139 research outputs found

    Modeling smart grid of prosumers with photovoltaic systems

    Get PDF
    Запропоновано модель вузла смарт-мережі для споживача-просьюмера в межах котеджного селища. Модель включає в себе типові добові графіки навантаження будинку та генерації дахової фотоелектричної системи, модель акумуляторної системи зберігання енергії та контролера вузла смарт-мережі. Розроблено алгоритми керування роботою вузла смарт-мережі, який передбачає різні режими роботи для літа та зими. В залежності від години доби, стану заряду акумулятора, генерації фотоелектричної системи та навантаження будинку контролер керує балансуючим споживанням або віддачою енергії до мережі, заряджанням або розряджанням акумулятора, купівлею або продажом енергії просьюмером до енергосистеми. Метою керування влітку є повне використання енергії, виробленої власною фотоелектричною системою, для власного споживання та продажу надлишків в енергосистему в години пікового навантаження. Метою керування взимку є зниження витрат споживача за рахунок перенесення навантаження на нічні години та збільшення доходів від перепродажу накопиченої енергії до енергосистеми в пікові години. За результатами моделювання на прикладі котеджного селища в харківській області визначено мінімальну ємність акумуляторної системи, якої достатньо для забезпечення автономності споживача-просьюмера влітку та отримання доходу від перепродажу енергії взимку. Показано, що запропоновані алгоритми керування роботою вузла смарт-мережі дозволяють споживачу-просьюмеру ефективно використовувати власну фотоелектричну систему та надавати системні послуги об’єднаній енергосистемі.The smart-grid node model for prosumer within a cottage community has been proposed. The model includes a typical cottage load daily profiles and a roof photovoltaic system generation daily profiles, an energy storage system model and a smart grid node controller. The control algorithms for the smart grid node operation, providing different operation modes for summer and winter are developed. Depending on the time of day, the battery state of charge, the photovoltaic system generation and the cottage load, the controller controls the balancing power consumption or output to the grid, the battery charge or discharge, the energy buy or sale by prosumer. The control goal in summer is to fully use the energy produced by own photovoltaic system for own needs and to sale of surplus energy to the grid during peak hours. The control goal in winter is to reduce consumer costs by shifting the load overnight and increasing revenues from the resale of stored energy to the grid during peak hours. The minimum battery capacity of the energy storage system, sufficient to ensure the consumer autonomy in the summer and generate income from the energy resale in the winter, was estimated based on the simulation results for the case of a cottage community in the Kharkiv region. It is shown that the proposed algorithms for control of a smart grid node allow the prosumer to effectively use their own photovoltaic system and provide system services to the energy system

    An efficient industrial big-data engine

    Get PDF
    Current trends in industrial systems opt for the use of different big-data engines as a mean to process huge amounts of data that cannot be processed with an ordinary infrastructure. The number of issues an industrial infrastructure has to face is large and includes challenges such as the definition of different efficient architecture setups for different applications, and the definition of specific models for industrial analytics. In this context, the article explores the development of a medium size big-data engine (i.e. implementation) able to improve performance in map-reduce computing by splitting the analytic into different segments that may be processed by the engine in parallel using a hierarchical model. This type of facility reduces end-to-end computation time for all segments with their results then merged with other information from other segments after their processing in parallel. This type of setup increases performance of current clusters improving I/O operations remarkably as empirical results revealed.Work partially supported by “Distributed Java Infrastructure for Real-Time Big-data” (CAS14/00118), eMadrid (S2013/ICE-2715), HERMES-SMARTDRIVER (TIN2013-46801-C4-2-R), and AUDACity (TIN2016-77158-C4-1-R)

    System design and risk assessment for safety critical control software product lines

    Get PDF
    A methodology is presented for the design of safety critical product lines for control automation software. The functional failure identification and propagation risk assessment method is used in the early design phase of the mechatronic system. The applied methodology starts with the decomposition of the system into functions that are connected by energy, material and signal flows. This results in a functional model that does not make any assumptions on what components are used to realize the functions. The functions are mapped to mechatronic components in a model that can be simulated: the configuration flow graph. Functional failure logic is executed in parallel to the simulation to monitor the simulation signals and to determine the health of each function. The functional health results of the simulation, when critical events are injected, are used to identify the propagation of functional failures. Alternative designs that are described with a feature model, combinations of component parameter values and changes in the critical event scenario can be simulated. System designs that result in undesirable behavior are rejected. The purpose is to identify risks and to determine mechatronic designs with adequate safety characteristics before the design process branches into software, electrical and mechanical domains. The final deliverable of the mechatronic system design phase is a feature model capturing the design alternatives with acceptable safety characteristics. The aspect of this model containing software is the starting point for software product line engineering. In control automation, programmable logic controller targets are used, so a methodology and toolchain for supporting software product line configuration for such platforms has been developed using the PLCopen standard. Two case studies are used to demonstrate the methodology: a boiling water reactor, with a focus on reactor coolant pumps, and a mobile elevating work platform

