174 research outputs found

    Estudio y análisis de nuevos mecanismos para el comercio de energía en microrredes. Implementación de una microrred eléctrica

    Get PDF
    En el presente documento se realiza un estudio y análisis sobre, análisis e implementación de nuevos mecanismos para el comercio de energía usando diferentes tipos de estrategias distribuidas apoyándonos en la composición de una microrred. De esta manera se pretende visualizar y plasmar la transformación digital con el uso de nuevos mecanismos de comprar y vender energía de una manera rápida y sencilla. Además, se pretende demostrar la viabilidad de forma técnica como económica de una microrred que puede abastecer eléctricamente un centro de estudios o investigación como podría ser la escuela de Ingenieros de la Universidad de Málaga. En primer lugar, se parte de la idea de conocer un campo energético en vistas de progreso a corto plazo como son las microrredes. Posteriormente veremos además diferentes fuentes de generación distribuida que se puede incorporar a la microrred y los sistemas de almacenamiento más importantes. En segundo lugar, comprobaremos los diferentes tipos de gestión de la demanda de las microrredes y los sistemas de control que se establecen. Muy interesante tener en cuenta los sistemas de control tanto conectado como desconectado de la red que sigue una microrred. Seguidamente se estudiará los diferentes conceptos innovadores en el uso de las microrredes. Estos sistemas que veremos en profundidad en posteriores capítulos como Blockchain, Peer-to Peer trading in microgrid son novedosos para la gran mayoría. Por último, se elegirá una estructura de microrred, definiremos los componentes y requisitos que deben cumplir, así como los costes de inversión y mantenimiento. Con esto más la definición de diferentes variables (velocidad de viento, radiación solar, etc) obtendremos el sistema de microrred óptimo que nos suministre lo que demandamos a la red eléctrica.This document conducts a study and analysis and implementation of new mechanisms for energy trading using different types of distributed strategies based on the composition of a microgrid. In this way it is intended to visualize and capture the digital transformation with the use of new mechanisms to buy and sell energy in a quick and simple way. Such as, it is pretended to demonstrate the viability in a technical and economic way of a microgrid that can electrically supply a center of studies or research such as the School of Engineering of the University of Malaga. Firstly, it is based on the idea of knowing an energy field in view of short-term progress such as microgrids. Later we will also see different sources of distributed generation that can be incorporated into the microgrid and the most important storage systems. Secondly, we will check the different types of demand management of the microgrids and the control systems that are put in place. Very interesting to consider the control systems both connected and disconnected from the network that follows a microgrid. On the other hand, the different innovative concepts in the use of microgrids will be studied. These systems that we will see in depth in later chapters such as Blockchain, Peer-to-Peer trading in microgid are novel and unknown to the vast majority. Finally, a microgrid structure will be chosen, we will define the components and requirements that they must meet, as well as the investment and maintenance costs. With this plus the definition of different variables (wind speed, solar radiation, etc.) we will obtain the optimal microgrid system that supplies us with what we demand from the electricity grid.Universidad de Sevilla. Grado en Ingeniería de la Energía

    High temperature corrosion behavior on molten nitrate salt-based nanofluids for CSP plants

    Get PDF
    Recently, a number of theoretical and experimental studies have been performed to understand the effect of nanoparticles on thermal properties and heat transfer performance but there is a lack regarding their corrosion properties. In this work, an extended corrosion characterization (at central tower plant storage temperature (565 °C)) has been carried out in two different grades of solar salt (industrial and refined purity) doped with the addition of 1 wt% Al2O3 nanoparticles or 1 wt% SiO2 nanoparticles. Corrosion rates were determined in commercial stainless steel commonly used in CSP technology (347SS) by gravimetric tests, measuring the weight gain during 1000 h, identifying the corrosion products by Scanning Electron Microscopy (SEM) and X-Ray Diffraction (XRD). The lowest corrosion rate (0.007 mm/year) was obtained in the refined solar salt with the addition of 1 wt% Al2O3 nanoparticles. A protective layer was formed in the steel-salt interphase, identified through XRD as Al2O3.The authors would like to acknowledge the financial support provided by CONICYT/FONDAP 15110019 “Solar Energy Research Center” SERC-Chile. The authors wish to acknowledge the Univer- sity of the Basque Country UPV/EHU for supporting the PhD of Belen Munoz-Sanchez (Zabalduz program) and her research stay at the Universidad de Antofagasta

