7 research outputs found

    Performance optimization with energy packets

    Get PDF
    We investigate how the flow of energy and the flow of jobs in a service system can be used to minimize the average response time to jobs that arrive according to random arrival processes at the servers. An interconnected system of workstations and energy storage units that are fed with randomly arriving harvested energy is analyzed by means of the Energy Packet Network (EPN) model. The system state is discretized, and uses discrete units to represent the backlog of jobs at the workstations, and the amount of energy that is available at the energy storage units. An Energy Packet (EP) which is the unit of energy, can be used to process one or more jobs at a workstation, and an EP can also be expended to move a job from one workstation to another one. The system is modeled as a probabilistic network that has a product-form solution for the equilibrium probability distribution of system state. The EPN model is used to solve two problems related to using the flow of energy and jobs in a multi-server system, so as to minimize the average response time experienced by the jobs that arrive at the system

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U-1) and User 2 (U-2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U-1 and U-2. The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U-1 was also compared to the secrecy performance of U-2. Finally, the simulation results matched the Monte Carlo simulations well.Web of Science203art. no. 89

    Performance Assessment of Pareto and Non-Pareto Approaches for the Optimal Allocation of DG and DSTATCOM in the Distribution System

    Get PDF
    This paper proposes a Differential Evolution (DE) optimization algorithm and a Pareto-frontier Multi-Objective Differential Evolution (MODE) optimization algorithm for the optimal allocation of Distributed Generation (DG) and Distribution Static Compensator (DSTATCOM) in a radial distribution system. It considers the minimization of active power dissipation, voltage drop and the annual cost as the objectives of this optimization problem. The proposed techniques are tested on an IEEE 33 bus radial distribution system. To compare the performance of the MODE and DE, the weighted sum approach is carried out. This helps to select one solution from the Pareto front of the MODE. Case studies show that the allocation of both DG and DSTATCOM results in a noticeable reduction of system losses, voltage drop and annual cost. Comparative studies also show that the global convergence characteristics of MODE are better than several other optimization algorithms

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U1) and User 2 (U2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U1 and U2. The transmission’s security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system’s secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U1 was also compared to the secrecy performance of U2. Finally, the simulation results matched the Monte Carlo simulations well

    Decentralized Algorithms for Consensus-Based Power Packet Distribution

    Get PDF
    Power packets are proposed as a transmission unit that can deliver power and information simultaneously. They are transferred using the store-and-forward method of power routers. A system that achieves power supply/demand in this manner is called a power packet network (PPN). A PPN is expected to enhance structural robustness and operational reliability in an energy storage system (ESS) with recent diverse distributed sources. However, this technology is still in its early stage, and faces numerous challenges, such as high cost of implementation and complicated energy management. In this paper, we propose a novel power control based on decentralized algorithms for a PPN. Specifically, the power supply is triggered and managed by communications between power routers. We also discuss the mechanism of the decentralized algorithm for the operation of power packets and reveal the feasibility of the given control method and application by forming biased power flows on the consensus-based distribution.Comment: This paper was submitted to Nonlinear Theory and Its Applications, IEICE on October 29, 202

    Age of Information of a Server with Energy Requirements

    Get PDF
    We investigate a system with Poisson arrivals to two queues. One queue stores the status updates of the process of interest (or data packets) and the other handles the energy that is required to deliver the updates to the monitor. We consider that the energy is represented by packets of discrete unit. When an update ends service, it is sent to the energy queue and, if the energy queue has one packet, the update is delivered successfully and the energy packet disappears; however, in case the energy queue is empty, the update is lost. Both queues can handle, at most, one packet and the service time of updates is exponentially distributed. Using the Stochastic Hybrid System method, we characterize the average Age of Information of this system. Due to the difficulty of the derived expression, we also explore approximations of the average Age of Information of this systemJosu Doncel has received funding from the Department of Education of the Basque Government through the Consolidated Research Group MATHMODE (IT1294-19), from the Marie Sklodowska-Curie grant agreement No. 777778 and from from the Spanish Ministry of Science and Innovation with reference PID2019-108111RB-I00 (FEDER/AEI). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscrip
    corecore