WorldWideScience

Sample records for mobile nodes outage

  1. Outage Probability Analysis in Power-Beacon Assisted Energy Harvesting Cognitive Relay Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ngoc Phuc Le

    2017-01-01

    Full Text Available We study the performance of the secondary relay system in a power-beacon (PB assisted energy harvesting cognitive relay wireless network. In our system model, a secondary source node and a relay node first harvest energy from distributed PBs. Then, the source node transmits its data to the destination node with the help of the relay node. Also, fading coefficients of the links from the PBs to the source node and relay node are assumed independent but not necessarily identically distributed (i.n.i.d Nakagami-m random variables. We derive exact expressions for the power outage probability and the channel outage probability. Based on that, we analyze the total outage probability of the secondary relay system. Asymptotic analysis is also performed, which provides insights into the system behavior. Moreover, we evaluate impacts of the primary network on the performance of the secondary network with respect to the tolerant interference threshold at the primary receiver as well as the interference introduced by the primary transmitter at the secondary source and relay nodes. Simulation results are provided to validate the analysis.

  2. Cell outage compensation in LTE networks: Algorithms and performance assessment

    NARCIS (Netherlands)

    Amirijoo, M.; Jorguseski, L.; Litjens, R.; Schmelz, L.C.

    2011-01-01

    Cell outage compensation is a self-healing function and as such part of the Self-Organising Networks concept for mobile wireless networks. It aims at mitigating the degradation of coverage, capacity and service quality caused by a cell or site level outage. Upon detection of such an outage, cell

  3. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

    Directory of Open Access Journals (Sweden)

    Mauro Conti

    2009-01-01

    Full Text Available The nature of mobile ad hoc networks (MANETs, often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture a node from the network eventually acquiring all the cryptographic material stored in it. Further, the captured node can be reprogrammed by the adversary and redeployed in the network in order to perform malicious activities. In this paper, we address the node capture attack in MANETs. We start from the intuition that mobility, in conjunction with a reduced amount of local cooperation, helps computing effectively and with a limited resource usage network global security properties. Then, we develop this intuition and use it to design a mechanism to detect the node capture attack. We support our proposal with a wide set of experiments showing that mobile networks can leverage mobility to compute global security properties, like node capture detection, with a small overhead.

  4. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  5. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  6. Coverage Improvement for Wireless Sensor Networks using Grid Quorum based Node Mobility

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Coverage of wireless sensor networks (WSNs) is an important quality of service (QoS) metric and often the desired coverage is not attainable at the initial deployment, but node mobility can be used to improve the coverage by relocating sensor nodes. Unconstrained node mobility is considered infea...

  7. Development of Methodologies for Technology Deployment for Advanced Outage Control Centers that Improve Outage Coordination, Problem Resolution and Outage Risk Management

    Energy Technology Data Exchange (ETDEWEB)

    Shawn St. Germain; Ronald Farris; Heather Medeman

    2013-09-01

    schedule depends upon the performance of the outage management organization. During an outage, the outage control center (OCC) is the temporary command center for outage managers and provides several critical functions for the successful execution of the outage schedule. Essentially, the OCC functions to facilitate information inflow, assist outage management in processing information and to facilitate the dissemination of information to stakeholders. Currently, outage management activities primarily rely on telephone communication, face to face reports of status and periodic briefings in the OCC. Much of the information displayed in OCCs is static and out of date requiring an evaluation to determine if it is still valid. Several advanced communication and collaboration technologies have shown promise for facilitating the information flow into, across and out of the OCC. Additionally, advances in the areas of mobile worker technologies, computer based procedures and electronic work packages can be leveraged to improve the availability of real time status to outage managers.

  8. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  9. Coverage improvement in clustered wireless sensor networks by relocating mobile nodes based on waypoints

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2013-01-01

    by clusters with relocation of mobile nodes between the clusters. Mobile nodes are guided by waypoints between source and destination clusters without use of localization services. The simulation results have been presented which state the effectiveness of the proposed approach. Mobile node relocation has...

  10. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.

    Science.gov (United States)

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-04-19

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.

  11. Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    Mobile nodes have been found useful for improving performance of network parameters such as coverage, data latency and load balancing in wireless sensor networks (WSNs). In spite of the benets which mobile nodes could oer when used in WSNs, they have been often stated as infeasible for use...

  12. Maximizing Lifetime of Wireless Sensor Networks with Mobile Sink Nodes

    Directory of Open Access Journals (Sweden)

    Yourong Chen

    2014-01-01

    Full Text Available In order to maximize network lifetime and balance energy consumption when sink nodes can move, maximizing lifetime of wireless sensor networks with mobile sink nodes (MLMS is researched. The movement path selection method of sink nodes is proposed. Modified subtractive clustering method, k-means method, and nearest neighbor interpolation method are used to obtain the movement paths. The lifetime optimization model is established under flow constraint, energy consumption constraint, link transmission constraint, and other constraints. The model is solved from the perspective of static and mobile data gathering of sink nodes. Subgradient method is used to solve the lifetime optimization model when one sink node stays at one anchor location. Geometric method is used to evaluate the amount of gathering data when sink nodes are moving. Finally, all sensor nodes transmit data according to the optimal data transmission scheme. Sink nodes gather the data along the shortest movement paths. Simulation results show that MLMS can prolong network lifetime, balance node energy consumption, and reduce data gathering latency under appropriate parameters. Under certain conditions, it outperforms Ratio_w, TPGF, RCC, and GRND.

  13. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  14. Technology Integration Initiative In Support of Outage Management

    Energy Technology Data Exchange (ETDEWEB)

    Gregory Weatherby; David Gertman

    2012-07-01

    Plant outage management is a high priority concern for the nuclear industry from cost and safety perspectives. Often, command and control during outages is maintained in the outage control center where many of the underlying technologies supporting outage control are the same as those used in the 1980’s. This research reports on the use of advanced integrating software technologies and hand held mobile devices as a means by which to reduce cycle time, improve accuracy, and enhance transparency among outage team members. This paper reports on the first phase of research supported by the DOE Light Water Reactor Sustainability (LWRS) Program that is performed in close collaboration with industry to examine the introduction of newly available technology allowing for safe and efficient outage performance. It is thought that this research will result in: improved resource management among various plant stakeholder groups, reduced paper work, and enhanced overall situation awareness for the outage control center management team. A description of field data collection methods, including personnel interview data, success factors, end-user evaluation and integration of hand held devices in achieving an integrated design are also evaluated. Finally, the necessity of obtaining operations cooperation support in field studies and technology evaluation is acknowledged.

  15. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  16. LIDAR AND INS FUSION IN PERIODS OF GPS OUTAGES FOR MOBILE LASER SCANNING MAPPING SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. Klein

    2012-09-01

    Full Text Available Mobile laser scanning systems are becoming an increasingly popular means to obtain 3D coverage on a large scale. To perform the mapping, the exact position of the vehicle must be known throughout the trajectory. Exact position is achieved via integration of Global Positioning Systems (GPS and Inertial Navigation Systems (INS. Yet, in urban environments, cases of complete or even partial GPS outages may occur leaving the navigation solution to rely only on the INS. The INS navigation solution degrades with time as the Inertial Measurement Unit (IMU measurements contains noise, which permeates into the navigation equations. Degradation of the position determination leads to loss of data in such segments. To circumvent such drift and its effects, we propose fusing INS with lidar data by using building edges. This detection of edges is then translated into position data, which is used as an aiding to the INS. It thereby enables the determination of the vehicle position with a satisfactory level accuracy, sufficient to perform the laser-scanning based mapping in those outage periods.

  17. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  18. Outage preparation milestones - A tool to improve planned outage performance

    International Nuclear Information System (INIS)

    Laplatney, Jere; Hwang, Euiyoub

    2006-01-01

    Sustainable development of Nuclear Energy depends heavily on excellent performance of the existing fleet which in turn depend heavily on the performance of planned outages. Nuclear Power Plants who have successfully undertaken outage optimization projects have demonstrated than an effective Outage Preparation Milestone program is a key component of their improvement programs. This paper will provide background into the field of 'Outage Optimization' including the philosophy, general approach, and results obtained in the U. S. industry. The significant safety improvements afforded by properly implementing outage improvement programs will be explained. Some specific examples of outage improvements will be given including the adoption of a strong Outage Preparation Milestone Program. The paper will then describe the attributes of an effective Outage Preparation Milestone Program and list a set of specific key milestones. The key milestones are defined and the reasons for each are explained. Suggested due dates for each key milestone relative to the outage start date are provided. Successful implementation of an Outage Preparation Milestone program depends heavily upon the management tools and methods used to assure that the organization meets the milestones on time and in a quality fashion. These include methods to handle cases where milestones are not met - either partially or fully. KHNP is investigating implementing an improved Outage Preparation Milestone program for its fleet of reactors as part of its overall program to improve its performance of planned outages

  19. Development of Improved Graphical Displays for an Advanced Outage Control Center, Employing Human Factors Principles for Outage Schedule Management

    Energy Technology Data Exchange (ETDEWEB)

    St Germain, Shawn Walter [Idaho National Lab. (INL), Idaho Falls, ID (United States); Farris, Ronald Keith [Idaho National Lab. (INL), Idaho Falls, ID (United States); Thomas, Kenneth David [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    ; Provide real-time requirements monitoring; Maximize their collective situational awareness to improve decision-making; and Leverage macro data to better support resource allocation. INL has partnered with several commercial NPP utilities to develop a number of advanced outage management technologies. These outage management technologies have focused on both collaborative technologies for control centers and developing mobile technologies for NPP field workers. This report describes recent efforts made in developing a suite of outage technologies to support more effective schedule management. Currently, a master outage schedule is created months in advance using the plant’s existing scheduling software (e.g., Primavera P6). Typically, during the outage, the latest version of the schedule is printed at the beginning of each shift. INL and its partners are developing technologies that will have capabilities such as Automatic Schedule Updating, Automatic Pending Support Notifications, and the ability to allocate and schedule outage support task resources on a sub-hour basis (e.g., outage Micro-Scheduling). The remaining sections of this report describe in more detail the scheduling challenges that occur during outages, how the outage scheduling technologies INL is developing helps address those challenges, and the latest developments on this task (e.g., work accomplished to date and the path forward)

  20. Development of Improved Graphical Displays for an Advanced Outage Control Center, Employing Human Factors Principles for Outage Schedule Management

    International Nuclear Information System (INIS)

    St Germain, Shawn Walter; Farris, Ronald Keith; Thomas, Kenneth David

    2015-01-01

    ; Provide real-time requirements monitoring; Maximize their collective situational awareness to improve decision-making; and Leverage macro data to better support resource allocation. INL has partnered with several commercial NPP utilities to develop a number of advanced outage management technologies. These outage management technologies have focused on both collaborative technologies for control centers and developing mobile technologies for NPP field workers. This report describes recent efforts made in developing a suite of outage technologies to support more effective schedule management. Currently, a master outage schedule is created months in advance using the plant's existing scheduling software (e.g., Primavera P6). Typically, during the outage, the latest version of the schedule is printed at the beginning of each shift. INL and its partners are developing technologies that will have capabilities such as Automatic Schedule Updating, Automatic Pending Support Notifications, and the ability to allocate and schedule outage support task resources on a sub-hour basis (e.g., outage Micro-Scheduling). The remaining sections of this report describe in more detail the scheduling challenges that occur during outages, how the outage scheduling technologies INL is developing helps address those challenges, and the latest developments on this task (e.g., work accomplished to date and the path forward)

  1. An efficient schedule based data aggregation using node mobility for wireless sensor network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Pawar, Pranav M.; Prasad, Neeli R.