    PUE attack detection in CWSN using collaboration and learning behavior

    Get PDF
    Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of networks manage critical applications and data. Moreover, the specific constraints of WSN make the problem even more critical. However, effective solutions have not been implemented yet. Among the specific attacks derived from new cognitive features, the one most studied is the Primary User Emulation (PUE) attack. This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. A nonparametric CUSUM algorithm, suitable for low resource networks like CWSN, has been used in this work. The algorithm has been tested using a cognitive simulator that brings important results in this area. For example, the result shows that the number of collaborative nodes is the most important parameter in order to improve the PUE attack detection rates. If the 20% of the nodes collaborates, the PUE detection reaches the 98% with less than 1% of false positives

    A game theory based strategy for reducing energy consumption in cognitive WSN

    Get PDF
    Wireless sensor networks (WSNs) are one of the most important users of wireless communication technologies in the coming years and some challenges in this area must be addressed for their complete development. Energy consumption and spectrum availability are two of the most severe constraints of WSNs due to their intrinsic nature. The introduction of cognitive capabilities into these networks has arisen to face the issue of spectrum scarcity but could be used to face energy challenges too due to their new range of communication possibilities. In this paper a new strategy based on game theory for cognitive WSNs is discussed. The presented strategy improves energy consumption by taking advantage of the new change-communication-channel capability. Based on game theory, the strategy decides when to change the transmission channel depending on the behavior of the rest of the network nodes. The strategy presented is lightweight but still has higher energy saving rates as compared to noncognitive networks and even to other strategies based on scheduled spectrum sensing. Simulations are presented for several scenarios that demonstrate energy saving rates of around 65% as compared to WSNs without cognitive techniques

    Evaluation, energy optimization, and spectrum analysis of an artificial noise technique to improve CWSN security

    Get PDF
    This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number of packets transmitted by the network and the active period of the nodes increase. Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. In this work, the scenario is formally modeled and the optimization according to the simulation results and the impact analysis over the frequency spectrum are presented

    Business intelligence maturity models: opportunities and recommendations for future investigation - a systematic literature review - part 1

    Get PDF
    La globalización de la economía representa grandes desafíos. Uno de ellos es la explotación de la información y el conocimiento de la empresa. Convertir datos en información y la información en conocimiento se denomina inteligencia de negocios- BI. Se han desarrollado varias herramientas de BI para apoyar el proceso de toma de decisiones. Los modelos de madurez son una de estas herramientas. Esta investigación tiene como objetivo mostrar en dos partes, lagunas y proponer oportunidades para el avance en este campo. En general, se reveló un predominio de características genéricas y descriptivas. Se detectaron algunas lagunas relacionadas con modelos que pueden adaptarse a segmentos industriales específicos. Este campo todavía ofrece amplias posibilidades para nuevos modelos de investigación y madurez.The economy globalization represents significant challenges. One of them is information exploitation and company knowledge. Converting data into information and information into knowledge is called Business Intelligence – BI. Several BI tools have been established to support the decision-making process. Maturity Models is one of these tools. This research aims to show in two parts, breaches and to propose prospects for the progression of this field. In general, the prevalence of generic and descriptive features was revealed. Some gaps related to models that can be modified to specific industrial sectors were detected. This field offers great promises for new investigations and maturity models

