The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper, there are considered functional abilities of information operator support systems (IOSS) of power units of nuclear power plants (NPP) and their place within the an unit-level system of automated process control systems (APCS) of NPP. The purpose of implementation of NPP IOSS is preventing or decreasing the frequency and heaviness of human-operator errors appearing during transients and...
The paper introduces a new model to find the optimal timing of preventive replacement of an equipment. The traditional models do not take the down times into account when inspections and repairs are being performed. The distribution of time to failure really depends on the effective age of equipment, which can be computed by solving a monotonic equation including the repair and inspection down times...
This paper presents a computational model of the mid-term outage scheduling process of electric power transmission assets, to be used in long-term studies such as maintenance policy assessments and system development studies, while accounting for the impact of outage schedules on short-term system operation. We propose a greedy algorithm that schedules the outages one by one according to their impact...
Immediately after a disaster, the normal telecommunication infrastructure, including wired and wireless networks, is often seriously compromised and cannot guarantee regular coverage and reliable communications services. These temporarily-missing communications capabilities are crucial to rescuers and affected citizens as the responders need to effectively coordinate and communicate to minimize the...
In this article, a novel multilevel Monte Carlo (MLMC) simulation approach is applied for large distribution systems reliability evaluation. Basic Monte Carlo simulation (MCS) can be effectively used in this purpose. However, main limitation of MCS is the huge computational cost when a large sample size is needed for a high accuracy. The MLMC method reduces the variance of MCS and speeds up its computational...
The interest in maintainability, availability and the techniques to evaluate it had an exponential growth in the last few years, in particular for systems involved in mission-critical environments: these applications demand both high performance and high availability. Maintainability is directly associated to the concept of availability assessment since it concerns failure and recovery aspects of...
The paper proposes a new approach to model checking Chandy-Lamport Distributed Snapshot Algorithm (CLDSA). The essential of the approach is that CLDSA is specified as a meta-program in Maude such that the meta-program takes a specification of an underlying distributed system (UDS) and generates the specification of the UDS on which CLDSA is superimposed (UDS-CLDSA). To model check that a UDS-CLDSA...
This paper introduces a methodology that allows investigating the impact of Information and Communication Technologies (ICTs) implemented within a Smart Grid framework. Such implementations are of imperative importance to overcome the current needs for increased network utilization and connection of renewable energy sources. Common applications include Flexible AC transmission systems (FACTS) and...
In this paper, the fundamental problem of distribution and proactive caching of computing tasks in fog networks is studied under latency and reliability constraints. In the proposed scenario, computing can be executed either locally at the user device or offloaded to an edge cloudlet. Moreover, cloudlets exploit both their computing and storage capabilities by proactively caching popular task computation...
This paper applies a grid reduction method that is based on the St. Clair curve to create a transmission approximation of the Electric Reliability Council of Texas (ERCOT, the grid operator of the state of Texas, US) for use in a unit commitment and dispatch UC&D model. Comparison with known transmission limitations suggests that the approximation error might be too great for the approximation...
In recent years, power systems have been watching important advancements related with Plug-in-Electrical Vehicles (PEVs), Demand Side Management (DSM), Distributed Generation (DG), Microgrid and Smart Grid installations that directly affect distribution networks while impacting indirectly on Transmission studies. These changes will lead to an extra flexibility on the transmission-distribution boundary...
With the development of intelligent technologies, self-driving vehicles are considered as a promising solution against accident, traffic congestion and pollution problems. Intelligent vehicle techniques have been the research focus all over the world. However, full self-driving vehicles are still far away from its realization and extensive application due to safety requirements and cost considerations...
Safety is one of the main guidelines for critical systems design. Designers are in charge of developing architectures that comply with the safety requirements. Thus they must ensure that qualitative safety indicators such as the minimal size of failures scenario leading to a failure condition fc and quantitative indicators such as the probability to reach fc after a certain time interval, are kept...
Condition monitoring data have been widely used to evaluate the health state and reliability, as well as estimate the remaining useful life (RUL) for degrading systems. Among various degradation modeling and RUL estimating methods, Wiener process based models is recognized by both scholars and engineers as the one of the most effect tools, and thus becomes very popular nowadays. In this paper, a prognostic...
Physical Unclonable Functions (PUFs) are promising security primitives for device authentication and key generation. This paper proposes a two-step methodology to improve the reliability of PUF under noisy conditions. The first step involves acquiring the parameters of PUF models by using machine learning algorithms. The second step then utilizes these obtained parameters to improve the reliability...
The article considers the problem of identifying the efficiency of active erosion preventive measures for wet-steam turbine blades. The erosion prediction technique and software packages based on this technique are also studied. The conclusion is made about the necessity to simulate drop impingement erosion as a process caused by a high-cycle material fatigue as a result of numerous drop impacts on...
Evaluating and scoring essay questions is an exhausting, time consuming process and require a lot of effort. So, applying automated tools is essentially required to tackle these drawbacks. In this study, we propose an automated scoring approach for short answers to Arabic essay questions. The scoring process is based on the similarity between the student's answer and model answer, cosine similarity...
Synchronization using flip-flop chains imposes a latency of a few clock cycles when transferring data and control signals between clock domains. We propose a design scheme that avoids this latency by performing synchronization as part of state/data computations while guaranteeing that metastability is contained and its effects tolerated (with an acceptable failure probability). We present a theoretical...
This study focuses on the understanding of moisture diffusion physics under use conditions (UC) and its impact on definition of qualification requirements. It uses computational modeling and detailed measurements of UC to challenge some long held assumptions used in moisture risk assessments. It introduces the quantity called "Stable Wetness" to account for moisture amount present in the...
In the Era of the Internet of Things (IoT) the validity of sensing coverage is of utmost importance as it affects the reliability of sensing services. The presence of anchor misplacement poses a challenge on the validity of sensing coverage. This kind of challenge has generally been overlooked in sensing coverage research. In this paper, we investigate the sensing validity under several scenarios...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.