    2014-01-01

    In the Wireless Sensor Networks, (WSNs) a key challenge is to schedule the activities of the mobile node for improvement in throughput, energy consumption and delay. This paper proposes efficient schedule based data aggregation algorithm using node mobility (SDNM). It considers the cluster...

  2. Power Outages

    Science.gov (United States)

    ... Publications Emergency Alerts Preparedness Portal Preparedness Messaging Calendar Social Media Preparedness Toolkits Preparedness News Languages About Us Build a Kit Close Search Enter Search Term(s): Main Content Home Be Informed Power Outages Power Outages Extended power outages may impact ...

  3. Outage Analysis of Mixed Underlay Cognitive RF MIMO and FSO Relaying with Interference Reduction

    KAUST Repository

    Al-Qahtani, Fawaz S.; El-Malek, Ahmed H. Abd; Ansari, Imran S.; Radaydeh, Redha Mahmoud Mesleh; Zummo, Salam A.

    2017-01-01

    In this paper, we study the outage performance of multiuser mixed underlay radio frequency (RF)/multidestinations free-space optical (FSO) links. For RF links, we consider a secondary network with multiple users that can communicate with multiple destinations through a relaying node. The relay is equipped with an antenna array at the RF side, and it uses the amplify-and-forward (AF) protocol. The primary users (PUs) are equipped with multiple antennas at transmit and receive nodes. The RF link is subjected to the aggregate PUs interference effect on the secondary network. To reduce the effect of PUs interference on secondary network at the relay node, two interference cancellation (IC) schemes are adopted, which vary in terms of complexity and achieved performance. On the other hand, the multidestination FSO links can be exploited to further enhance the quality of the second hop, and their associated channel models account for pointing errors, intensity modulation/direct detection, and heterodyne detection. For the aforementioned system model, we obtain exact and asymptotic closed-form expressions for the end-to-end outage probability. To further enhance system performance, optimal power allocation between the two hops is obtained based on the derived asymptotic outage probability expressions.

  4. Outage Analysis of Mixed Underlay Cognitive RF MIMO and FSO Relaying with Interference Reduction

    KAUST Repository

    Al-Qahtani, Fawaz S.

    2017-03-22

    In this paper, we study the outage performance of multiuser mixed underlay radio frequency (RF)/multidestinations free-space optical (FSO) links. For RF links, we consider a secondary network with multiple users that can communicate with multiple destinations through a relaying node. The relay is equipped with an antenna array at the RF side, and it uses the amplify-and-forward (AF) protocol. The primary users (PUs) are equipped with multiple antennas at transmit and receive nodes. The RF link is subjected to the aggregate PUs interference effect on the secondary network. To reduce the effect of PUs interference on secondary network at the relay node, two interference cancellation (IC) schemes are adopted, which vary in terms of complexity and achieved performance. On the other hand, the multidestination FSO links can be exploited to further enhance the quality of the second hop, and their associated channel models account for pointing errors, intensity modulation/direct detection, and heterodyne detection. For the aforementioned system model, we obtain exact and asymptotic closed-form expressions for the end-to-end outage probability. To further enhance system performance, optimal power allocation between the two hops is obtained based on the derived asymptotic outage probability expressions.

  5. Driving for shorter outages

    International Nuclear Information System (INIS)

    Tritch, S.

    1996-01-01

    Nuclear plant outages are necessary to complete activities that cannot be completed during the operating cycle, such as steam generator inspection and testing, refueling, installing modifications, and performing maintenance tests. The time devoted to performing outages is normally the largest contributor to plant unavailability. Similarly, outage costs are a sizable portion of the total plant budget. The scope and quality of work done during outages directly affects operating reliability and the number of unplanned outages. Improved management and planning of outages enhances the margin of safety during the outage and results in increased plant reliability. The detailed planning and in-depth preparation that has become a necessity for driving shorter outage durations has also produced safer outages and improved post-outage reliability. Short outages require both plant and vendor management to focus on all aspects of the outage. Short outage durations, such as 26 days at South Texas or 29 days at North Anna, require power plant inter-department and intra-department teamwork and communication and vendor participation. In this paper shorter and safer outage at the 3-loop plants in the United States are explained. (J.P.N.)

  6. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    Science.gov (United States)

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  7. Energy Efficient Sensor Scheduling with a Mobile Sink Node for the Target Tracking Application

    Directory of Open Access Journals (Sweden)

    Malin Premaratne

    2009-01-01

    Full Text Available Measurement losses adversely affect the performance of target tracking. The sensor network’s life span depends on how efficiently the sensor nodes consume energy. In this paper, we focus on minimizing the total energy consumed by the sensor nodes whilst avoiding measurement losses. Since transmitting data over a long distance consumes a significant amount of energy, a mobile sink node collects the measurements and transmits them to the base station. We assume that the default transmission range of the activated sensor node is limited and it can be increased to maximum range only if the mobile sink node is out-side the default transmission range. Moreover, the active sensor node can be changed after a certain time period. The problem is to select an optimal sensor sequence which minimizes the total energy consumed by the sensor nodes. In this paper, we consider two different problems depend on the mobile sink node’s path. First, we assume that the mobile sink node’s position is known for the entire time horizon and use the dynamic programming technique to solve the problem. Second, the position of the sink node is varied over time according to a known Markov chain, and the problem is solved by stochastic dynamic programming. We also present sub-optimal methods to solve our problem. A numerical example is presented in order to discuss the proposed methods’ performance.

  8. ASH : Tackling node mobility in large-scale networks

    NARCIS (Netherlands)

    Pruteanu, A.; Dulman, S.

    2012-01-01

    With the increased adoption of technologies likewireless sensor networks by real-world applications, dynamic network topologies are becoming the rule rather than the exception. Node mobility, however, introduces a range of problems (communication interference, path uncertainty, low quality of

  9. 35/30 outage improvement project

    International Nuclear Information System (INIS)

    Clewett, L.

    2011-01-01

    Outage performance is a significant contributor to the business plan at Bruce Power. A process improvement initiative commenced in 2010-11 to improve outage efficiency and predictability. 12 teams (over 200 people) participated in improvement identification in four areas: Organizational Engagement; Outage Scope; Resources; and, Critical Outage Execution. Out of over 550 initiatives identified, 200 are being incorporated into the Outage Improvement Initiative. Key deliverables include: Development of a long-range 'fleet-level' business strategy to integrate outage duration, outage improvements and unit refurbishments; Development of a 35 day outage schedule template; Determining optimal outage organization to perform outages on an 8-unit site; Improved schedule adherence and productivity; Process to integrate scope needs to support life-cycle and long-range outage needs improvement while meeting near term and regulatory requirements; Consistent methodology in planning of outages to front-end load the high risk work into the outage schedule; Consistent baseline by senior leaders for the expectations of milestone ownership and completion; Consistent framework for milestone compliance and preparation; Communication strategy to educate personnel on the importance of the outage program and nuclear safety, business goals, and budget; and, Suite of metrics based upon industry benchmarks. The Outage Improvement Initiative has a goal of 35 day outages every 30 months. This potentially represents considerable savings to the Bruce Power business plan, both direct revenue savings attributed to reduced outage duration, as well as incremental outage cost savings. Other improvements from the initiative will include personnel radiation exposure and equipment reliability due to decreased outage duration and adherence to scoping, assessing and long lead part milestones. This presentation will describe the outage improvement initiatives to achieve a goal of consistent 35 day outages

  10. 35/30 outage improvement project

    Energy Technology Data Exchange (ETDEWEB)

    Clewett, L. [Bruce Power, Tiverton, Ontario (Canada)

    2011-07-01

    Outage performance is a significant contributor to the business plan at Bruce Power. A process improvement initiative commenced in 2010-11 to improve outage efficiency and predictability. 12 teams (over 200 people) participated in improvement identification in four areas: Organizational Engagement; Outage Scope; Resources; and, Critical Outage Execution. Out of over 550 initiatives identified, 200 are being incorporated into the Outage Improvement Initiative. Key deliverables include: Development of a long-range 'fleet-level' business strategy to integrate outage duration, outage improvements and unit refurbishments; Development of a 35 day outage schedule template; Determining optimal outage organization to perform outages on an 8-unit site; Improved schedule adherence and productivity; Process to integrate scope needs to support life-cycle and long-range outage needs improvement while meeting near term and regulatory requirements; Consistent methodology in planning of outages to front-end load the high risk work into the outage schedule; Consistent baseline by senior leaders for the expectations of milestone ownership and completion; Consistent framework for milestone compliance and preparation; Communication strategy to educate personnel on the importance of the outage program and nuclear safety, business goals, and budget; and, Suite of metrics based upon industry benchmarks. The Outage Improvement Initiative has a goal of 35 day outages every 30 months. This potentially represents considerable savings to the Bruce Power business plan, both direct revenue savings attributed to reduced outage duration, as well as incremental outage cost savings. Other improvements from the initiative will include personnel radiation exposure and equipment reliability due to decreased outage duration and adherence to scoping, assessing and long lead part milestones. This presentation will describe the outage improvement initiatives to achieve a goal of consistent 35 day

  11. AN AGENT BASED TRANSACTION PROCESSING SCHEME FOR DISCONNECTED MOBILE NODES

    Directory of Open Access Journals (Sweden)

    J.L. Walter Jeyakumar

    2010-12-01

    Full Text Available We present a mobile transaction framework in which mobile users can share data which is stored in the cache of a mobile agent. This mobile agent is a special mobile node which coordinates the sharing process. The proposed framework allows mobile affiliation work groups to be formed dynamically with a mobile agent and mobile hosts. Using short range wireless communication technology, mobile users can simultaneously access the data from the cache of the mobile agent. The data Access Manager module at the mobile agent enforces concurrency control using cache invalidation technique. This model supports disconnected mobile computing allowing mobile agent to move along with the Mobile Hosts. The proposed Transaction frame work has been simulated in Java 2 and performance of this scheme is compared with existing frame works.

  12. Adaptive multi-node multiple input and multiple output (MIMO) transmission for mobile wireless multimedia sensor networks.

    Science.gov (United States)

    Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo

    2013-10-02

    Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase.