    Applications of ontology in the Internet of Things: a systematic analysis

    Get PDF
    Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and object addressing. However, a complete understanding of using ontology in the IoT mechanism remains lacking. The main goal of this research is to recognize the use of ontology in the IoT process and investigate the services of ontology in IoT activities. A systematic literature review (SLR) is conducted using predefined protocols to analyze the literature about the usage of ontologies in IoT. The following conclusions are obtained from the SLR. (1) Primary studies (i.e., selected 115 articles) have addressed the need to use ontologies in IoT for industries and the academe, especially to minimize interoperability and integration of IoT devices. (2) About 31.30% of extant literature discussed ontology development concerning the IoT interoperability issue, while IoT privacy and integration issues are partially discussed in the literature. (3) IoT styles of modeling ontologies are diverse, whereas 35.65% of total studies adopted the OWL style. (4) The 32 articles (i.e., 27.83% of the total studies) reused IoT ontologies to handle diverse IoT methodologies. (5) A total of 45 IoT ontologies are well acknowledged, but the IoT community has widely utilized none. An in-depth analysis of different IoT ontologies suggests that the existing ontologies are beneficial in designing new IoT ontology or achieving three main requirements of the IoT field: interoperability, integration, and privacy. This SLR is finalized by identifying numerous validity threats and future directions

    Prosumer communities and relationships in smart grids: A literature review, evolution and future directions

    Get PDF
    Smart grids are robust, self-healing networks that allow bidirectional propagation of energy and information within the utility grid. This introduces a new type of energy user who consumes, produces, stores and shares energy with other grid users. Such a user is called a "prosumer." Prosumers' participation in the smart grid is critical for the sustainability and long-term efficiency of the energy sharing process. Thus, prosumer management has attracted increasing attention among researchers in recent years. This paper systematically examines the literature on prosumer community based smart grid by reviewing relevant literature published from 2009 to 2018 in reputed energy and technology journals. We specifically focus on two dimensions namely prosumer community groups and prosumer relationships. Based on the evaluated literature, we present eight propositions and thoroughly describe several future research directions

    Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?

    Get PDF
    In the last decade, Social Networks (SNs) have deeply changed many aspects of society, and one of the most widespread behaviours is the sharing of pictures. However, malicious users often exploit shared pictures to create fake profiles, leading to the growth of cybercrime. Thus, keeping in mind this scenario, authorship attribution and verification through image watermarking techniques are becoming more and more important. In this paper, we firstly investigate how thirteen of the most popular SNs treat uploaded pictures in order to identify a possible implementation of image watermarking techniques by respective SNs. Second, we test the robustness of several image watermarking algorithms on these thirteen SNs. Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. The proposed method is sufficiently robust, in spite of the fact that pictures are often downgraded during the process of uploading to the SNs. Moreover, in comparison to conventional watermarking methods the proposed method can successfully pass through different SNs, solving related problems such as profile linking and fake profile detection. The results of our analysis on a real dataset of 8400 pictures show that the proposed method is more effective than other watermarking techniques and can help to address serious questions about privacy and security on SNs. Moreover, the proposed method paves the way for the definition of multi-factor online authentication mechanisms based on robust digital features

    Who wrote this scientific text?

