Reliability Considerations in Cyber-Power Dependent Systems

Size: px
Start display at page:

Download "Reliability Considerations in Cyber-Power Dependent Systems"

Transcription

1 Reliability Considerations in Cyber-Power Dependent Systems Visvakumar Aravinthan Wichita State University PSERC Webinar April 17,

2 Acknowledgement This work was part of PSERC project T-53 Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Collaborative work between Texas A&M & Wichita State The following students contributed to this work Mohammad Heidari Mojtaba Sepehry Thanatheepan Balachandran Suvagata Chakraborty 2

3 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 3

4 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 4

5 Background & Motivation 5

6 Background & Motivation A simple example of cyber-power system Automated fault isolation as the example This process depends on Communication Automatic decision 6

7 Background & Motivation The cyber-power system can be modeled as A three layer system 7

8 Background & Motivation Three layer system 8

9 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 9

10 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Traditional equipment failure management t 2 Corrective Action Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 10

11 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Preventive equipment failure management Preventive Action t 2 Corrective Action Improve Monitoring Failure rate (λ) Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 11

12 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Combination of electrical & monitoring Electrical equipment Normal Preventive action Failure Scheduled maintenance Monitoring Normal Failure Scheduled maintenance M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 12

13 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: State transition model for reliability evaluation Up μμ λλ Down M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 13

14 Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Failure rate of the smart component (Markov Model) State transition State 0: pp 0 θθ ssss + λλ ssss + λλ pppp = pp 2 μμ pppp + pp 3 μμ ssss + PP 5 μμ 0 State 1: pp 1 θθ pppp = pp 0 (λλ pppp ) State 2: pp 2 λλ dd + μμ pppp = pp 1 θθ pppp State 3: pp 3 λλ cc + μμ ssss = pp 0 θθ ssss + pp 4 θθ ssss State 4: pp 4 λλ cc + θθ ssss = pp 0 λλ ssss State 5: pp 5 μμ 0 = pp λλ dd + pp 3 λλ cc + pp 4 (λλ cc ) Smart component failure rate λλ ssssss = λλ dd pp 2 + λλ cc pp 3 + λλ cc pp 4 Can be shown that iiii pp 0 > 0 λλ ssssss < λλ cc Failure rate decreases M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 14

15 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 15

16 Effect of Communication Communication network Successful data received rate 16

17 Effect of Communication Communication network Failure data: Data Availability Missing Data Rate Recovery Rate failures per day second 17

18 Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Critical to understand the dependency M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 18

19 Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Communication enabled switches Time sequential Monte-Carlo simulation Unavailability based approach M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc North American Power Symposium 19

20 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 20

21 Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Decision is made based on the information received from fault indicators Communication failure can be modeled based on the network behavior M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

22 Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Fault detector Remote controlled switch si ii PP ffii = PP ffff i cf ii + 1 PP ffff i cf i sw ii PP ffff i cf i sw P = P + ( 1 P ) P + (1 P )(1 P ) P i ak M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

23 Cyber System Failure Modeling Network availability modeling Cyber network with single path Graph r 0 =S r 1 r 2 r h 2 r h 1 r h = D Probability of transmitted data from S received at D PP ss = PP ss rr 0 rr 1 PP ss rr 1 rr 2 PP ss rr h 1 rr h S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 23

24 Cyber System Failure Modeling Network availability modeling Physical network model with multiple paths Graph of the above model S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 24

25 Cyber System Failure Modeling Network availability modeling Reliability computation for multipath network Multiple paths between source and destination AA CC EE AA BB FF HH AA BB DD AA CC GG HH AA BB FF GG EE Successful data transmission PP ss = PP AA CC EE PP AA BB FF HH PP AA BB DD PP AA CC GG HH PP AA BB FF GG EE S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 25

26 Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Series parallel approach: RR ss = 1 1 RR AA RR BB 1 RR CC RR DD = Simple approach but limited to either series or parallel combinations. Concern: Cyber network more complicated S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 26