  13. Increasing the Lifetime of Mobile WSNs via Dynamic Optimization of Sensor Node Communication Activity

    Directory of Open Access Journals (Sweden)

    Dayan Adionel Guimarães

    2016-09-01

    Full Text Available In this paper, a simple and flexible method for increasing the lifetime of fixed or mobile wireless sensor networks is proposed. Based on past residual energy information reported by the sensor nodes, the sink node or another central node dynamically optimizes the communication activity levels of the sensor nodes to save energy without sacrificing the data throughput. The activity levels are defined to represent portions of time or time-frequency slots in a frame, during which the sensor nodes are scheduled to communicate with the sink node to report sensory measurements. Besides node mobility, it is considered that sensors’ batteries may be recharged via a wireless power transmission or equivalent energy harvesting scheme, bringing to the optimization problem an even more dynamic character. We report large increased lifetimes over the non-optimized network and comparable or even larger lifetime improvements with respect to an idealized greedy algorithm that uses both the real-time channel state and the residual energy information.

  14. Increasing the Lifetime of Mobile WSNs via Dynamic Optimization of Sensor Node Communication Activity.

    Science.gov (United States)

    Guimarães, Dayan Adionel; Sakai, Lucas Jun; Alberti, Antonio Marcos; de Souza, Rausley Adriano Amaral

    2016-09-20

    In this paper, a simple and flexible method for increasing the lifetime of fixed or mobile wireless sensor networks is proposed. Based on past residual energy information reported by the sensor nodes, the sink node or another central node dynamically optimizes the communication activity levels of the sensor nodes to save energy without sacrificing the data throughput. The activity levels are defined to represent portions of time or time-frequency slots in a frame, during which the sensor nodes are scheduled to communicate with the sink node to report sensory measurements. Besides node mobility, it is considered that sensors' batteries may be recharged via a wireless power transmission or equivalent energy harvesting scheme, bringing to the optimization problem an even more dynamic character. We report large increased lifetimes over the non-optimized network and comparable or even larger lifetime improvements with respect to an idealized greedy algorithm that uses both the real-time channel state and the residual energy information.

  15. Increasing the coverage area through relay node deployment in long term evolution advanced cellular networks

    Science.gov (United States)

    Aldhaibani, Jaafar A.; Ahmad, R. B.; Yahya, A.; Azeez, Suzan A.

    2015-05-01

    Wireless multi-hop relay networks have become very important technologies in mobile communications. These networks ensure high throughput and coverage extension with a low cost. The poor capacity at cell edges is not enough to meet with growing demand of high capacity and throughput irrespective of user's placement in the cellular network. In this paper we propose optimal placement of relay node that provides maximum achievable rate at users and enhances the throughput and coverage at cell edge region. The proposed scheme is based on the outage probability at users and taken on account the interference between nodes. Numerical analyses along with simulation results indicated there are an improvement in capacity for users at the cell edge is 40% increment from all cell capacity.

  16. Outage Performance of Decode-and-Forward in Two-Way Relaying with Outdated CSI

    KAUST Repository

    Hyadi, Amal

    2015-01-07

    In this paper, we analyze the outage behavior of decode-and-forward relaying in the context of selective two-way cooperative systems. First, a new relay selection metric is proposed to take into consideration both transmission rates and instantaneous link conditions between cooperating nodes. Afterwards, the outage probability of the proposed system is derived for Nakagami-m fading channels in the case when perfect channel state information is available and then extended to the more realistic scenario where the available channel state information (CSI) is outdated due to fast fading. New expressions for the outage probability are obtained, and the impact of imperfect CSI on the performance is evaluated. Illustrative numerical results, Monte Carlo simulations, and comparisons with similar approaches are presented to assess the accuracy of our analytical derivations and confirm the performance gain of the proposed scheme.

  17. Cooperative Transmission in Mobile Wireless Sensor Networks with Multiple Carrier Frequency Offsets: A Double-Differential Approach

    Directory of Open Access Journals (Sweden)

    Kun Zhao

    2014-01-01

    Full Text Available As a result of the rapidly increasing mobility of sensor nodes, mobile wireless sensor networks (MWSNs would be subject to multiple carrier frequency offsets (MCFOs, which result in time-varying channels and drastically degrade the network performance. To enhance the performance of such MWSNs, we propose a relay selection (RS based double-differential (DD cooperative transmission scheme, termed RSDDCT, in which the best relay sensor node is selected to forward the source sensor node’s signals to the destination sensor node with the detect-and-forward (DetF protocol. Assuming a Rayleigh fading environment, first, exact closed-form expressions for the outage probability and average bit error rate (BER of the RSDDCT scheme are derived. Then, simple and informative asymptotic outage probability and average BER expressions at the large signal-to-noise ratio (SNR regime are presented, which reveal that the RSDDCT scheme can achieve full diversity. Furthermore, the optimum power allocation strategy in terms of minimizing the average BER is investigated, and simple analytical solutions are obtained. Simulation results demonstrate that the proposed RSDDCT scheme can achieve excellent performance over fading channels in the presence of unknown random MCFOs. It is also shown that the proposed optimum power allocation strategy offers substantial average BER performance improvement over the equal power allocation strategy.

  18. Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

    Science.gov (United States)

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N

    2014-11-10

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes.

  19. Outage information system

    International Nuclear Information System (INIS)

    Svengren, Haakan; Meyer, Brita Diskerud

    2005-09-01

    Today's control room systems are designed to operate during power operation, and there is clearly a need for a system to support control room personnel in automatically supervising the status of the plant during the outage period. In order to improve the supervision of Nuclear Power Plants during outages, three prototypes of the Outage Information system have been designed by the Halden Project, one for PWR and two for BWR. The Outage Information System is presented on a large screen, centrally placed in the control room. There will be a PC connected to manage the system. By using signals from the process as input to logic diagrams reflecting the plant's Safety Technical Specifications, the system automatically is supervising that requirements in Safety Technical Specifications are fulfilled during all plant states of the outage period. The system also automatically gives an overview of the status of safety systems and electrical bus bars. Alarm will occur if a requirement in the Safety Technical Specifications is not fulfilled or if a component planned to be ready for operation, is inoperable. In addition, selected measurements being important during the outage period are presented on the large screen. Which measurements and in which way the values will be presented, depends on the plant's control room design and work practice. (Author)

  20. Cycle 7 outage experience

    International Nuclear Information System (INIS)

    Gadeken, A.D.

    1986-03-01

    The scheduled 58-day refueling outage in preparation for the seventh operating cycle of the Fast Flux Test Facility (FFTF) was successfully completed three days ahead of schedule. The planning and execution of the outage was greatly aided by Project/2 automated scheduling capabilities. For example, the use of ''maintenance windows'' and resource loading capabilities was particularly effective. The value of the planning process was demonstrated by the smooth transition into the outage phase after an early shutdown and set the stage for our best outage to date

  1. Darlington Station outage - a maintenance perspective

    International Nuclear Information System (INIS)

    Plourde, J.; Marczak, J.; Stone, M.; Myers, R.; Sutton, K.

    1997-01-01

    Ontario Hydro's Darlington Nuclear Generating Station (4x881MW(e)net) has carried out its first station outage since full commercial operation. The outage presented challenges to the organization in terms of outage planning, support, management, and safe execution within the constraints of schedule, budget and resources. This paper will focus on the success of the outage maintenance program, identifying the major work programs - a vacuum structure and containment outage, an emergency service water system outage, an emergency coolant injection system outage, intake channel inspections, low pressure service water inspections, and significant outage maintenance work on each of the four reactor units. Planning for the outage was initiated early in anticipation of this important milestone in the station's life. Detailed safety reviews - nuclear, radiation, and conventional - were conducted in support of the planned maintenance program. System lineup and work protection were provided by the Station Operator work group. Work protection permitry was initiated well in advance of the outage. Station maintenance staff resources were bolstered in support of the outage to ensure program execution could be maintained within the schedule. Training programs were in place to ensure that expectations were clear and that high standards would be maintained. Materials management issues in support of maintenance activities were given high priority to ensure no delays to the planned work. Station management review and monitoring in preparation for and during the outage ensured that staff priorities remained focused. Lessons learned from the outage execution are being formalized in maintenance procedures and outage management procedures, and shared with the nuclear community. (author)

  2. Outage planning in Japan

    International Nuclear Information System (INIS)

    Nedderman, John.

    1997-01-01

    Nuclear plant operators in Japan are constrained to keep refuelling and maintenance outages to a minimum by the regulation limiting operating cycles to no longer than 13 months. Outage planning by two contrasting operators is described. Hokkaido Electric, which operates only one plant, Tomari, with two PWRs, plans to reduce outage time from the present 65 days in two stages. Detailed review of previous outage schedules has shown that a reduction to 59 days should be achievable by careful planning without any fundamental changes. The second reduction to 49 days will require such measures as relaxing water purity standards, rescheduling fuel unloading and loading shifts and speeding up eddy current testing of primary equipment by using steam generator nozzle dams. Kansai Electric, operating 11 PWRs at three plants, has scope for reducing outages at all of its units using a range of measures. Steam generator replacement in the seven oldest reactors, completed in July 1997, is by far the most significant of these and is expected to save 64 days repair time in a previous average outage time of 131 days. (UK)

  3. Benchmark Report on Key Outage Attributes: An Analysis of Outage Improvement Opportunities and Priorities

    Energy Technology Data Exchange (ETDEWEB)

    Germain, Shawn St. [Idaho National Laboratory (INL), Idaho Falls, ID (United States); Farris, Ronald [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-09-01

    Advanced Outage Control Center (AOCC), is a multi-year pilot project targeted at Nuclear Power Plant (NPP) outage improvement. The purpose of this pilot project is to improve management of NPP outages through the development of an AOCC that is specifically designed to maximize the usefulness of communication and collaboration technologies for outage coordination and problem resolution activities. This report documents the results of a benchmarking effort to evaluate the transferability of technologies demonstrated at Idaho National Laboratory and the primary pilot project partner, Palo Verde Nuclear Generating Station. The initial assumption for this pilot project was that NPPs generally do not take advantage of advanced technology to support outage management activities. Several researchers involved in this pilot project have commercial NPP experience and believed that very little technology has been applied towards outage communication and collaboration. To verify that the technology options researched and demonstrated through this pilot project would in fact have broad application for the US commercial nuclear fleet, and to look for additional outage management best practices, LWRS program researchers visited several additional nuclear facilities.

  4. Diablo Canyon refueling outage program

    International Nuclear Information System (INIS)

    McLane, W.B.; Irving, T.L.

