through an isolating transformer. Each MMC bridge is comprised of half bridge submodules and bidirectional thyristors. Detailed mathematical analysis, design, and control are illustrated. A comparison is carried out between different topologies in terms of semiconductor count, power loss, and cost. Also, both simulation model and experimental test rig are built to validate the proposed hybrid modular DC-DC converter under different scenarios. Finally, another variant of the hybrid-thyristor based converter (version two) is proposed for multiport DC-Hub application to achieve DC fault blocking without turning off all connected bridges
Fault-Tolerant Spanners against Bounded-Degree Edge Failures: Linearly More Faults, Almost For Free
We study a new and stronger notion of fault-tolerant graph structures whose
size bounds depend on the degree of the failing edge set, rather than the total
number of faults. For a subset of faulty edges , the
faulty-degree is the largest number of faults in incident to any
given vertex. We design new fault-tolerant structures with size comparable to
previous constructions, but which tolerate every fault set of small
faulty-degree , rather than only fault sets of small size . Our
main results are:
- New FT-Certificates: For every -vertex graph and degree threshold
, one can compute a connectivity certificate with edges that has the following guarantee: for any edge set
with faulty-degree and every vertex pair , it holds that
and are connected in iff they are connected in . This bound on is nearly tight. Since our certificates
handle some fault sets of size up to , prior work did not imply any
nontrivial upper bound for this problem, even when .
- New FT-Spanners: We show that every -vertex graph admits a
-spanner with edges, which
tolerates any fault set of faulty-degree at most . This bound on
optimal up to its hidden dependence on , and it is close to the
bound of that is known for the case where the
total number of faults is [Bodwin, Dinitz, Robelle SODA '22]. Our proof
of this theorem is non-constructive, but by following a proof strategy of
Dinitz and Robelle [PODC '20], we show that the runtime can be made polynomial
by paying an additional factor in spanner size
Multi-Agent Modelling of Industrial Cyber-Physical Systems for IEC 61499 Based Distributed Intelligent Automation
Traditional industrial automation systems developed under IEC 61131-3 in centralized architectures are statically programmed with determined procedures to perform predefined tasks in structured environments. Major challenges are that these systems designed under traditional engineering techniques and running on legacy automation platforms are unable to automatically discover alternative solutions, flexibly coordinate reconfigurable modules, and actively deploy corresponding functions, to quickly respond to frequent changes and intelligently adapt to evolving requirements in dynamic environments. The core objective of this research is to explore the design of multi-layer automation architectures to enable real-time adaptation at the device level and run-time intelligence throughout the whole system under a well-integrated modelling framework. Central to this goal is the research on the integration of multi-agent modelling and IEC 61499 function block modelling to form a new automation infrastructure for industrial cyber-physical systems. Multi-agent modelling uses autonomous and cooperative agents to achieve run-time intelligence in system design and module reconfiguration. IEC 61499 function block modelling applies object-oriented and event-driven function blocks to realize real-time adaption of automation logic and control algorithms. In this thesis, the design focuses on a two-layer self-manageable architecture modelling: a) the high-level cyber module designed as multi-agent computing model consisting of Monitoring Agent, Analysis Agent, Self-Learning Agent, Planning Agent, Execution Agent, and Knowledge Agent; and b) the low-level physical module designed as agent-embedded IEC 61499 function block model with Self-Manageable Service Execution Agent, Self-Configuration Agent, Self-Healing Agent, Self-Optimization Agent, and Self-Protection Agent. The design results in a new computing module for high-level multi-agent based automation architectures and a new design pattern for low-level function block modelled control solutions. The architecture modelling framework is demonstrated through various tests on the multi-agent simulation model developed in the agent modelling environment NetLogo and the experimental testbed designed on the Jetson Nano and Raspberry Pi platforms. The performance evaluation of regular execution time and adaptation time in two typical conditions for systems designed under three different architectures are also analyzed. The results demonstrate the ability of the proposed architecture to respond to major challenges in Industry 4.0
Operational Research: methods and applications
This is the final version. Available on open access from Taylor & Francis via the DOI in this recordThroughout its history, Operational Research has evolved to include methods, models and algorithms that have been applied to a wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first summarises the up-to-date knowledge and provides an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion and used as a point of reference by a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order. The authors dedicate this paper to the 2023 Turkey/Syria earthquake victims. We sincerely hope that advances in OR will play a role towards minimising the pain and suffering caused by this and future catastrophes
Operational research:methods and applications
Throughout its history, Operational Research has evolved to include a variety of methods, models and algorithms that have been applied to a diverse and wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first aims to summarise the up-to-date knowledge and provide an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion. It should be used as a point of reference or first-port-of-call for a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order
Security of Electrical, Optical and Wireless On-Chip Interconnects: A Survey
The advancement of manufacturing technologies has enabled the integration of
more intellectual property (IP) cores on the same system-on-chip (SoC).