27 Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Minimal cut set approach: Minimal cut sets: AAAA AAAA BBBB BBBB System structure function: ψψ XX AA, XX BB, XX CC, XX DD = 1 1 XX AA 1 XX CC 1 1 XX AA 1 XX DD 1 1 XX BB 1 XX CC 1 1 XX BB 1 XX DD = XX AA + XX cc XX AA XX CC XX AA + XX DD XX AA XX DD XX BB + XX CC XX BB XX CC XX BB + XX DD XX BB XX DD = XX AA XX BB + XX CC XX DD XX AA XX BB XX CC XX DD Reliability of the network RR ss = EE ψψ XX AA, XX BB, XX CC, XX DD = EE[XX AA XX BB ] + EE[XX CC XX DD ] EE[XX AA XX BB XX CC XX DD ] = RR AA RR BB + RR CC RR DD RR AA RR BB RR CC RR DD = S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 27

28 Cyber System Failure Modeling Network availability modeling For the given simple network Minimal cut sets CCCCCC AAAAAA BBBBBB {BBBBBB} CCCCCC, AAAAAA Structure function is given by ψψ (3,4) = 1 [ 1 1 XX BB 1 XX DD 1 XX EE 1 1 XX CC 1 XX DD 1 XX FF 1 1 XX BB 1 XX DD 1 XX FF 1 1 XX CC 1 XX DD 1 XX EE 1 1 XX AA 1 XX DD 1 XX FF { 1 XX AA 1 XX DD 1 XX E } Calculations becomes tedious as network gets larger S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 28

29 Cyber System Failure Modeling Network availability modeling For effective computation Lower bound for the link reliability can be determined Reasonable lower bound Place minimal cut-sets in series Total number of cut sets RR LLLL llllllll cc = ii=1 1 kkεεss ii 1 RR kk Reliability of element i Set of elements in cut set i S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 29

30 Cyber System Failure Modeling Network availability modeling Example: Communication links can be: Decisions can be: centralized or decentralized Simple network: S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 30

31 Cyber System Failure Modeling Network availability modeling Example: Worst case Expected Energy Not Served (WEENS): DR level 1: Partial load curtailment DR level 2: Complete load curtailment S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 31

32 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 32

33 Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Any of the following can be compromised Control Center network Corporate network Substation network Device level network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

34 Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Compromise of any one network will result in all the associated networks being compromised For reliability analysis series connected elements (if no firewall) Control Center Network Substation Network Device Network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

35 Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Challenge: Attack and recovery model Needs human behavior based modeling If known then could be modeled using common mode failure approach M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

36 Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Automatic switch operation time Manual switching time Time to recover from cyber attack Based on availability of alternative path time for reconfiguration Fault detectors Manual switch Automated switch M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

37 Cyber System Failure Modeling Failure of cyber system A single effect (attack) can affect multiple parts (network) Common cause failure (CCF) model: A group of components fail due to a shared cause The reason behind the failure (root cause) Which parts are affected and why (coupling factor) An event that causes a set of components to fail is known as common cause event (CCE). Components that could fail for the same cause(s) are grouped together; common cause component group (CCCG) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

38 Cyber System Failure Modeling Failure of cyber system Common cause failure (CCF) model: Example: Switching Operation in one frequency Sensors in another frequency M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

39 Dependent failures Step 1: Determine the common cause component group (CCCG) Step 2: Determine basic event probabilities All possible ways αα kk = Cyber System Failure Modeling For example alpha factor method can be used A component can fail due to mm kk mm jj=1 Independent failure of the given component Dependent failure due to k out of m components Assume equal probability of occurrence mm jj PP kk PP jj Probability Dependent failure probability PP kk (mm) = kk mm 1 kk 1 Total failure probability of component k αα kk mm jj=1 jjαα jj PP tt(kk) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

40 Cyber System Failure Modeling Fault detector & automatic switch placement based on the cost Objective: minimize Investment cost (switch and fault detectors) Expected interruption cost for customers M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

41 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 41

42 Dependent System Modeling Tools: A Need Required approach Power System Failures (Random) Cyber Component Failure (Random) Message failure Message delay Cyber attack Interdependent System Reliability Evaluation Cyber Failure Impact on Power System Direct impact - Power component failure Indirect impact - Failure may impact - Not operate in safe state 42

43 Dependent System Modeling Tools: A Need Failure modes Power component Communication and coupling Decision 43

44 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 44

45 Final Remarks Cyber system benefits are correlated with power system operational needs A three layer approach can be utilized by separating Power components Communication and coupling components Decision components Dependent system based modeling increases possible states of operations Adjustments to reliability analysis is required with Understanding of communication link failure Understanding cyber attack 45