    1991-01-01

    Management of outages has become one of the most talked about subjects in the nuclear power industry in the past several years. Many utilities do not perform refueling outages very well or in the past have had some outages that they would not like to repeat and in some cases do not even like to think about. With the growing cost of energy and the demands placed on utilities to improve capacity factors, it is very easy for management to focus on shortening refueling outage durations as a prime objective in improving overall corporate performance. So it is with Pacific Gas and Electric Company and the Diablo Canyon power plant. A review of their refueling outage performance reflects a utility that is responding to the nuclear industry's call for improved outage performance

  5. Nuclear power plant outage optimisation strategy

    International Nuclear Information System (INIS)

    2002-10-01

    Competitive environment for electricity generation has significant implications for nuclear power plant operations, including among others the need of efficient use of resources, effective management of plant activities such as on-line maintenance and outages. Nuclear power plant outage management is a key factor for good, safe and economic nuclear power plant performance which involves many aspects: plant policy, co-ordination of available resources, nuclear safety, regulatory and technical requirements and, all activities and work hazards, before and during the outage. This technical publication aims to communicate these practices in a way they can be used by operators and utilities in the Member States of the IAEA. It intends to give guidance to outage managers, operating staff and to the local industry on planning aspects, as well as examples and strategies experienced from current plants in operation on the optimization of outage period. This report discusses the plant outage strategy and how this strategy is actually implemented. The main areas identified as most important for outage optimization by the utilities and government organizations participating in this report are: organization and management; outage planning and preparation, outage execution, safety outage review, and counter measures to avoid extension of outages and to easier the work in forced outages. This report was based on discussions and findings by the authors of the annexes and the participants of an Advisory Group Meeting on Determinant Causes for Reducing Outage Duration held in June 1999 in Vienna. The report presents the consensus of these experts regarding best common or individual good practices that can be used at nuclear power plants with the aim to optimize

  6. Outage analysis of blind cooperative diversity

    KAUST Repository

    Tourki, Kamel; Alouini, Mohamed-Slim

    2011-01-01

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time-encoded transmission. In this paper, we considered a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality, and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a targeted end-to-end data rate R. We derived the end-to-end outage probability for a transmission rate R and a code rate ρ and look at a power allocation strategy between the source and the relays in order to minimize the end-to-end outage probability at the destination for high signal-to-noise ratio, by using the golden section search method. Performance results show that the computer simulations-based results coincide with our analytical results. Copyright © 2011 John Wiley & Sons, Ltd.

  7. Outage analysis of blind cooperative diversity

    KAUST Repository

    Tourki, Kamel

    2011-06-06

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time-encoded transmission. In this paper, we considered a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality, and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a targeted end-to-end data rate R. We derived the end-to-end outage probability for a transmission rate R and a code rate ρ and look at a power allocation strategy between the source and the relays in order to minimize the end-to-end outage probability at the destination for high signal-to-noise ratio, by using the golden section search method. Performance results show that the computer simulations-based results coincide with our analytical results. Copyright © 2011 John Wiley & Sons, Ltd.

  8. An Energy Efficient Simultaneous-Node Repositioning Algorithm for Mobile Sensor Networks

    Science.gov (United States)

    Hasbullah, Halabi; Nazir, Babar; Khan, Imran Ali

    2014-01-01

    Recently, wireless sensor network (WSN) applications have seen an increase in interest. In search and rescue, battlefield reconnaissance, and some other such applications, so that a survey of the area of interest can be made collectively, a set of mobile nodes is deployed. Keeping the network nodes connected is vital for WSNs to be effective. The provision of connectivity can be made at the time of startup and can be maintained by carefully coordinating the nodes when they move. However, if a node suddenly fails, the network could be partitioned to cause communication problems. Recently, several methods that use the relocation of nodes for connectivity restoration have been proposed. However, these methods have the tendency to not consider the potential coverage loss in some locations. This paper addresses the concerns of both connectivity and coverage in an integrated way so that this gap can be filled. A novel algorithm for simultaneous-node repositioning is introduced. In this approach, each neighbour of the failed node, one by one, moves in for a certain amount of time to take the place of the failed node, after which it returns to its original location in the network. The effectiveness of this algorithm has been verified by the simulation results. PMID:25152924

  9. Outage reduction of Hamaoka NPS

    International Nuclear Information System (INIS)

    Hida, Shigeru; Anma, Minoru

    1999-01-01

    In the Hamaoka nuclear power plant, we have worked on the outage reduction since 1993. In those days, the outage length in Hamaoka was 80 days or more, and was largely far apart from excellent results of European and American plants about the 30days. A concrete strategy to achieve the reduction process is the extension of working hours, the changing work schedule control unit for every hour, the equipment improvements, and the improvements of work environments, etc. We executed them one by one reflecting results. As a result, we achieved the outage for 57 days in 1995. Starting from this, we acquired the further outage reduction one by one and achieved the outage for 38 days in 1997 while maintaining safety and reliability of the plant. We advance these strategies further and we will aim at the achievement of the 30·35 days outage in the future. (author)

  10. Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes

    Directory of Open Access Journals (Sweden)

    Theofanis P. Lambrou

    2009-01-01

    Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.

  11. Outage optimization - the US experience and approach

    International Nuclear Information System (INIS)

    LaPlatney, J.

    2007-01-01

    Sustainable development of Nuclear Energy depends heavily on excellent performance of the existing fleet which in turn depends heavily on the performance of planned outages. Some reactor fleets, for example Finland and Germany, have demonstrated sustained good outage performance from their start of commercial operation. Others, such as the US, have improved performance over time. The principles behind a successful outage optimization process are: -) duration is not sole measure of outage success, -) outage work must be performed safely, -) scope selection must focus on improving plant material condition to improve reliability, -) all approved outage work must be completed, -) work must be done cost effectively, -) post-outage plant reliability is a key measure of outage success, and -) outage lessons learned must be effectively implemented to achieve continuous improvement. This approach has proven its superiority over simple outage shortening, and has yielded good results in the US fleet over the past 15 years

  12. Nuclear Plant Integrated Outage Management

    International Nuclear Information System (INIS)

    Gerstberger, C. R.; Coulehan, R. J.; Tench, W. A.

    1992-01-01

    This paper is a discussion of an emerging concept for improving nuclear plant outage performance - integrated outage management. The paper begins with an explanation of what the concept encompasses, including a scope definition of the service and descriptions of the organization structure, various team functions, and vendor/customer relationships. The evolvement of traditional base scope services to the integrated outage concept is addressed and includes discussions on changing customer needs, shared risks, and a partnership approach to outages. Experiences with concept implementation from a single service in 1984 to the current volume of integrated outage management presented in this paper. We at Westinghouse believe that the operators of nuclear power plants will continue to be aggressively challenged in the next decade to improve the operating and financial performance of their units. More and more customers in the U. S. are looking towards integrated outage as the way to meet these challenges of the 1990s, an arrangement that is best implemented through a long-term partnering with a single-source supplier of high quality nuclear and turbine generator outage services. This availability, and other important parameters

  13. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV

    Directory of Open Access Journals (Sweden)

    Zhichao Lv

    2018-04-01

    Full Text Available The Unmanned Surface Vehicle (USV integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  14. Outage management philosophies at Oconee nuclear station

    International Nuclear Information System (INIS)

    Bond, R.T.

    1991-01-01

    At Oconee the biggest single factor in improving availability and cutting cost per kilowatt-hour is reducing outage lengths. This must be accomplished without compromising the quality of the work that must be performed during these outages. Oconee has completed 35 refueling outages and has gained considerable experience in outage management. Since 1984, outage costs and durations have consistently been reduced while continuing to improve capacity factors. The last 6 refueling outages were 43, 42, 45, 42, 41, and 44 days, respectively. The capacity factors for these units between refueling outages are 98, 94, 96, 98, and 98%, respectively. The average cost of outages has been less than $12 million. It is believed that success cannot be attributed to any one factor by itself but is a compilation of many factors, all complementing each other. It is also believed, however, that there are four key areas that represent philosophies and can be given most of the credit for successful outages: planning, experience, teamwork, and outage management

  15. Management techniques that keep outages on schedule

    International Nuclear Information System (INIS)

    Taylor, R.B.

    1987-01-01

    During the immature operation of the Pickering Units 5 through 8, significant numbers of outages have been required to deal with warranty inspections and equipment problems. Techniques have been developed to ensure that outages are properly planned and managed so that outage time is minimized, overtime is minimized, and capacity factor is maximized, while ensuring that personnel safety is not compromised. Successful outage planning and execution requires the commitment of many on-station and off-station resources groups. Coordination of all of these groups is required both before and during the outage to ensure outage time is not lost due to unavailability of men or equipment at the time they are required. This paper details the control processes that must be used prior to, during, and after an outage to ensure that time is not lost unnecessarily during outages. Successful outage management at Pickering Nuclear Generating Station can be subdivided into three stages; preoutage planning, outage execution, and postoutage review

  16. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  17. Integrated outage management: Leveraging utility system assets including GIS and AMR for optimum outage response

    Energy Technology Data Exchange (ETDEWEB)

    Finamore, E. P.

    2004-02-01

    The control of electrical system outages is discussed. The principal argument advanced is that traditional stand-alone methods of outage response will no longer get the job done without utility companies integrating their outage management systems with other system assets such as GIS (geographic information system) and AMR (advanced metering systems). Many meter reading systems, while primarily supporting customer billing, can also provide outage alarm and some are also capable of service restoration notification, which is an invaluable benefit to service operators since it obviates the need for verifying system restoration by labour-intensive on-site visits or customer call-backs. If successfully leveraged, optimization of all utility assets and improvements in labour productivity can results in improved outage management performance gains without affecting performance in other areas.

  18. Nuclear power plant outages

    International Nuclear Information System (INIS)

    1998-01-01

    The Finnish Radiation and Nuclear Safety Authority (STUK) controls nuclear power plant safety in Finland. In addition to controlling the design, construction and operation of nuclear power plants, STUK also controls refuelling and repair outages at the plants. According to section 9 of the Nuclear Energy Act (990/87), it shall be the licence-holder's obligation to ensure the safety of the use of nuclear energy. Requirements applicable to the licence-holder as regards the assurance of outage safety are presented in this guide. STUK's regulatory control activities pertaining to outages are also described

  19. Advanced Outage and Control Center: Strategies for Nuclear Plant Outage Work Status Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Gregory Weatherby

    2012-05-01

    The research effort is a part of the Light Water Reactor Sustainability (LWRS) Program. LWRS is a research and development program sponsored by the Department of Energy, performed in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants. The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. The Outage Control Center (OCC) Pilot Project was directed at carrying out the applied research for development and pilot of technology designed to enhance safe outage and maintenance operations, improve human performance and reliability, increase overall operational efficiency, and improve plant status control. Plant outage management is a high priority concern for the nuclear industry from cost and safety perspectives. Unfortunately, many of the underlying technologies supporting outage control are the same as those used in the 1980’s. They depend heavily upon large teams of staff, multiple work and coordination locations, and manual administrative actions that require large amounts of paper. Previous work in human reliability analysis suggests that many repetitive tasks, including paper work tasks, may have a failure rate of 1.0E-3 or higher (Gertman, 1996). With between 10,000 and 45,000 subtasks being performed during an outage (Gomes, 1996), the opportunity for human error of some consequence is a realistic concern. Although a number of factors exist that can make these errors recoverable, reducing and effectively coordinating the sheer number of tasks to be performed, particularly those that are error prone, has the potential to enhance outage efficiency and safety. Additionally, outage management requires precise coordination of work groups that do not always share similar objectives. Outage

  20. Nuclear Power Plant Outage Optimization Strategy. 2016 Edition

    International Nuclear Information System (INIS)

    2016-10-01

    This publication is an update of IAEA-TECDOC-1315, Nuclear Power Plant Outage Optimisation Strategy, which was published in 2002, and aims to communicate good outage management practices in a manner that can be used by operators and utilities in Member States. Nuclear power plant outage management is a key factor for safe and economic nuclear power plant performance. This publication discusses plant outage strategy and how this strategy is actually implemented. The main areas that are important for outage optimization that were identified by the utilities and government organizations participating in this report are: 1) organization and management; 2) outage planning and preparation; 3) outage execution; 4) safety outage review; and 5) counter measures to avoid the extension of outages and to facilitate the work in forced outages. Good outage management practices cover many different areas of work and this publication aims to communicate these good practices in a way that they can be used effectively by operators and utilities

  1. Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    L. S. Sindhuja

    2016-01-01

    Full Text Available Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i increase in the detection ratio, (ii decrease in the control overhead, and (iii increase in throughput. The performance of the proposed work is measured using detection ratio, false detection ratio, packet delivery ratio, average delay, control overheads, and throughput. The implementation is done using ns-2 to exhibit the actuality of the proposed work.

