1,965 research outputs found

    Some extensions to reliability modeling and optimization of networked systems

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Project scheduling under undertainty – survey and research potentials.

    Get PDF
    The vast majority of the research efforts in project scheduling assume complete information about the scheduling problem to be solved and a static deterministic environment within which the pre-computed baseline schedule will be executed. However, in the real world, project activities are subject to considerable uncertainty, that is gradually resolved during project execution. In this survey we review the fundamental approaches for scheduling under uncertainty: reactive scheduling, stochastic project scheduling, stochastic GERT network scheduling, fuzzy project scheduling, robust (proactive) scheduling and sensitivity analysis. We discuss the potentials of these approaches for scheduling projects under uncertainty.Management; Project management; Robustness; Scheduling; Stability;

    Network coding via evolutionary algorithms

    Get PDF
    Network coding (NC) is a relatively recent novel technique that generalises network operation beyond traditional store-and-forward routing, allowing intermediate nodes to combine independent data streams linearly. The rapid integration of bandwidth-hungry applications such as video conferencing and HDTV means that NC is a decisive future network technology. NC is gaining popularity since it offers significant benefits, such as throughput gain, robustness, adaptability and resilience. However, it does this at a potential complexity cost in terms of both operational complexity and set-up complexity. This is particularly true of network code construction. Most NC problems related to these complexities are classified as non deterministic polynomial hard (NP-hard) and an evolutionary approach is essential to solve them in polynomial time. This research concentrates on the multicast scenario, particularly: (a) network code construction with optimum network and coding resources; (b) optimising network coding resources; (c) optimising network security with a cost criterion (to combat the unintentionally introduced Byzantine modification security issue). The proposed solution identifies minimal configurations for the source to deliver its multicast traffic whilst allowing intermediate nodes only to perform forwarding and coding. In the method, a preliminary process first provides unevaluated individuals to a search space that it creates using two generic algorithms (augmenting path and linear disjoint path. An initial population is then formed by randomly picking individuals in the search space. Finally, the Multi-objective Genetic algorithm (MOGA) and Vector evaluated Genetic algorithm (VEGA) approaches search the population to identify minimal configurations. Genetic operators (crossover, mutation) contribute to include optimum features (e.g. lower cost, lower coding resources) into feasible minimal configurations. A fitness assignment and individual evaluation process is performed to identify the feasible minimal configurations. Simulations performed on randomly generated acyclic networks are used to quantify the performance of MOGA and VEGA

    A Wide Area Hierarchical Voltage Control for Systems with High Wind Penetration and an HVDC Overlay

    Get PDF
    The modern power grid is undergoing a dramatic revolution. On the generation side, renewable resources are replacing fossil fuel in powering the system. On the transmission side, an AC-DC hybrid network has become increasingly popular to help reduce the transportation cost of electricity. Wind power, as one of the environmental friendly renewable resources, has taken a larger and larger share of the generation market. Due to the remote locations of wind plants, an HVDC overlay turns out to be attractive for transporting wind energy due to its superiority in long distance transmission of electricity. While reducing environmental concern, the increasing utilization of wind energy forces the power system to operate under a tighter operating margin. The limited reactive capability of wind turbines is insufficient to provide adequate voltage support under stressed system conditions. Moreover, the volatility of wind further aggravates the problem as it brings uncertainty to the available reactive resources and can cause undesirable voltage behavior in the system. The power electronics of the HVDC overlay may also destabilize the gird under abnormal voltage conditions. Such limitations of wind generation have undermined system security and made the power grid more vulnerable to disturbances. This dissertation proposes a Hierarchical Voltage Control (HVC) methodology to optimize the reactive reserve of a power system with high levels of wind penetration. The proposed control architecture consists of three layers. A tertiary Optimal Power Flow computes references for pilot bus voltages. Secondary voltage scheduling adjusts primary control variables to achieve the desired set points. The three levels of the proposed HVC scheme coordinate to optimize the voltage profile of the system and enhance system security. The proposed HVC is tested on an equivalent Western Electricity Coordinated Council (WECC) system modified by a multi-terminal HVDC overlay. The effectiveness of the proposed HVC is validated under a wide range of operating conditions. The capability to manage a future AC/DC hybrid network is studied to allow even higher levels of wind

    Protecting Complex Infrastructures Against Strategic Attackers

    Get PDF

    Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks

    Get PDF
    The increasing deployment of wireless devices has connected humans and objects all around the world, benefiting our daily life and the entire society in many aspects. Achieving those connectivity motivates the emergence of different types of paradigms, such as cellular networks, large-scale Internet of Things (IoT), cognitive networks, etc. Among these networks, enabling reliable and secure data transmission requires various resources including spectrum, energy, and computational capability. However, these resources are usually limited in many scenarios, especially when the number of devices is considerably large, bringing catastrophic consequences to data transmission. For example, given the fact that most of IoT devices have limited computational abilities and inadequate security protocols, data transmission is vulnerable to various attacks such as eavesdropping and replay attacks, for which traditional security approaches are unable to address. On the other hand, in the cellular network, the ever-increasing data traffic has exacerbated the depletion of spectrum along with the energy consumption. As a result, mobile users experience significant congestion and delays when they request data from the cellular service provider, especially in many crowded areas. In this dissertation, we target on reliable and secure data transmission in resource-constrained emerging networks. The first two works investigate new security challenges in the current heterogeneous IoT environment, and then provide certain countermeasures for reliable data communication. To be specific, we identify a new physical-layer attack, the signal emulation attack, in the heterogeneous environment, such as smart home IoT. To defend against the attack, we propose two defense strategies with the help of a commonly found wireless device. In addition, to enable secure data transmission in large-scale IoT network, e.g., the industrial IoT, we apply the amply-and-forward cooperative communication to increase the secrecy capacity by incentivizing relay IoT devices. Besides security concerns in IoT network, we seek data traffic alleviation approaches to achieve reliable and energy-efficient data transmission for a group of users in the cellular network. The concept of mobile participation is introduced to assist data offloading from the base station to users in the group by leveraging the mobility of users and the social features among a group of users. Following with that, we deploy device-to-device data offloading within the group to achieve the energy efficiency at the user side while adapting to their increasing traffic demands. In the end, we consider a perpendicular topic - dynamic spectrum access (DSA) - to alleviate the spectrum scarcity issue in cognitive radio network, where the spectrum resource is limited to users. Specifically, we focus on the security concerns and further propose two physical-layer schemes to prevent spectrum misuse in DSA in both additive white Gaussian noise and fading environments
    corecore