46 Future Needs A unified analytical framework for cyber-power system needs to be better established. Effective modeling of cyber-unavailability and cyber-manipulation is a prerequisite. A human behavior based modeling for cyber attack can provide better insight Propagation of cyber failure on power system application (similar to cascading failure) needs to be further studied. 46

47 Final-Final Remarks Cyber solutions become more effective if: Power system applications are more identified Dependent effects of cyber and power systems are better understood Solutions utilize the properties of both cyber & power An appropriate performance evaluation tool is used to assess the benefits against the cost and adaptability. 47

48 Questions? Visvakumar Aravinthan 48

49 Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs System Properties Based Communication 49

50 System Properties Based Communication Cyber infrastructure can improve reliability How to enhance the benefits One of the options Distributed Sensor Network at feeder level. Event driven communication protocol for distribution Communicate upon an event Not communicate periodically One application Use power system properties in communication protocol in anomaly detection applications. M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March

51 System Properties Based Communication Distributed sensor network Hierarchical communication architecture. Lower level - WiMax, Upper Level Wired. Use mesh network architecture between the control centers and the substation level communication M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug

52 System Properties Based Communication Communication Delay lost packets Identify a protocol that will prioritize time sensitive data M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug

53 System Properties Based Communication Communication Delay lost packets Allocate the first slot for time sensitive data Problem: Solution: M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug

54 System Properties Based Communication Communication Delay lost packets Allocate based on the location Or incorporate power system properties Z line,1 Z line,2 Z line,i Fault Substation Z load,1 Z load,2 Z load,i-1 Z load,i Z fault = 0 M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug

55 System Properties Based Communication Communication Delay lost packets Specific node communicating 100% of the time Latency M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug

Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage

Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Final Project Report T-53 Power Systems Engineering Research Center Empowering Minds to Engineer

More information

Chanan Singh Texas A&M University PSERC Webinar November 22, 2016

Chanan Singh Texas A&M University PSERC Webinar November 22, 2016 Chanan Singh Texas A&M University (singh@ece.tamu.edu) PSERC Webinar November 22, 2016 1 Modern power systems: integration of current carrying components (for power delivery), monitoring, computing, communication

More information

Lesson 12: Angles Associated with Parallel Lines

Lesson 12: Angles Associated with Parallel Lines Lesson 12 Lesson 12: Angles Associated with Parallel Lines Classwork Exploratory Challenge 1 In the figure below, LL 1 is not parallel to LL 2, and mm is a transversal. Use a protractor to measure angles

More information

AMI: Communications and Integration Options

AMI: Communications and Integration Options AMI: Communications and Integration Options Vinod Namboodiri Wichita State University Additional Team Members: Ward Jewell, Visvakumar Aravinthan Wichita State University PSERC Future Grid Initiative Webinar

More information

Similar Polygons Date: Per:

Similar Polygons Date: Per: Math 2 Unit 6 Worksheet 1 Name: Similar Polygons Date: Per: [1-2] List the pairs of congruent angles and the extended proportion that relates the corresponding sides for the similar polygons. 1. AA BB

More information

Stacks & Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST

Stacks & Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST Stacks & Queues Kuan-Yu Chen ( 陳冠宇 ) 2018/10/01 @ TR-212, NTUST Review Stack Stack Permutation Expression Infix Prefix Postfix 2 Stacks. A stack is an ordered list in which insertions and deletions are

More information

Eureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework

Eureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework A Story of Ratios Eureka Math Grade 7, Module 6 Student File_A Contains copy-ready classwork and homework Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may be

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Visit MathNation.com or search "Math Nation" in your phone or tablet's app store to watch the videos that go along with this workbook!

Visit MathNation.com or search Math Nation in your phone or tablet's app store to watch the videos that go along with this workbook! Topic 1: Introduction to Angles - Part 1... 47 Topic 2: Introduction to Angles Part 2... 50 Topic 3: Angle Pairs Part 1... 53 Topic 4: Angle Pairs Part 2... 56 Topic 5: Special Types of Angle Pairs Formed

More information

6.2 OPTIONAL SECURITY SERVICES

6.2 OPTIONAL SECURITY SERVICES 6.2 OPTIONAL SECURITY SERVICES This section presents Qwest s proposed optional services for the Networx program. In our selection of optional services we applied two criteria: Does the Qwest Team have

More information

FINAL EXAM REVIEW CH Determine the most precise name for each quadrilateral.