  2. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  3. Outages planning

    International Nuclear Information System (INIS)

    Blanquer, N.

    2010-01-01

    The reason of a nuclear power plant outage seems easy. Replace 1/3 of the total core fuel inside reactor for a new, store the old one in a pool and shuffle the rest 2/3 in other positions in the core to optimize fuel burn up. Also is needed to make the preventive, corrective and conservative maintenance, the selected design changes and the regulatory and technical requirements for equipment and systems. To make the plant outage strategy for all the above pack with nuclear safety not challenged is the objective of this article for the Spanish Nuclear Society magazine. (Author)

  4. Dual-Stack Single-Radio Communication Architecture for UAV Acting As a Mobile Node to Collect Data in WSNs.

    Science.gov (United States)

    Sayyed, Ali; de Araújo, Gustavo Medeiros; Bodanese, João Paulo; Becker, Leandro Buss

    2015-09-16

    The use of mobile nodes to collect data in a Wireless Sensor Network (WSN) has gained special attention over the last years. Some researchers explore the use of Unmanned Aerial Vehicles (UAVs) as mobile node for such data-collection purposes. Analyzing these works, it is apparent that mobile nodes used in such scenarios are typically equipped with at least two different radio interfaces. The present work presents a Dual-Stack Single-Radio Communication Architecture (DSSRCA), which allows a UAV to communicate in a bidirectional manner with a WSN and a Sink node. The proposed architecture was specifically designed to support different network QoS requirements, such as best-effort and more reliable communications, attending both UAV-to-WSN and UAV-to-Sink communications needs. DSSRCA was implemented and tested on a real UAV, as detailed in this paper. This paper also includes a simulation analysis that addresses bandwidth consumption in an environmental monitoring application scenario. It includes an analysis of the data gathering rate that can be achieved considering different UAV flight speeds. Obtained results show the viability of using a single radio transmitter for collecting data from the WSN and forwarding such data to the Sink node.

  5. Review of Paks outage results 1990

    International Nuclear Information System (INIS)

    Lukacs, P.; Zsoldos, F.; Kiss, Z.

    1991-01-01

    The year 1990 was not the most successful from an outage point of view at the Paks Nuclear Power Plant in Hungary -there were one or two long delays. Work at unit 4 had a delay of 10 days because of an error made during assembling the reactor vessel. While the outage of unit 3 was running, a feedwater pipe hanger problem was discovered - several hangers were found displaced from the right position. A general inspection of the affected system was required and this took about 11 days. Information about each outage is presented on diagrams, making comparison easier. These diagrams give information about deviations from the outage plan, about work hours performed during outages, and about collective exposure. (author)

  6. Guidelines for Implementation of an Advanced Outage Control Center to Improve Outage Coordination, Problem Resolution, and Outage Risk Management

    Energy Technology Data Exchange (ETDEWEB)

    St. Germain, Shawn W. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Farris, Ronald K. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Whaley, April M. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Medema, Heather D. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Gertman, David I. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    This research effort is a part of the Light-Water Reactor Sustainability (LWRS) Program, which is a research and development (R&D) program sponsored by Department of Energy (DOE) and performed in close collaboration with industry R&D programs that provide the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants. The LWRS program serves to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. The purpose of this research is to improve management of nuclear power plant (NPP) outages through the development of an advanced outage control center (AOCC) that is specifically designed to maximize the usefulness of communication and collaboration technologies for outage coordination and problem resolution activities. This technical report for industry implementation outlines methods and considerations for the establishment of an AOCC. This report provides a process for implementation of a change management plan, evaluation of current outage processes, the selection of technology, and guidance for the implementation of the selected technology. Methods are presented for both adoption of technologies within an existing OCC and for a complete OCC replacement, including human factors considerations for OCC design and setup.

  7. Framatome ANP outage optimization support solutions

    International Nuclear Information System (INIS)

    Bombail, Jean Paul

    2003-01-01

    Over the last several years, leading plant operators have demonstrated that availability factors can be improved while safety and reliability can be enhanced on a long-term basis and operating costs reduced. Outage optimization is the new term being used to describe these long-term initiatives through which a variety of measures aimed at shortening scheduled plant outages have been developed and successfully implemented by these leaders working with their service providers who were introducing new technologies and process improvements. Following the leaders, all operators now have ambitious outage optimization plans and the median and average outage duration are decreasing world-wide. Future objectives are even more stringent and must include plant upgrades and component replacements being performed for life extension of plant operation. Outage optimization covers a broad range of activities from modifications of plant systems to faster cool down rates to human behavior improvements. It has been proven to reduce costs, avoid unplanned outages and thus support plant availability and help to ensure the utility's competitive position in the marketplace

  8. Management strategies for nuclear power plant outages

    International Nuclear Information System (INIS)

    2006-01-01

    More competitive energy markets have significant implications for nuclear power plant operations, including, among others, the need for more efficient use of resources and effective management of plant activities such as on-line maintenance and outages. Outage management is a key factor for safe, reliable and economic plant performance and involves many aspects: plant policy, coordination of available resources, nuclear safety, regulatory and technical requirements, and all activities and work hazards, before and during the outage. The IAEA has produced this report on nuclear power plant outage management strategies to provide both a summary and an update of a follow-up to a series of technical documents related to practices regarding outage management and cost effective maintenance. The aim of this publication is to identify good practices in outage management: outage planning and preparation, outage execution and post-outage review. As in in the related technical documents, this report aims to communicate these practices in such a way that they can be used by operating organizations and regulatory bodies in Member States. The report was prepared as part of an IAEA project on continuous process improvement. The objective of this project is to increase Member State capabilities in improving plant performance and competitiveness through the utilization of proven engineering and management practices developed and transferred by the IAEA

  9. Outage risk reduction at Diablo Canyon

    International Nuclear Information System (INIS)

    Burnett, Tobias W.T.; Eugene Newman, C.

    2004-01-01

    A formal risk reduction program was conducted at the Diablo Canyon Nuclear Generating plant as part of EPRI's Outage Risk Assessment and Management Program. The program began with a probabilistic and deterministic assessment of the frequency of core coolant boiling and core uncovery during shutdown operations. This step identified important contributors to risk, periods of high vulnerability, and potential mechanisms for reducing risk. Next, recovery strategies were evaluated and procedures, training, and outage schedules modified. Twelve risk reduction enhancements were developed and implemented. These enhancements and their impact are described in this paper. These enhancements reduced the calculated risk of core uncovery by about a factor of four for a refueling outage without lengthening the outage schedule; increased the outage efficiency, contributing to completing 11 days ahead of schedule; and helped to earn the highest achievable SALP rating from the NRC. (author)

  10. Outage scheduling and implementation

    International Nuclear Information System (INIS)

    Allison, J.E.; Segall, P.; Smith, R.R.

    1986-01-01

    Successful preparation and implementation of an outage schedule and completion of scheduled and emergent work within an identified critical path time frame is a result of careful coordination by Operations, Work Control, Maintenance, Engineering, Planning and Administration and others. At the Fast Flux Test Facility (FFTF) careful planning has been responsible for meeting all scheduled outage critical paths

  11. Dual-Stack Single-Radio Communication Architecture for UAV Acting As a Mobile Node to Collect Data in WSNs

    Directory of Open Access Journals (Sweden)

    Ali Sayyed

    2015-09-01

    Full Text Available The use of mobile nodes to collect data in a Wireless Sensor Network (WSN has gained special attention over the last years. Some researchers explore the use of Unmanned Aerial Vehicles (UAVs as mobile node for such data-collection purposes. Analyzing these works, it is apparent that mobile nodes used in such scenarios are typically equipped with at least two different radio interfaces. The present work presents a Dual-Stack Single-Radio Communication Architecture (DSSRCA, which allows a UAV to communicate in a bidirectional manner with a WSN and a Sink node. The proposed architecture was specifically designed to support different network QoS requirements, such as best-effort and more reliable communications, attending both UAV-to-WSN and UAV-to-Sink communications needs. DSSRCA was implemented and tested on a real UAV, as detailed in this paper. This paper also includes a simulation analysis that addresses bandwidth consumption in an environmental monitoring application scenario. It includes an analysis of the data gathering rate that can be achieved considering different UAV flight speeds. Obtained results show the viability of using a single radio transmitter for collecting data from the WSN and forwarding such data to the Sink node.

  12. Qinshan CANDU NPP outage performance improvement through benchmarking

    International Nuclear Information System (INIS)

    Jiang Fuming

    2005-01-01

    With the increasingly fierce competition in the deregulated Energy Market, the optimization of outage duration has become one of the focal points for the Nuclear Power Plant owners around the world. People are seeking various ways to shorten the outage duration of NPP. Great efforts have been made in the Light Water Reactor (LWR) family with the concept of benchmarking and evaluation, which great reduced the outage duration and improved outage performance. The average capacity factor of LWRs has been greatly improved over the last three decades, which now is close to 90%. CANDU (Pressurized Heavy Water Reactor) stations, with its unique feature of on power refueling, of nuclear fuel remaining in the reactor all through the planned outage, have given raise to more stringent safety requirements during planned outage. In addition, the above feature gives more variations to the critical path of planned outage in different station. In order to benchmarking again the best practices in the CANDU stations, Third Qinshan Nuclear Power Company (TQNPC) have initiated the benchmarking program among the CANDU stations aiming to standardize the outage maintenance windows and optimize the outage duration. The initial benchmarking has resulted the optimization of outage duration in Qinshan CANDU NPP and the formulation of its first long-term outage plan. This paper describes the benchmarking works that have been proven to be useful for optimizing outage duration in Qinshan CANDU NPP, and the vision of further optimize the duration with joint effort from the CANDU community. (authors)

  13. Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing the Mobile Node

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi

    2014-01-01

    of the mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of signaling messages interchanged between the device and the network due to an increase in handover related operations. Attempt should be made to reduce the interaction with the network and simplify...... the mobility and location management related processes. In this thesis we set out a technical architecture of a mobile network to abridge the intricate mobility and location management processes as well as the addressing principle to render more operational efficiency and cater to the needs of the data hungry......, for example, addressing of a node. If we have a method to actuate user identification for the purpose of mobility management by implementing lower layer processes, we can simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network elements and user equipment...