Scalable and high throughput on-chip communication architecture has become a
vital component in today's SoCs. Diverse technologies such as electrical,
wireless, optical, and hybrid are available for on-chip communication with
different architectures supporting them. Security of the on-chip communication
is crucial because exploiting any vulnerability would be a goldmine for an
attacker. In this survey, we provide a comprehensive review of threat models,
attacks, and countermeasures over diverse on-chip communication technologies as
well as sophisticated architectures.Comment: 41 pages, 24 figures, 4 table
Performance Evaluation of Function Composition in Middlewares supporting FaaS for Serverless computing
The concept of Serverless Computing is a new and exciting aspect of cloud computing that involves the deployment of small pieces of software applications and services as serverless functions.
Serverless computing architecture enables the cloud provider to fully manage the execution of a server's code, eliminating the need for customers to develop and deploy the traditional underlying infrastructure required for running applications and programs.
Even though big tech companies are extensively utilizing serverless computing in their products and investing billions on this novel but affirmed technology, it is affected by various problems still considered an open field in research.
In fact, by definition, FaaS architectures are geographically dislocated and consequently subject to event propagation delays that can significantly degrade the overall system performance. What is generally done, is to reduce as much as possible cumulative delays especially if attributable to the infrastructure itself that could determine a greater or lesser competitiveness on the market.
The background idea, which becomes the leit motiv throughout this work, is to develop and assess the performance, and thus the validity, of a Message-Oriented Middleware-centric serverless platform architecture promising to enable advanced analytics capabilities and better overall performance, without renouncing the
essential characteristic of scalability in the context of distributed systems.
Experiments in emulated conditions show that applying the MOM coordination co-locality principle improves the end-to-end delay and data processing performance
Shallow unitary decompositions of quantum Fredkin and Toffoli gates for connectivity-aware equivalent circuit averaging
The controlled-SWAP and controlled-controlled-NOT gates are at the heart of
the original proposal of reversible classical computation by Fredkin and
Toffoli. Their widespread use in quantum computation, both in the
implementation of classical logic subroutines of quantum algorithms and in
quantum schemes with no direct classical counterparts, have made it imperative
early on to pursue their efficient decomposition in terms of the lower-level
gate sets native to different physical platforms. Here, we add to this body of
literature by providing several logically equivalent CNOT-count-optimal
circuits for the Toffoli and Fredkin gates under all-to-all and linear qubit
connectivity, the latter with two different routings for control and target
qubits. We then demonstrate how these decompositions can be employed on
near-term quantum computers to mitigate coherent errors via equivalent circuit
averaging. We also consider the case where the three qubits on which the
Toffoli or Fredkin gates act nontrivially are not adjacent, proposing a novel
scheme to reorder them that saves one CNOT for every SWAP. This scheme also
finds use in the shallow implementation of long-range CNOTs. Our results
highlight the importance of considering different entanglement structures and
connectivity constraints when designing efficient quantum circuits.Comment: Main text: 10 pages, 8 figures. Appendix: 4 sections, 5 figures. QASM
files will be made available in open-source online platform upon next update
of preprin
Operational Research: Methods and Applications
Throughout its history, Operational Research has evolved to include a variety of methods, models and algorithms that have been applied to a diverse and wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first aims to summarise the up-to-date knowledge and provide an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion. It should be used as a point of reference or first-port-of-call for a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order. The authors dedicate this paper to the 2023 Turkey/Syria earthquake victims. We sincerely hope that advances in OR will play a role towards minimising the pain and suffering caused by this and future catastrophes
- …