FINAL EXAM REVIEW CH Determine the most precise name for each quadrilateral. FINAL EXAM REVIEW CH 6 1. Determine the most precise name for each quadrilateral. 2. Find the measures of the numbered angle for the following parallelogram a. A(-5,7), B(2,6), C(-4,0), D(5,-3) 1 3 2 35

More information

Multi-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer

Multi-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer Multi-view object segmentation in space and time Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer Outline Addressed problem Method Results and Conclusion Outline Addressed problem Method Results

More information

Section 6: Triangles Part 1

Section 6: Triangles Part 1 Section 6: Triangles Part 1 Topic 1: Introduction to Triangles Part 1... 125 Topic 2: Introduction to Triangles Part 2... 127 Topic 3: rea and Perimeter in the Coordinate Plane Part 1... 130 Topic 4: rea

More information

Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST

Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST Queues Kuan-Yu Chen ( 陳冠宇 ) 2018/10/03 @ TR-212, NTUST Review Stack FILO Algorithms to covert Infix to Postfix Infix to Prefix Queue FIFO 2 Homeork1: Expression Convertor. Given a infix expression, please

More information

Copy Material. Geometry Unit 1. Congruence, Proof, and Constructions. Eureka Math. Eureka Math

Copy Material. Geometry Unit 1. Congruence, Proof, and Constructions. Eureka Math. Eureka Math Copy Material Geometry Unit 1 Congruence, Proof, and Constructions Eureka Math Eureka Math Lesson 1 Lesson 1: Construct an Equilateral Triangle We saw two different scenarios where we used the construction

More information

Lesson 21: Surface Area

Lesson 21: Surface Area Student Outcomes Students find the surface area of three-dimensional objects whose surface area is composed of triangles and quadrilaterals. They use polyhedron nets to understand that surface area is

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu Web advertising We discussed how to match advertisers to queries in real-time But we did not discuss how to estimate

More information

Math 96--Radicals #1-- Simplify; Combine--page 1

Math 96--Radicals #1-- Simplify; Combine--page 1 Simplify; Combine--page 1 Part A Number Systems a. Whole Numbers = {0, 1, 2, 3,...} b. Integers = whole numbers and their opposites = {..., 3, 2, 1, 0, 1, 2, 3,...} c. Rational Numbers = quotient of integers

More information

T.4 Applications of Right Angle Trigonometry

T.4 Applications of Right Angle Trigonometry 22 T.4 Applications of Right Angle Trigonometry Solving Right Triangles Geometry of right triangles has many applications in the real world. It is often used by carpenters, surveyors, engineers, navigators,

More information

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary Description Course Summary The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively plan, deploy and manage Microsoft Forefront Threat

More information

Solano Community College Academic Senate CURRICULUM COMMITTEE AGENDA Tuesday, May 1, :30 p.m., Room 503

Solano Community College Academic Senate CURRICULUM COMMITTEE AGENDA Tuesday, May 1, :30 p.m., Room 503 Tuesday, 1:30 p.m., Room 503 1. ROLL CALL Robin Arie-Donch, Debra Berrett, Curtiss Brown, Joe Conrad (Chair), Lynn Denham-Martin, Erin Duane, Erin Farmer, Marianne Flatland, Betsy Julian, Margherita Molnar,

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR

QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR Multitel (S.Iassinovski) Multitel Research Center Parc Initialis, rue Pierre et Marie Curie n 2 B-7000 Mons, Belgium iassinovski@multitel.be

More information

Lecture 3.3 Robust estimation with RANSAC. Thomas Opsahl

Lecture 3.3 Robust estimation with RANSAC. Thomas Opsahl Lecture 3.3 Robust estimation with RANSAC Thomas Opsahl Motivation If two perspective cameras captures an image of a planar scene, their images are related by a homography HH 2 Motivation If two perspective

More information

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows 1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

Eureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials

Eureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials A Story of Functions Eureka Math Geometry, Module 4 Student File_B Contains Exit Ticket, and Assessment Materials Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work

More information

Development of an Intelligent Fault Indicator for Smart Grids

Development of an Intelligent Fault Indicator for Smart Grids 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Development of an Intelligent Fault Indicator for Smart Grids Shang-Wen Luan