  14. How individual traces and interactive timelines could support outage execution - Toward an outage historian concept

    International Nuclear Information System (INIS)

    Parfouru, S.; De-Beler, N.

    2012-01-01

    In the context of a project that is designing innovative ICT-based solutions for the organizational concept of outage management, we focus on the informational process of the OCR (Outage Control Room) underlying the execution of the outages. Informational process are based on structured and unstructured documents that have a key role in the collaborative processes and management of the outage. We especially track the structured and unstructured documents, electronically or not, from creation to sharing. Our analysis allows us to consider that the individual traces produced by an individual participant with a specific role could be multi-purpose and support sharing between participants without creating duplication of work. The ultimate goal is to be able to generate an outage historian, that is not just focused on highly structured information, which could be useful to improve the continuity of information between participants. We study the implementation of this approach through web technologies and social media tools to address this issue. We also investigate the issue of data access through interactive visualization timelines coupled with other modality's to assist users in the navigation and exploration of the proposed historian. (authors)

  15. Major outage trends in light water reactors. Interim report

    International Nuclear Information System (INIS)

    Burns, E.T.

    1978-04-01

    The report is a summary of the major outages which occurred in light water reactor plants during the period January 1971 through June 1977. Only those outages greater than 100 hours duration (exclusive of refueling outages) are included in the report. The trends in outages related to various reactor systems and components are presented as a function of plant age, and alternatively, calendar year. The principal contributors to major outages are ranked by their effect on the overall outage time for PWRs and BWRs. In addition, the outage history of each operating nuclear plant greater than 150 MWe is presented, along with a brief summary of those outages greater than two months duration

  16. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  17. Advanced Test Reactor outage risk assessment

    International Nuclear Information System (INIS)

    Thatcher, T.A.; Atkinson, S.A.

    1997-01-01

    Beginning in 1997, risk assessment was performed for each Advanced Test Reactor (ATR) outage aiding the coordination of plant configuration and work activities (maintenance, construction projects, etc.) to minimize the risk of reactor fuel damage and to improve defense-in-depth. The risk assessment activities move beyond simply meeting Technical Safety Requirements to increase the awareness of risk sensitive configurations, to focus increased attention on the higher risk activities, and to seek cost-effective design or operational changes that reduce risk. A detailed probabilistic risk assessment (PRA) had been performed to assess the risk of fuel damage during shutdown operations including heavy load handling. This resulted in several design changes to improve safety; however, evaluation of individual outages had not been performed previously and many risk insights were not being utilized in outage planning. The shutdown PRA provided the necessary framework for assessing relative and absolute risk levels and assessing defense-in-depth. Guidelines were written identifying combinations of equipment outages to avoid. Screening criteria were developed for the selection of work activities to receive review. Tabulation of inherent and work-related initiating events and their relative risk level versus plant mode has aided identification of the risk level the scheduled work involves. Preoutage reviews are conducted and post-outage risk assessment is documented to summarize the positive and negative aspects of the outage with regard to risk. The risk for the outage is compared to the risk level that would result from optimal scheduling of the work to be performed and to baseline or average past performance

  18. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  19. Nuclear outages: an approach to project controls

    International Nuclear Information System (INIS)

    Bryson, R.

    1985-01-01

    The annual budget for maintaining and operating a nuclear power plant has risen dramatically over the past 5 years. NRC-mandated plant improvements and outage related expenses are often cited to be the main contributors to these escalating budgets. Nuclear utilities have responded by developing programs to improve plant availability and outage costs through improved outage performance. Utilities recognize that for capital improvements the program to control costs does no begin with outage planning, but rather more appropriately up front during the engineering phase. To support their management objectives, utilities have been developing comprehensive project control systems for concurrently reducing capital expenditures, outage-related costs, and time. This paper provides an approach to project controls that, rather than using one all inclusive comprehensive system, requires five separate monitoring systems - one for each phase of an activity's life cycle. Through the integration of these discrete but interrelated systems, utility management acquires the necessary tools for comprehensive planning and control of their modification program and effective detailed monitoring for all outage-related activities

  20. Outage Risk Assessment and Management (ORAM) technology to improve outage safety and economics

    International Nuclear Information System (INIS)

    Kalra, S.P.

    2004-01-01

    The Electric Power Research Institute (EPRI) has undertaken an aggressive program, called ORAM (Outage Risk Assessment and Management), to provide utilities with tools and technology to assist in managing risk during the planning and conduct of outages. The ORAM program consists of the following 6 steps: i) Perform utility surveys and visits on shutdown risk management needs, ii) Perform probabilistic shutdown safety assessments (PSSAs) to identify generic insights that can be incorporated into risk management guidelines and identify selected areas for the development of contingency actions, iii) Develop risk management guidelines (RMG's) that provide a systematic approach to the planning and conduct of outages from a safety perspective. Incorporate insights from the shutdown safety assessments and other operating experience into the RMG's. iv) Develop selected contingency actions including a thermalhydraulic tool kit to address higher risk time periods and activities identified in the shutdown safety assessments, v) Develop computer software that integrates all of the above capability into an easy to use tool for effective shutdown operation management for utilities, vi) Provide assistance in the transfer of this technology and the application of these tools. This paper briefly describes the technical approach and tools developed under EPRI's ORAM program and its applications for improving outage safety and economics. (author)

  1. Standard plants, standard outages: the EdF approach

    International Nuclear Information System (INIS)

    Miron, J.L.

    1991-01-01

    At the end of 1990 Electricite de France had carried out a total of 350 PWR refuelling outages. Although the French units are standardized the routine of the outages are not all the same. The major influences on outages were: setting up new organizations to apply quality assurance regulations; improving systematic experience feedback; incorporating modifications in the outage schedules; assumilation of computerized maintenance management by the sites. (author)

  2. Primary Water Chemistry Control during a Planned Outage at Bruce Power

    International Nuclear Information System (INIS)

    Ma, Guoping; Nashiem, Rod; Matheson, Shane; Yabar, Berman; Harper, Bill; Roberts, John G.

    2012-09-01

    Bruce Power has developed a comprehensive outage water chemistry program, which includes both primary and secondary chemistry requirements during planned outages. The purpose of the program is to emphasize the chemistry requirements during outages and subsequent start-ups in order to maintain the integrity of the systems, minimise activity transport and radiation fields, reduce the Carbon-14 release, and to ensure that the requirements are integrated with the outage management program. Prior to a planned outage, Station Chemical Technical Sections identify outage chemistry requirements to Operations and Outage Planning and ensure that work necessary to correct system chemistry issues is within outage work scope. The outage water chemistry program provides direction for establishing alternative sampling locations as demanded by the system configuration during the outage and identifies outage prerequisites for nuclear system purification capabilities. These requirements are contained in an outage checklist. The paper mainly highlights the primary water chemistry issues and chemistry control strategies during planned outages and discusses challenges and successes. (authors)

  3. Integrated outages increase Surry's availability

    International Nuclear Information System (INIS)

    Harms, S.R.; Downs, J.L.

    1995-01-01

    This article describes how, through Virginia Power's and Westinghouse's goal-oriented planning philosophy, teamwork and commitment, average outage duration has decreased significantly. During the past 10 years Virginia Power and its nuclear steam supply system (NSSS) services vendor, Westinghouse Electric Corp., have developed a working partnership with one goal in mind: increasing the availability and capacity factors of the North Anna and Surry nuclear power stations while driving down the operating costs of the plants. The outage integration program, steam generator maintenance agreement (SGMA), and integrated radiological services program form the core of this relationship and helped Virginia Power complete one of the most successful outages in Surry Power Station's operating history

  4. Maintenance and Outage Management Assessment (MOMA)

    International Nuclear Information System (INIS)

    2005-01-01

    The competitive environment has significant implications for nuclear power plant (NPP) operations, which include, inter alia, the need for efficient use of resources and effective management of plant activities of maintenance and outages. The purpose of NPP maintenance and outages is to allow NPPs to use all those functions necessary for safe and reliable power production by keeping them available and adequate maintenance programme is essential. The maintenance programme covers all preventive and remedial measures, both administrative and technical, necessary to identify and mitigate degradation of a functioning system, structure or component, or restore the design functions of a failed system, structure or component to an acceptable level. In response to the needs of MSs, NPES (Nuclear Power Section, Division of Nuclear Power, IAEA) plans to strengthen its services. NPES services will not only continue to provide its 'traditional' products of publications of nuclear industrial best practices and technical implementation of TC projects on plant maintenance and outage management, but also be expanded to deliver, in a timely manner, technical support missions as requested by MSs for NPPs. One of many services is Maintenance and Outage Management Assessment (MOMA). The NPP can obtain support and assistance in assessment and optimisation of its maintenance program and/or outage management. It aims to help the NPP improve its performance of maintenance and outage in a competitive nuclear power business environment. The specific benefits of the assessment are as follows: a) disseminate nuclear industrial best practices on maintenance program and outage management in the world, b) benchmark, evaluate and optimise the approach of maintenance program and outage management and c) identify solutions to known problems at nuclear power plants, if any. MOMA is conducted at the request of NPPs of any IAEA Member States. MOMA consists in a technical mission/visit for 1-3 weeks by

  5. Reactor refurbishment in an outage environment

    International Nuclear Information System (INIS)

    Gowthorpe, P.; Hoare, R.