    No full text
    The IEEE bibliographic database contains a number of proven duplications with indication of the original paper(s) copied. This corpus is used to test a method for the detection of hidden intertextuality (commonly named "plagiarism"). The intertextual distance, combined with the sliding window and with various classification techniques, identifies these duplications with a very low risk of error. These experiments also show that several factors blur the identity of the scientific author, including variable group authorship and the high levels of intertextuality accepted, and sometimes desired, in scientific papers on the same topic

    Engineering Emergence: A Survey on Control in the World of Complex Networks

    Get PDF
    Complex networks make an enticing research topic that has been increasingly attracting researchers from control systems and various other domains over the last two decades. The aim of this paper was to survey the interest in control related to complex networks research over time since 2000 and to identify recent trends that may generate new research directions. The survey was performed for Web of Science, Scopus, and IEEEXplore publications related to complex networks. Based on our findings, we raised several questions and highlighted ongoing interests in the control of complex networks.publishedVersio

    An Approach to Automatically Distribute and Access Knowledge within Networked Embedded Systems in Factory Automation

    Get PDF
    This thesis presents a novel approach for automatically distribute and access knowledge within factory automation systems built by networked embedded systems. Developments on information, communication and computational technologies are making possible the distribution of tasks within different control resources, resources which are networked and working towards a common objective optimizing desired parameters. A fundamental task for introducing autonomy to these systems, is the option for represent knowledge, distributed within the automation network and to ensure its access by providing access mechanisms. This research work focuses on the processes for automatically distribute and access the knowledge.Recently, the industrial world has embraced service-oriented as architectural (SOA) patterns for relaxing the software integration costs of factory automation systems. This pattern defines a services provider offering a particular functionality, and service requesters which are entities looking for getting their needs satisfied. Currently, there are a few technologies allowing to implement a SOA solution, among those, Web Technologies are gaining special attention for their solid presence in other application fields. Providers and services using Web technologies for expressing their needs and skills are called Web Services. One of the main advantage of services is the no need for the service requester to know how the service provider is accomplishing the functionality or where the execution of the service is taking place. This benefit is recently stressed by the irruption of Cloud Computing, allowing the execution of certain process by the cloud resources.The caption of human knowledge and the representation of that knowledge in a machine interpretable manner has been an interesting research topic for the last decades. A well stablished mechanism for the representation of knowledge is the utilization of Ontologies. This mechanism allows machines to access that knowledge and use reasoning engines in order to create reasoning machines. The presence of a knowledge base allows as clearly the better identification of the web services, which is achievable by adding semantic notations to the service descriptors. The resulting services are called semantic web services.With the latest advances on computational resources, system can be built by a large number of constrained devices, yet easily connected, building a network of computational nodes, nodes that will be dedicated to execute control and communication tasks for the systems. These tasks are commanded by high level commanding systems, such as Manufacturing Execution Systems (MES) and Enterprise Resource Planning (ERP) modules. The aforementioned technologies allow a vertical approach for communicating commanding options from MES and ERP directly to the control nodes. This scenario allows to break down monolithic MES systems into small distributed functionalities, if these functionalities use Web standards for interacting and a knowledge base as main input for information, then we are arriving to the concept of Open KnowledgeDriven MES Systems (OKD-MES).The automatic distribution of the knowledge base in an OKD-MES mechanism and the accomplishment of the reasoning process in a distributed manner are the main objectives for this research. Thus, this research work describes the decentralization and management of knowledge descriptions which are currently handled by the Representation Layer (RPL) of the OKD-MES framework. This is achieved within the encapsulation of ontology modules which may be integrated by a distributed reasoning process on incoming requests. Furthermore, this dissertation presents the concept, principles and architecture for implementing Private Local Automation Clouds (PLACs), built by CPS.The thesis is an article thesis and is composed by 9 original and referred articles and supported by 7 other articles presented by the author

    Administración y control de proyectos extendiendo el concepto de indicadores

    Get PDF
    Hoy en día se manejan extensas cantidades de información, siendo esto un problema complejo a la hora de la toma de decisiones por parte de personas o empresas, particularmente en la industria del software. Para dicho fin, existen diferentes metodologías y herramientas que ayudan a la hora de manejar estas cantidades de información y poder extraer los aspectos más importantes que permiten tomar decisiones respecto del plan que se lleva a cabo. Dichas metodologías y herramientas se basan en controlar los tiempos y recursos para la gestión del plan; siendo un factor restrictivo a la hora de la toma de decisiones. Actualmente no existe ninguna herramienta totalmente integrada, abierta y lo suficientemente flexible que permita diseñar un plan y controlarlo a través de indicadores. Por esta razón se propone desarrollar un modelo con su posterior prototipo que subsane estas restricciones.Eje: Innovación en Sistemas de SoftwareRed de Universidades con Carreras en Informática (RedUNCI
    corecore