More information

Eureka Math. Grade 7, Module 6. Student File_B Contains Exit Tickets, and Assessment Materials

Eureka Math. Grade 7, Module 6. Student File_B Contains Exit Tickets, and Assessment Materials A Story of Units Eureka Math Grade 7, Module 6 Student File_B Contains s, and Assessment Materials Published by the non-profit Great Minds. Copyright 2015 Great Minds. All rights reserved. No part of this

More information

recruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit

recruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit Logo Typography Colourways Mechanism Usage Primary; Secondary; Silhouette; Favicon; Additional Notes; Where possible, use the logo with the striped mechanism behind. Only when it is required to be stripped

More information

Automation of Distribution Grid with FLISR using ZigBee Communication

Automation of Distribution Grid with FLISR using ZigBee Communication Automation of Distribution Grid with FLISR using ZigBee Communication 1 Ajinkya Shirdhankar, 2 Digambar Ahire, 3 B. S. Kunure, 4 Asmita Bote Department of Electrical Engineering, ZCOER, Pune, India Abstract

More information

November 25, Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1000 Bryan, Texas 77802

November 25, Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1000 Bryan, Texas 77802 November 25, 213 Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1 Bryan, Texas 7782 Re: Greenbrier Phase 9 Oversize Participation Request Dear Paul: On behalf of the owner, Carter-Arden

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

April Oracle Spatial User Conference

April Oracle Spatial User Conference April 29, 2010 Hyatt Regency Phoenix Phoenix, Arizona USA Parag Parikh Dan Kuklov CURRENT Group Kerry D. McBee Xcel Energy Unified Real-Time Network Topology Management Using Xcel Energy SmartGridCity

More information

BRAND BOOK. Copyright 2016 WashU Student Union Student Union Brand Guidebook 1

BRAND BOOK. Copyright 2016 WashU Student Union Student Union Brand Guidebook 1 BRAND BOOK 2019 2016 Copyright 2016 WashU Student Union Student Union Brand Guidebook 1 WHY THIS MATTERS While it is easy for the student body to see the hundreds of group events that take place every

More information

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application

More information

Performance Analysis of the Different Null Steering Techniques in the Field of Adaptive Beamforming

Performance Analysis of the Different Null Steering Techniques in the Field of Adaptive Beamforming Research Journal of Applied Sciences, Engineering and Technology 5(15): 4612, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: November 27,212 Accepted: January 14, 213

More information

Why Security Fails in Federated Systems

Why Security Fails in Federated Systems Why Security Fails in Federated Systems Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University of Southern California CSSE Research Review University

More information

Introduction to Deep Learning

Introduction to Deep Learning ENEE698A : Machine Learning Seminar Introduction to Deep Learning Raviteja Vemulapalli Image credit: [LeCun 1998] Resources Unsupervised feature learning and deep learning (UFLDL) tutorial (http://ufldl.stanford.edu/wiki/index.php/ufldl_tutorial)

More information

Section 1: Introduction to Geometry Points, Lines, and Planes

Section 1: Introduction to Geometry Points, Lines, and Planes Section 1: Introduction to Geometry Points, Lines, and Planes Topic 1: Basics of Geometry - Part 1... 3 Topic 2: Basics of Geometry Part 2... 5 Topic 3: Midpoint and Distance in the Coordinate Plane Part

More information

Wisconsin Retirement Testing Preparation

Wisconsin Retirement Testing Preparation Wisconsin Retirement Testing Preparation The Wisconsin Retirement System (WRS) is changing its reporting requirements from annual to every pay period starting January 1, 2018. With that, there are many

More information

Syntax Analysis Top Down Parsing

Syntax Analysis Top Down Parsing Syntax Analysis Top Down Parsing CMPSC 470 Lecture 05 Topics: Overview Recursive-descent parser First and Follow A. Overview Top-down parsing constructs parse tree for input string from root and creating

More information

OPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS

OPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS Optimal Design of A Stepper-Driven Planar Linkage Using Entropy Methods OPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS J. C. Musto 1* 1 Mechanical Engineering Department, Milwaukee