    2012-01-01

    Reactor life extension has typically been performed during specific refurbishment outages. These outages are long and costly due to the sheer complexity of the scope, not to mention the ever present discovery work. A scope of this size requires a huge labour force to execute, which poses significant challenges. The work is difficult to staff with qualified people able to execute the work smoothly and managing the required labour pool problematic. Cost and time overruns are inevitable in that environment. Reducing the cost and schedule is critical to the long term viability of reactor refurbishment projects. With planning, the total cost of the refurbishment can be reduced by managing the inspection and repairs during normal outages. Identifying what activities need to be done each outage for the life of the reactor and bringing the latest technology can make this viable. Tightly planned outages with a small well trained labour force will go a long way to reducing costs. The suite of services and tooling available to the utilities to manage their reactor integrity has improved significantly in recent years and continues to evolve. New feeder inspection technologies can provide improved inspection results for the complex feeder geometry. These improvements lead to more accurate wear rates and better predictions of component life. Feeders that need replacement based on improved inspection techniques can be replaced systematically during regular outages rather than specific refurbishment outages. Targeting areas rather than entire feeders reduces time, dose and cost. In cases where feeder replacement isn't feasible or where unpredicted wear is found, a feeder weld overlay process can be used. To manage the reactor work, new data systems are under development that allow for effective tracking of each activity performed and outcomes in a single package. (author)

  6. Indicators for management of planned outages in nuclear power plants

    International Nuclear Information System (INIS)

    2006-04-01

    The outages considered within the scope of this publication are planned refuelling outages (PWR and BWR nuclear power plants) and planned outages associated with major maintenance, tests and inspections (PHWR and LWGR nuclear power plants). The IAEA has published some valuable reports providing guidance and assistance to operating organizations on outage management. This TECDOC outlines main issues to be considered in outage performance monitoring and provides guidance to operating organizations for the development and implementation of outage programmes which could enhance plant safety, reliability and economics. It also complements the series of reports published by the IAEA on outage management and on previous work related to performance indicators developed for monitoring different areas of plant operation, such as safety, production, reliability and economics. This publication is based upon the information presented at a technical meeting to develop a standardized set of outage indicators for outage optimization, which was organised in Vienna, 6-9 October 2003. At this meeting, case studies and good practices relating to performance indicator utilization in the process of planned outage management were presented and discussed

  7. A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs

    Directory of Open Access Journals (Sweden)

    Rezvan Almas Shehni

    2017-12-01

    Full Text Available Wide-spread deployment of Wireless Sensor Networks (WSN necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating several fabricated IDs. Due to energy consumption concerns in WSNs, devising detection algorithms which release the sensor nodes from high computational and communicational loads are of great importance. In this paper, a new computationally lightweight watchdog-based algorithm is proposed for detecting Sybil IDs in mobile WSNs. The proposed algorithm employs watchdog nodes for collecting detection information and a designated watchdog node for detection information processing and the final Sybil list generation. Benefiting from a newly devised co-presence state diagram and adequate detection rules, the new algorithm features low extra communication overhead, as well as a satisfactory compromise between two otherwise contradictory detection measures of performance, True Detection Rate (TDR and False Detection Rate (FDR. Extensive simulation results illustrate the merits of the new algorithm compared to a couple of recent watchdog-based Sybil detection algorithms.

  8. Percolation-theoretic bounds on the cache size of nodes in mobile opportunistic networks.

    Science.gov (United States)

    Yuan, Peiyan; Wu, Honghai; Zhao, Xiaoyan; Dong, Zhengnan

    2017-07-18

    The node buffer size has a large influence on the performance of Mobile Opportunistic Networks (MONs). This is mainly because each node should temporarily cache packets to deal with the intermittently connected links. In this paper, we study fundamental bounds on node buffer size below which the network system can not achieve the expected performance such as the transmission delay and packet delivery ratio. Given the condition that each link has the same probability p to be active in the next time slot when the link is inactive and q to be inactive when the link is active, there exists a critical value p c from a percolation perspective. If p > p c , the network is in the supercritical case, where we found that there is an achievable upper bound on the buffer size of nodes, independent of the inactive probability q. When p network is in the subcritical case, and there exists a closed-form solution for buffer occupation, which is independent of the size of the network.

  9. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  10. Outage costs: who should pay?

    International Nuclear Information System (INIS)

    Stivison, D.V.

    1986-01-01

    Decisions affecting the Three Mile Island-1 and -2 reactors illustrate new an stricter standards which apply to how regulator will allocate the costs of outages. The rule allows outages for normal refueling and other normal shutdowns if return to the power grid is assured. TMI-1 was removed from the rate base one year after the accident, and was readmitted only after achieving full power in 1986. A reasonableness standard based on an analysis of the outage and utility responses is the basis for deciding for or against removal. The author cites cases in which unreasonable actions caused the Nuclear Regulatory Commission to charge utility management with imprudence. New safety standards will force utilities to reduce employee error, equipment failure, and management weakness. 19 references

  11. The control of reactor outages

    International Nuclear Information System (INIS)

    Bouget, Y.H.; Berteloot, J.M.

    1995-01-01

    The 1985-1992 period was marked by a continuous decay in French reactors operation. This situation has led the Committee for Outages Mastery to take steps for the improvement of nuclear power plants availability. The control of reactor outages requires an integrated vision of the safety, duration, dosimetry, costs and security aspects and a perfect management of contractors. The paper describes the methodology used for the management and the maintenance of the French PWR reactors stock. A detailed schedule of maintenance tasks with dose estimations is now required from each site to anticipate and optimize the duration of outages. Thanks to this action, a significant reduction of the maintenance costs is observed for the 1992-1995 period. (J.S.). 2 figs

  12. Refueling outage data collection and analysis

    International Nuclear Information System (INIS)

    Harshaw, K.; Quilliam, J.; Brinsfield, W.; Jeffries, J.

    1993-07-01

    This report summarizes the results of an EPRI project to compile an industry generic refueling outage database applicable to alternate (non-full-power) modes of shutdown conditions at nuclear power plants. The project team evaluated five outages at two BWR plants. They obtained data primarily from control room logs, outage schedules, incident reports, and licensee event reports. The team organized the data by outage segment and time line. Due to its small sample size, this study produced no conclusive results related to initiating event frequencies, equipment failure rates, or human reliability estimates during shutdown conditions. However, it pointed out the problems of brief or inconsistent recordkeeping. A too brief record results in difficulty determining if the root cause of an event was mechanical or the result of human performance. Retrieval of data can be difficult and labor-intensive. There is a clear need for better, more comprehensive documentation

  13. WNP-2 outage safety review methodology

    International Nuclear Information System (INIS)

    Chiang, Albert; Fu, James

    2004-01-01

    A practical and versatile method was developed in the flow chart and checklist forms to show the defense-in-depth for various key safety functions of a nuclear power plant during shutdown. Using four different colors (green, yellow, orange, and red) for indication of levels of defense-in-depth is visually impressive, easy to understand, and was adopted by the outage management personnel as a convenient reference tool for maintenance activity planning before the outage, and schedule changes during the outage. This paper describes the method and its application at Washington Public Power Supply System's Nuclear Project 2 (WNP-2). (author)

  14. Unit availability not affected by extending outage cycles

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.J.

    2003-03-01

    To improve their economic dispatch position, more and more plant owners are extending the intervals between major outages for boilers from one year to 18-24 months and for steam turbine up to 12 years. In many instances, extended outage cycles have resulted in no loss in availability or increases in forced outages. The article discusses outage scheduling at Tucson Electric Power's Springville coal-fired plant, the Panther Creek Energy Facility in Pennsylvania, and at Tennessee Valley Authority's coal-fired power plants. 1 fig.

  15. Contingency Analysis of Cascading Line Outage Events

    Energy Technology Data Exchange (ETDEWEB)

    Thomas L Baldwin; Magdy S Tawfik; Miles McQueen

    2011-03-01

    As the US power systems continue to increase in size and complexity, including the growth of smart grids, larger blackouts due to cascading outages become more likely. Grid congestion is often associated with a cascading collapse leading to a major blackout. Such a collapse is characterized by a self-sustaining sequence of line outages followed by a topology breakup of the network. This paper addresses the implementation and testing of a process for N-k contingency analysis and sequential cascading outage simulation in order to identify potential cascading modes. A modeling approach described in this paper offers a unique capability to identify initiating events that may lead to cascading outages. It predicts the development of cascading events by identifying and visualizing potential cascading tiers. The proposed approach was implemented using a 328-bus simplified SERC power system network. The results of the study indicate that initiating events and possible cascading chains may be identified, ranked and visualized. This approach may be used to improve the reliability of a transmission grid and reduce its vulnerability to cascading outages.

  16. Predicting Power Outages Using Multi-Model Ensemble Forecasts

    Science.gov (United States)

    Cerrai, D.; Anagnostou, E. N.; Yang, J.; Astitha, M.

    2017-12-01

    Power outages affect every year millions of people in the United States, affecting the economy and conditioning the everyday life. An Outage Prediction Model (OPM) has been developed at the University of Connecticut for helping utilities to quickly restore outages and to limit their adverse consequences on the population. The OPM, operational since 2015, combines several non-parametric machine learning (ML) models that use historical weather storm simulations and high-resolution weather forecasts, satellite remote sensing data, and infrastructure and land cover data to predict the number and spatial distribution of power outages. A new methodology, developed for improving the outage model performances by combining weather- and soil-related variables using three different weather models (WRF 3.7, WRF 3.8 and RAMS/ICLAMS), will be presented in this study. First, we will present a performance evaluation of each model variable, by comparing historical weather analyses with station data or reanalysis over the entire storm data set. Hence, each variable of the new outage model version is extracted from the best performing weather model for that variable, and sensitivity tests are performed for investigating the most efficient variable combination for outage prediction purposes. Despite that the final variables combination is extracted from different weather models, this ensemble based on multi-weather forcing and multi-statistical model power outage prediction outperforms the currently operational OPM version that is based on a single weather forcing variable (WRF 3.7), because each model component is the closest to the actual atmospheric state.

  17. Analysis of T101 outage radiation dose

    International Nuclear Information System (INIS)

    Li, Zhonghua

    2008-01-01

    Full text: Collective radiation dose during outage is about 80% of annual collective radiation dose at nuclear power plants (NPPs). T 101 Outage is the first four-year outage of Unit 1 at Tianwan Nuclear Power Station (TNPS) and thorough overhaul was undergone for the 105-day's duration. Therefore, T 101 Outage has significant reference meaning to reducing collective radiation dose at TNPS. This paper collects the radiation dose statistics during T 101 Outage and analyses the radiation dose distribution according to tasks, work kinds and varying trend of the collective radiation dose etc., comparing with other similar PWRs in the world. Based on the analysis this paper attempts to find out the major factors in collective radiation dose during T 101 Outage. The major positive factor is low radiation level at workplace, which profits from low content of Co in reactor construction materials, optimised high-temperature p H value of the primary circuit coolant within the tight range and reactor operation without trips within the first fuel cycle. One of the most negative factors is long outage duration and many person-hours spent in the radiological controlled zone, caused by too many tasks and inefficient work. So besides keeping good performance of reducing radioactive sources, it should be focused on how to improve implementation of work management including work selection, planning and scheduling, work preparation, work implementation, work assessment and feedback, which can lead to reduced numbers of workers needed to perform a task, of person-hours spent in the radiological controlled zone. Moreover, this leads to reduce occupational exposures in an ALARA fashion. (author)

  18. A Mobile Asset Tracking System Architecture under Mobile-Stationary Co-Existing WSNs

    Science.gov (United States)

