162,997 research outputs found

    Network emulation focusing on QoS-Oriented satellite communication

    Get PDF
    This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication

    The Signal Data Explorer: A high performance Grid based signal search tool for use in distributed diagnostic applications

    Get PDF
    We describe a high performance Grid based signal search tool for distributed diagnostic applications developed in conjunction with Rolls-Royce plc for civil aero engine condition monitoring applications. With the introduction of advanced monitoring technology into engineering systems, healthcare, etc., the associated diagnostic processes are increasingly required to handle and consider vast amounts of data. An exemplar of such a diagnosis process was developed during the DAME project, which built a proof of concept demonstrator to assist in the enhanced diagnosis and prognosis of aero-engine conditions. In particular it has shown the utility of an interactive viewing and high performance distributed search tool (the Signal Data Explorer) in the aero-engine diagnostic process. The viewing and search techniques are equally applicable to other domains. The Signal Data Explorer and search services have been demonstrated on the Worldwide Universities Network to search distributed databases of electrocardiograph data

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Enhanced Electric Vehicle Integration in the UK Low Voltage Networks with Distributed Phase Shifting Control

    Get PDF
    Electric vehicles (EV) have gained global attention due to increasing oil prices and rising concerns about transportation-related urban air pollution and climate change. While mass adoption of EVs has several economic and environmental benefits, large-scale deployment of EVs on the low-voltage (LV) urban distribution networks will also result in technical challenges. This paper proposes a simple and easy to implement single-phase EV charging coordination strategy with three-phase network supply, in which chargers connect EVs to the less loaded phase of their feeder at the beginning of the charging process. Hence, network unbalance is mitigated and, as a result, EV hosting capacity is increased. A new concept, called Maximum EV Hosting Capacity (HC max) of low voltage distribution networks, is introduced to objectively assess and quantify the enhancement that the proposed phase-shifting strategy could bring to distribution networks. The resulting performance improvement has been demonstrated over three real UK residential networks through a comprehensive Monte Carlo simulation study using Matlab and OpenDSS tools. With the same EV penetration level, the under-voltage probability was reduced in the first network from 100% to 54% and in the second network from 100% to 48%. Furthermore, percentage voltage unbalance factors in the networks were successfully restored to their original values before any EV connection.Peer reviewedFinal Accepted Versio
    corecore