More information

COMPUTER GRAPHICS COURSE. LuxRender. Light Transport Foundations

COMPUTER GRAPHICS COURSE. LuxRender. Light Transport Foundations COMPUTER GRAPHICS COURSE LuxRender Light Transport Foundations Georgios Papaioannou - 2015 Light Transport Light is emitted at the light sources and scattered around a 3D environment in a practically infinite

More information

Eureka Math. Geometry, Module 5. Student File_A. Contains copy-ready classwork and homework

Eureka Math. Geometry, Module 5. Student File_A. Contains copy-ready classwork and homework A Story of Functions Eureka Math Geometry, Module 5 Student File_A Contains copy-ready classwork and homework Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may

More information

The TiGL Geometry Library and its Current Mathematical Challenges

The TiGL Geometry Library and its Current Mathematical Challenges The TiGL Geometry Library and its Current Mathematical Challenges Workshop DLR / Cologne University 06.10.2017 Dr. Martin Siggel Merlin Pelz Konstantin Rusch Dr. Jan Kleinert Simulation and Software Technology

More information

Transform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using Harmonic Mean

Transform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using Harmonic Mean Applied Mathematics 2016, 6(5): 95-99 DOI: 10.5923/j.am.20160605.01 Transform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using

More information

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline

More information

For more information, visit: 3M Cold Shrink QS-III Splice a one-piece joint with wide range and geometric stress control

For more information, visit:  3M Cold Shrink QS-III Splice a one-piece joint with wide range and geometric stress control for Medium Voltage Grid Automation Visibility inreal Time An effective solution for monitoring your underground distribution system 3M is a global technology company, manufacturing over 50,000 products

More information

CONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE

CONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE BRANDING GUIDE CONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE 2018 DYNICS, Inc. All Rights Reserved No part of this

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Cybersecurity Test and Evaluation Facilities at Texas A&M

Cybersecurity Test and Evaluation Facilities at Texas A&M Cybersecurity Test and Evaluation Facilities at Texas A&M Dr. Karen L. Butler-Purry, Bo Chen Department of Electrical and Computer Engineering Nishant Pattanaik Department of Computer Science Dr. Ana Goulart

More information

Growing Our Own Through Collaboration

Growing Our Own Through Collaboration NWI INITIATIVE NUCLEAR WORKFORCE Growing Our Own Through Collaboration BRAND STANDARDS reference guide Brand Standards 2011 SRS Community Reuse Organization. All rights reserved. Version 1.0-02.10.2011

More information

The ABC s of Web Site Evaluation

The ABC s of Web Site Evaluation Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz The ABC s of Web Site Evaluation by Kathy Schrock Digital Literacy by Paul Gilster Digital literacy is the ability to understand

More information

Cryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security

Cryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security Cryptography CS 555 Topic 8: Modes of Encryption, The Penguin and CCA security 1 Reminder: Homework 1 Due on Friday at the beginning of class Please typeset your solutions 2 Recap Pseudorandom Functions

More information

"Charting the Course... VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot. Course Summary

Charting the Course... VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot. Course Summary Course Summary Description This powerful 5-day class provides an in-depth look at vsphere 6.5. In this course, cover how to deploy vsphere 6.5, how to optimize it including VMs, ESXi hosts, vcenter Server

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS Volume 2, Issue 7, PP:, SEPTEMBER 2014. PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS TALLURI BEENA JOSEPHINE 1*, K.RAVICHAND 2* 1. II.M.Tech, Dept of CSE, AM

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 15: Networking overview Prof. (amislove@ccs.neu.edu) What is a network? 2 What is a network? Wikipedia: A telecommunications network is a network

More information

BRAND STANDARD GUIDELINES 2014

BRAND STANDARD GUIDELINES 2014 BRAND STANDARD GUIDELINES 2014 LOGO USAGE & TYPEFACES Logo Usage The Lackawanna College School of Petroleum & Natural Gas logo utilizes typography, two simple rule lines and the Lackawanna College graphic

More information

Bitty Rover. Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard)

Bitty Rover. Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard) Bitty Rover Bitty Rover V2.3 Assembly Instructions Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard) www.rabbitrobots.com

More information

Dan Murray, Siemens Energy Management Division

Dan Murray, Siemens Energy Management Division Design and Implementation of a Communication Network to Support Real-time Distribution Feeder Automation, SCADA Integration and Backhaul of Substation and Metering Data Dan Murray, Siemens Energy Management

