47 research outputs found

    Algorithms to Improve Performance of Wide Area Measurement Systems of Electric Power Systems

    Get PDF
    Power system operation has become increasingly complex due to high load growth and increasing market pressure. The occurrence of major blackouts in many power systems around the world has necessitated the use of synchrophasor based Wide Area Measurement Systems (WAMS) for grid monitoring. Synchrophasor technology is comparatively new in the area of power systems. Phasor measurement units (PMUs) and phasor data concentrators (PDCs) are new to the substations and control centers. Even though PMUs have been installed in many power grids, the number of installed PMUs is still low with respect to the number of buses or lines. Currently, WAMS systems face many challenges. This thesis is an attempt towards solving some of the technical problems faced by the WAMS systems. This thesis addresses four problems related to synchrophasor estimation, synchrophasor quality detection, synchrophasor communication and synchrophasor application. In the first part, a synchrophasor estimation algorithm has been proposed. The proposed algorithm is simple, requires lesser computations, and satisfies all the steady state and dynamic performance criteria of the IEEE Standard C37.118.1-2011 and also suitable for protection applications. The proposed algorithm performs satisfactorily during system faults and it has lower response time during larger disturbances. In the second part, areas of synchrophasor communication which can be improved by applying compressive sampling (CS) are identified. It is shown that CS can reduce bandwidth requirements for WAMS networks. It is also shown that CS can successfully reconstruct system dynamics at higher rates using synchrophasors reported at sub-Nyquist rate. Many synchrophasor applications are not designed to use fault/switching transient synchrophasors. In this thesis, an algorithm has been proposed to detect fault/switching transient synchrophasors. The proposed algorithm works satisfactorily during smaller and larger step changes, oscillations and missing data. Fault transient synchrophasors are not usable in WAMS applications as they represent a combination of fault and no-fault scenario. In the fourth part, two algorithms have been proposed to extract fault synchrophasor from fault transient synchrophasor in PDC. The proposed algorithms extract fault synchrophasors accurately in presence of noise, off-nominal frequencies, harmonics, and frequency estimation errors

    Extremal behavior of reduced type of one dimensional rings

    Full text link
    Let RR be a domain that is a complete local k\mathbb{k} algebra in dimension one. In an effort to address the Berger's conjecture, a crucial invariant reduced type s(R)s(R) was introduced by Huneke et. al. In this article, we study this invariant and its max/min values separately and relate it to the valuation semigroup of RR. We justify the need to study s(R)s(R) in the context of numerical semigroup rings and consequently investigate the occurrence of the extreme values of s(R)s(R) for the Gorenstein, almost Gorenstein, and far-flung Gorenstein complete numerical semigroup rings. Finally, we study the finiteness of the category CM(R)\text{CM}(R) of maximal Cohen Macaulay modules and the category Ref(R)\text{Ref}(R) of reflexive modules for rings which are of maximal/minimal reduced type and provide many classifications.Comment: 23 pages. Comments are welcom

    The Nano Controversy: Peasant Identities, the Land Question and Neoliberal Industrialization in Marxist West Bengal, India

    Get PDF
    As the peasant-Nano opposition suggests, urban activists and intellectuals dubbed the movement against the land acquisition and building of the factory as a complete rejection of globalization and industrialization. This paper contests these public images of the protests against land acquisition by drawing attention to certain paradoxes that the Singur case presents (which I discuss below). I address these paradoxes through an ethnography done in villages where the controversy and the protests took place for two years (2006-2008). My ethnography suggests a perspective on protests against land acquisition in India, which is different from the usual narrative of capitalist industrialization and globalization that Marxists, such as David Harvey (2007, 2008) has put forward

    RandomPoints package for Macaulay2

    Full text link
    We present {\tt RandomPoints}, a package in \emph{Macaulay2} designed mainly to identify rational and geometric points in a variety over a finite field. We provide tools to estimate the dimension of a variety. We also present methods to obtain non-vanishing minors of a given size in a given matrix, by evaluating the matrix at a point.Comment: 10 pages, comments welcome. Package by Sankhaneel Bisui, Zhan Jiang, Sarasij Maitra, Th\'ai Th\`anh Nguy\^en, Frank-Olaf Schreyer, Karl Schwede. The current version can be found here https://github.com/Macaulay2/Workshop-2020-Cleveland/blob/FastLinAlg/FastLinAlg/M2/RandomPoints.m

    Traceable PRFs: Full Collusion Resistance and Active Security

    Get PDF
    The main goal of traceable cryptography is to protect against unauthorized redistribution of cryptographic functionalities. Such schemes provide a way to embed identities (i.e., a mark ) within cryptographic objects (e.g., decryption keys in an encryption scheme, signing keys in a signature scheme). In turn, the tracing guarantee ensures that any pirate device that successfully replicates the underlying functionality can be successfully traced to the set of identities used to build the device. In this work, we study traceable pseudorandom functions (PRFs). As PRFs are the workhorses of symmetric cryptography, traceable PRFs are useful for augmenting symmetric cryptographic primitives with strong traceable security guarantees. However, existing constructions of traceable PRFs either rely on strong notions like indistinguishability obfuscation or satisfy weak security guarantees like single-key security (i.e., tracing only works against adversaries that possess a single marked key). In this work, we show how to use fingerprinting codes to upgrade a single-key traceable PRF into a fully collusion resistant traceable PRF, where security holds regardless of how many keys the adversary possesses. We additionally introduce a stronger notion of security where tracing security holds even against active adversaries that have oracle access to the tracing algorithm. In conjunction with known constructions of single-key traceable PRFs, we obtain the first fully collusion resistant traceable PRF from standard lattice assumptions. Our traceable PRFs directly imply new lattice-based secret-key traitor tracing schemes that are CCA-secure and where tracing security holds against active adversaries that have access to the tracing oracle

    Tilt Texture Domains on a Membrane and Chirality induced Budding

    Full text link
    We study the equilibrium conformations of a lipid domain on a planar fluid membrane where the domain is decorated by a vector field representing the tilt of the stiff fatty acid chains of the lipid molecules, while the surrounding membrane is fluid and structureless. The inclusion of chirality in the bulk of the domain induces a novel budding of the membrane, which preempts the budding induced by a decrease in interfacial tension.Comment: 5 pages, 3 figure

    Theoretical model for the formation of caveolae and similar membrane invaginations

    Get PDF
    We study a physical model for the formation of bud-like invaginations on fluid lipid membranes under tension, and apply this model to caveolae formation. We demonstrate that budding can be driven by membrane-bound proteins, provided that they exert asymmetric forces on the membrane that give rise to bending moments. In particular, caveolae formation does not necessarily require forces to be applied by the cytoskeleton. Our theoretical model is able to explain several features observed experimentally in caveolae, where proteins in the caveolin family are known to play a crucial role in the formation of caveolae buds. These include 1), the formation of caveolae buds with sizes in the 100-nm range and 2), that certain N- and C-termini deletion mutants result in vesicles that are an order-of-magnitude larger. Finally, we discuss the possible origin of the morphological striations that are observed on the surfaces of the caveolae
    corecore