    A Comparative Study of Stochastic Model Predictive Controllers

    Full text link
    [EN] A comparative study of two state-of-the-art stochastic model predictive controllers for linear systems with parametric and additive uncertainties is presented. On the one hand, Stochastic Model Predictive Control (SMPC) is based on analytical methods and solves an optimal control problem (OCP) similar to a classic Model Predictive Control (MPC) with constraints. SMPC defines probabilistic constraints on the states, which are transformed into equivalent deterministic ones. On the other hand, Scenario-based Model Predictive Control (SCMPC) solves an OCP for a specified number of random realizations of uncertainties, also called scenarios. In this paper, Classic MPC, SMPC and SCMPC are compared through two numerical examples. Thanks to several Monte-Carlo simulations, performances of classic MPC, SMPC and SCMPC are compared using several criteria, such as number of successful runs, number of times the constraints are violated, integral absolute error and computational cost. Moreover, a Stochastic Model Predictive Control Toolbox was developed by the authors, available on MATLAB Central, in which it is possible to simulate a SMPC or a SCMPC to control multivariable linear systems with additive disturbances. This software was used to carry out part of the simulations of the numerical examples in this article and it can be used for results reproduction.Gonzalez, E.; Sanchís Saez, J.; Garcia-Nieto, S.; Salcedo-Romero-De-Ávila, J. (2020). A Comparative Study of Stochastic Model Predictive Controllers. Electronics. 9(12):1-22. https://doi.org/10.3390/electronics9122078S12291

    Planificación estratégica de enfermería en Extremadura: aproximación conceptual

    Get PDF
    En el presente artículo se pretende ofrecer a las personas interesadas en el campo de la gestión, en general y en la gestión de los servicios de enfermería, en particular, una aproximación a los principales conceptos que afectan la planificación estratégica de los servicios de enfermería. El objetivo es que pueda servir como base sobre la que en un futuro puedan desarrollarse proyectos de desarrollo profesional en enfermería. La metodología utilizada ha sido una amplia revisión de la bibliografía relacionada, en la que han destacado aspectos profesionales, sociales, económicos y de gestión. La conclusión más importante que podemos obtener es la necesidad de abordar los servicios de enfermería desde una óptica profesionalizada de gestión, en la que se pueda obtener un mayor desarrollo profesional y beneficio social.This article is intended to provide persons interested in the field of management in general and in the management of the nursing services, in particular, an approach to the main concepts that affect the strategic planning of nursing services. The objective is that it can serve as a future based on which they can develop professional development projects in nursing. The methodology used has been a comprehensive review of the related literature, which have featured professional, social, economic aspects and management. The most important conclusion that we can get is the need to address the nursing services from a professional perspective of management, in which can be obtain greater professional growth and social benefit

    A security scheme for wireless sensor networks

    Get PDF
    Security is critical for wireless sensor networks (WSN)deployed in hostile environments since many types of attacks could reduce the trust on the global functioning of any WSN. Many solutions have been proposed to secure communications for WSNs and most of them rely on a centralized component which behaves as a certificate authority. We propose in this paper a distributed solution able to ensure authentication of nodes at any time without having any on-line access to a certificate authority. Each node will be equipped with a Trusted Platform Module (TPM) which is able to store keys with security. Each node will have its own public key and private key pair in the TPM and a certificate of the public key. The certificate is issued off-line when setting-up the node. When a node communicates with another, it has to sign the message with its own private key (done securely by the TPM) and sends the message, the signature and the certificate of the public key. The evaluation of the solution has been done using simulation and the overhead added by integrating authentication does not exceed 15% of energy consumption

    The habitat of university and non-university startups

    Get PDF
    The habitat concept is been demonstrated as a crucial environment surrounding startups. The aim of this paper is to examine the differences between startups born in the university and startups born in science parks. Using a multilevel analysis, we compile a unique dataset of 242 Spanish-based technology startups and distinguish between university startups (122) and non-university startups (120). Likewise, demographic profiles and business characteristics are used in the analysis. Consistent with other research, our results indicate that university startups have more opportunities to obtain financial resources and to develop innovations. By contrast, non-university startups involve entrepreneurs with more experience
    corecore