More information

Reminder: Homework 4. Due: Friday at the beginning of class

Reminder: Homework 4. Due: Friday at the beginning of class Reminder: Homework 4 Due: Friday at the beginning of class 1 Cryptography CS 555 Topic 33: Digital Signatures Part 2 2 Recap El-Gamal/RSA-OAEP Digital Signatures Similarities and differences with MACs

More information

"Charting the Course... CA-View Administration. Course Summary

Charting the Course... CA-View Administration. Course Summary Course Summary Description This course is designed to teach all administrator functions of CA View from the system initialization parameters to integration with CA Deliver. Students will learn implementation

More information

Model NM512. TS1 Conflict Monitor Standard 12 Channel Unit. Naztec Operations Manual. For. Published by

Model NM512. TS1 Conflict Monitor Standard 12 Channel Unit. Naztec Operations Manual. For. Published by Naztec Operations Manual For Model NM512 TS1 Conflict Monitor Standard 12 Channel Unit Published by Naztec, Inc. 820 Park Two Dr. Sugar Land, Texas 77478 Phone: (281) 2407233 Fax: (281) 240-7238 Copyright

More information

T.5 The Law of Sines and Cosines and Its Applications

T.5 The Law of Sines and Cosines and Its Applications 1 T.5 The Law of Sines and Cosines and Its Applications The concepts of solving triangles developed in section T4 can be extended to all triangles. A triangle that is not right-angled is called an oblique

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015) FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS C.Ahila Jerlin #1 Anand Institute of Higher Technology, Department of ME Embedded System Technologies, Kazhipattur, Chennai-603103 N.Rajkamal #2 Anand Institute

More information

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM A. Valenti* I Bel ** S. Lee *EDF **EPRI E2I ConEdison France USA USA arnaud.valenti@edf.fr

More information

"Dynamic Distribution System, a new Architecture for the Integrated Grid"

Dynamic Distribution System, a new Architecture for the Integrated Grid 1 "Dynamic Distribution System, a new Architecture for the Integrated Grid" Bruce Beihoff Tom Jahns Bob Lasseter University of Wisconsin Madison IEEE PES 2015 - Panel July 29,2015 2 Panel Presentation

More information

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits. Industrial Control 6 50 to 5,000 VA Applications n For commercial and industrial control applications including; control panels, conveyor systems, machine tool equipment, pump systems, and commercial air

More information

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits. Industrial Control 6 50 to 5,000 VA Applications n For commercial and industrial control applications including; control panels, conveyor systems, machine tool equipment, pump systems, and commercial air

More information

Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference

Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference Chengyu Xiong and Xiaohua Li Department of Electrical and Computer Engineering State University of New York at Binghamton

More information

International Journal of Industrial Engineering Computations

International Journal of Industrial Engineering Computations International Journal of Industrial Engineering Computations 7 (2016) 295 308 Contents lists available at GrowingScience International Journal of Industrial Engineering Computations homepage: www.growingscience.com/ijiec

More information

Cyber Security of Power Grids

Cyber Security of Power Grids Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University

More information

Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850

Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850 Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 6185 Narottam Das, Senior Member, IEEE, Tze Jia Wong, and Syed Islam, Senior

More information

Connection Guide (RS-232C)

Connection Guide (RS-232C) Machine Automation Controller NJ-series General-purpose Seriarl Connection Guide (RS-232C) OMRON Corporation G9SP Safety Controller P545-E1-01 About Intellectual Property Rights and Trademarks Microsoft

More information

Lesson 1: Construct an Equilateral Triangle

Lesson 1: Construct an Equilateral Triangle Lesson 1 Lesson 1: Construct an Equilateral Triangle Classwork Opening Exercise Joe and Marty are in the park playing catch Tony joins them, and the boys want to stand so that the distance between any

More information

TRIGONOMETRY. T.1 Angles and Degree Measure

TRIGONOMETRY. T.1 Angles and Degree Measure 1 TRIGONOMETRY Trigonometry is the branch of mathematics that studies the relations between the sides and angles of triangles. The word trigonometry comes from the Greek trigōnon (triangle) and metron

More information

Digital Transformation of Power Delivery

Digital Transformation of Power Delivery Digital Transformation of Power Delivery Keynote Speech Professor Saifur Rahman, PhD Virginia Tech, USA IEEMA Engineer Infinite Conference, Delhi NCR, India, 14 March 2018 Traditional Electricity Delivery

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances

Enabling Smart Energy as a Service via 5G Mobile Network advances NR 5 Enabling Smart Energy as a Service via 5G Mobile Network advances 5G-PPP Phase 2 at EuCNC Oulu Fiorentino Giampaolo giampaolo.fiorentino@eng.it SCOPE MOTIVATION NR 5 Insights behind... The state of

More information

T&D Technology Research Stem

T&D Technology Research Stem T&D Technology Research Stem Highlights of T&D Stem Activity (2000-2005) Mladen Kezunovic Former Stem Leader IAB Meeting Madison, June 1, 2006 1 Outline History Research Areas Projects Survey Initiatives

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

Chapter 8: Smart Grid Communication and Networking

Chapter 8: Smart Grid Communication and Networking Chapter 8: Smart Grid Communication and Networking Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 1. The framework of smart grid 2. Network

More information

Automated Threat Management - in Real Time. Vectra Networks

Automated Threat Management - in Real Time. Vectra Networks Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$

More information

Communications in the Utility Industry Trends and Examples

Communications in the Utility Industry Trends and Examples Communications in the Utility Industry Trends and Examples Matt Wakefield Director, Information, Communication & Cyber Security NARUC Winter Meeting: Spectrum, Spectrum Everywhere, Who Needs it and Why?

More information

Graphs and Linear Functions

Graphs and Linear Functions Graphs and Linear Functions A -dimensional graph is a visual representation of a relationship between two variables given by an equation or an inequality. Graphs help us solve algebraic problems by analysing

More information

Have students complete the summary table, and then share as a class to make sure students understand concepts.

Have students complete the summary table, and then share as a class to make sure students understand concepts. Closing (5 minutes) Have students complete the summary table, and then share as a class to make sure students understand concepts. Lesson Summary: We have just developed proofs for an entire family of

More information

Technical Spotlight DEMO6-S6

Technical Spotlight DEMO6-S6 Technical Spotlight DEMO6-S6 Spotlight on BPL communication implemented in DEMO6 This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Cyber Physical System Security

Cyber Physical System Security S2ERC Industry Outreach Workshop Cyber Physical System Security Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa State University gmani@iastate.edu Outline Background CPS Security

More information

How to Register for Summer Camp. A Tutorial

How to Register for Summer Camp. A Tutorial How to Register for Summer Camp A Tutorial 1. Upon arriving at our website (https://flightcamp.ou.edu/), the very first step is logging in. Please click the Login link in the top left corner of the page

More information

Aerodynamic optimization of low pressure axial fans with OpenFOAM

Aerodynamic optimization of low pressure axial fans with OpenFOAM Aerodynamic optimization of low pressure axial fans with OpenFOAM 1, Max Hasenzahl 1, Prof. Dr.-Ing. Jens Friedrichs 2 1 Volkswagen AG (Cooling Development) 2 Institute of Jet Propulsion and Turbomachinery,

More information

Texture Mapping. Michael Kazhdan ( /467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, , 16.6

Texture Mapping. Michael Kazhdan ( /467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, , 16.6 Texture Mapping Michael Kazhdan (61.457/467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, 16.4.5, 16.6 Textures We know how to go from this to this J. Birn Textures But what about this to this? J. Birn Textures How

More information

Teacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets

Teacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets Teacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets February 2018 On-line Teacher Application Process Teachers interested in applying for any advertised vacancies in

More information

Virtualization And Self-organization For Utility Computing

Virtualization And Self-organization For Utility Computing University of Central Florida Electronic Theses and Dissertations Masters Thesis (Open Access) Virtualization And Self-organization For Utility Computing 2011 Mehdi Saleh University of Central Florida

More information

Secure Mission-Centric Operations in Cloud Computing

Secure Mission-Centric Operations in Cloud Computing Secure Mission-Centric Operations in Cloud Computing Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri George Mason University, USA Università degli Studi di Milano, Italy ARO Workshop

More information

Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language)

Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Ana Rugina, Karama Kanoun and Mohamed Kaâniche {rugina, kanoun, kaaniche}@laas.fr European Integrated Project

More information

Probabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid

Probabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid Probabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid Syed Atif Naseem Izmir University of Economics, Izmir, Turkey. syedatifnaseem@gmail.com

More information