    Kim, Tae Hyon; Jo, Hyeong Gon; Lee, Jae Shin; Kang, Soon Ju

    2012-01-01

    The tracking of multiple wireless mobile nodes is not easy with current legacy WSN technologies, due to their inherent technical complexity, especially when heavy traffic and frequent movement of mobile nodes are encountered. To enable mobile asset tracking under these legacy WSN systems, it is necessary to design a specific system architecture that can manage numerous mobile nodes attached to mobile assets. In this paper, we present a practical system architecture including a communication protocol, a three-tier network, and server-side middleware for mobile asset tracking in legacy WSNs consisting of mobile-stationary co-existing infrastructures, and we prove the functionality of this architecture through careful evaluation in a test bed. Evaluation was carried out in a microwave anechoic chamber as well as on a straight road near our office. We evaluated communication mobility performance between mobile and stationary nodes, location-awareness performance, system stability under numerous mobile node conditions, and the successful packet transfer rate according to the speed of the mobile nodes. The results indicate that the proposed architecture is sufficiently robust for application in realistic mobile asset tracking services that require a large number of mobile nodes. PMID:23242277

  19. A Mobile Asset Tracking System Architecture under Mobile-Stationary Co-Existing WSNs

    Directory of Open Access Journals (Sweden)

    Soon Ju Kang

    2012-12-01

    Full Text Available The tracking of multiple wireless mobile nodes is not easy with current legacy WSN technologies, due to their inherent technical complexity, especially when heavy traffic and frequent movement of mobile nodes are encountered. To enable mobile asset tracking under these legacy WSN systems, it is necessary to design a specific system architecture that can manage numerous mobile nodes attached to mobile assets. In this paper, we present a practical system architecture including a communication protocol, a three-tier network, and server-side middleware for mobile asset tracking in legacy WSNs consisting of mobile-stationary co-existing infrastructures, and we prove the functionality of this architecture through careful evaluation in a test bed. Evaluation was carried out in a microwave anechoic chamber as well as on a straight road near our office. We evaluated communication mobility performance between mobile and stationary nodes, location-awareness performance, system stability under numerous mobile node conditions, and the successful packet transfer rate according to the speed of the mobile nodes. The results indicate that the proposed architecture is sufficiently robust for application in realistic mobile asset tracking services that require a large number of mobile nodes.

  20. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  1. Pricing power outages in the Netherlands

    Energy Technology Data Exchange (ETDEWEB)

    Baarsma, Barbara E.; Hop, J. Peter [SEO Economic Research/University of Amsterdam, Amsterdam (Netherlands)

    2009-09-15

    In most Western countries, the power grid provides electricity more than 99% of the time. To maintain reliability at such high levels, energy companies have to continually invest in electric transmission- and distribution systems. Since customers of electricity cannot switch from one distribution network to another, no economic incentive exists that matches the supplied reliability to customer preferences. Either under- or over-investment in reliability may thus result. In order to introduce market-like incentives, the Dutch Energy Regulator introduced a regulatory system based on the (perceived) costs of power outages. An essential ingredient of the regulation is the cost of a power outage of a particular duration (i.e., 1 minute). This paper measures these outage cost by using conjoint analysis. We find that the social cost of the present Dutch level of reliability - that is, one outage of two hours every four years - is EUR2.80 on average for every household, and EUR33.10 on average for every SME firm. The total costs to Dutch society are almost EUR50 million. (author)

  2. Residential outage cost estimation: Hong Kong

    International Nuclear Information System (INIS)

    Woo, C.K.; Ho, T.; Shiu, A.; Cheng, Y.S.; Horowitz, I.; Wang, J.

    2014-01-01

    Hong Kong has almost perfect electricity reliability, the result of substantial investments ultimately financed by electricity consumers who may be willing to accept lower reliability in exchange for lower bills. But consumers with high outage costs are likely to reject the reliability reduction. Our ordered-logit regression analysis of the responses by 1876 households to a telephone survey conducted in June 2013 indicates that Hong Kong residents exhibit a statistically-significant preference for their existing service reliability and rate. Moreover, the average residential cost estimate for a 1-h outage is US$45 (HK$350), topping the estimates reported in 10 of the 11 studies published in the last 10 years. The policy implication is that absent additional compelling evidence, Hong Kong should not reduce its service reliability. - Highlights: • Use a contingent valuation survey to obtain residential preferences for reliability. • Use an ordered logit analysis to estimate Hong Kong's residential outage costs. • Find high outage cost estimates that imply high reliability requirements. • Conclude that sans new evidence, Hong Kong should not reduce its reliability

  3. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  4. Outage management: A case study

    International Nuclear Information System (INIS)

    Haber, S.B.; Barriere, M.T.; Roberts, K.H.

    1992-01-01

    Outage management issues identified from a field study conducted at a two-unit commercial pressurized water reactor (PWR), when one unit was in a refueling outage and the other unit was at full power operation, are the focus of this paper. The study was conduced as part of the US Nuclear Regulatory Commission's (NRC) organizational factors research program, and therefore the issues to be addressed are from an organizational perspective. Topics discussed refer to areas identified by the NRC as critical for safety during shutdown operations, including outage planning and control, personnel stress, and improvements in training and procedures. Specifically, issues in communication, management attention, involvement and oversight, administrative processes, organizational culture, and human resources relevant to each of the areas are highlighted by example from field data collection. Insights regarding future guidance in these areas are presented based upon additional data collection subsequent to the original study

  5. Development and demonstration of techniques for reducing occupational radiation doses during refueling outages. Tasks 7A/7B. Advanced outage management and radiation exposure control

    International Nuclear Information System (INIS)

    1985-03-01

    Objectives of Tasks 7A and 7B were to develop and demonstrate computer based systems to assist plant management and staff in utilizing information more effectively to reduce occupational exposures received as a result of refueling outages, and to shorten the duration of the outage. The Advanced Outage Management (AOM) Tool (Task 7A) is an automated outage planning system specifically designed to meet the needs of nuclear plant outage management. The primary objective of the AOM tool is to provide a computerized system that can manipulate the information typically associated with outage planning and scheduling to furnish reports and schedules that more accurately project the future course of the outage. The Radiation Exposure Control (REC) Tool (Task 7B) is a computerized personnel radiation exposure accounting and management system designed to enable nuclear plant management to project and monitor total personnel radiation exposure on a real-time basis. The two systems were designed to operate on the same computer system and interface through a common database that enables information sharing between plant organizations not typically interfaced. This interfacing provides outage planners with a means of incorporating occupational radiation exposure as a factor for making decisions on the course of an outage

  6. A framework and review of customer outage costs: Integration and analysis of electric utility outage cost surveys

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Leora; Sullivan, Michael; Van Liere, Kent; Katz, Aaron; Eto, Joseph

    2003-11-01

    A clear understanding of the monetary value that customers place on reliability and the factors that give rise to higher and lower values is an essential tool in determining investment in the grid. The recent National Transmission Grid Study recognizes the need for this information as one of growing importance for both public and private decision makers. In response, the U.S. Department of Energy has undertaken this study, as a first step toward addressing the current absence of consistent data needed to support better estimates of the economic value of electricity reliability. Twenty-four studies, conducted by eight electric utilities between 1989 and 2002 representing residential and commercial/industrial (small, medium and large) customer groups, were chosen for analysis. The studies cover virtually all of the Southeast, most of the western United States, including California, rural Washington and Oregon, and the Midwest south and east of Chicago. All variables were standardized to a consistent metric and dollar amounts were adjusted to the 2002 CPI. The data were then incorporated into a meta-database in which each outage scenario (e.g., the lost of electric service for one hour on a weekday summer afternoon) is treated as an independent case or record both to permit comparisons between outage characteristics and to increase the statistical power of analysis results. Unadjusted average outage costs and Tobit models that estimate customer damage functions are presented. The customer damage functions express customer outage costs for a given outage scenario and customer class as a function of location, time of day, consumption, and business type. One can use the damage functions to calculate outage costs for specific customer types. For example, using the customer damage functions, the cost experienced by an ''average'' customer resulting from a 1 hour summer afternoon outage is estimated to be approximately $3 for a residential customer, $1

  7. The process of NPP refuelling outage analysis and follow-up

    International Nuclear Information System (INIS)

    Nemec, T.; Savli, S.; Cernilogar Radez, M.; Persic, A.; Pecek, V.; Stritar, A.

    2007-01-01

    Following the outages in 2004 and 2006, the Slovenian Nuclear Safety Administration (SNSA) has started with the practice of independent outage analysis in a form of an internal report. It includes a comparison of performed activities against the planned time schedule of activities, evaluation of design modifications implementation and analysis of significant events. The main result of the outage analysis is a list of recommendations and some open issues that have been identified. These findings are the basis for development of an action plan for SNSA activities until the next outage, aimed at eliminating deficiencies found out during the outage and further improving outage activities. The established system of outage supervision together with the final analysis and long term action plan represents an effective continuous safety supervision process, by which the regulatory body independently contributes to the higher level of safety culture both at the licensee and among its own staff. (author)

  8. Extended layup of steam generators during a refurbishment outage

    International Nuclear Information System (INIS)

    Marks, C.R.; Little, M.D.; Slade, J.; Gendron, T.

    2009-01-01

    In May 2008, Point Lepreau Generating Station (PLGS), owned and operated by New Brunswick Power Nuclear (NBPN), entered an extended refurbishment outage initially expected to last approximately 18 months. NBPN had the two inter-related goals with respect to layup of the steam generators during this period: equipment preservation and inspection interval modification. The steam generators were to be preserved such that there was no loss of operating life due to corrosion of either the tubing (Alloy 800NG) or other internal components (with carbon steel being the limiting material with respect to corrosion). Additionally, NBPN desired that the time in layup not count as operating time in setting the schedule for future inspections. That is, a key goal of the steam generator layup is that the future inspection interval be based on operating time, not calendar time. The NBPN approach consists of the following four steps: A review of industry operating experience with long outages (including both PWRs and PHWRs); The development of technically based layup strategies and procedures; A mid-outage review of the implementation of the layup strategies and procedures; and A post-outage review to determine if the actual conditions in the steam generators will support modification of the inspection interval. This paper discusses the results of the first three of these steps. At this time, the plant is still in the refurbishment outage. Throughout the outage evaluation process, the following issues have been the main focus of the reviews: The potential for degradation (pitting and cracking) of steam generator tubes; The potential for general corrosion of carbon and low alloy steel internals; Oxidation of deposits (which could subsequently lead to oxidizing conditions during operation, possibly leading to tube degradation). This paper discusses the industry operating experience reviewed, the pre-outage assessments, and the mid-outage assessments. Current outage planning places the

  9. Outage and Capacity Performance Evaluation of Distributed MIMO Systems over a Composite Fading Channel

    Directory of Open Access Journals (Sweden)

    Wenjie Peng

    2014-01-01

    Full Text Available The exact closed-form expressions regarding the outage probability and capacity of distributed MIMO (DMIMO systems over a composite fading channel are derived. This is achieved firstly by using a lognormal approximation to a gamma-lognormal distribution when a mobile station (MS in the cell is in a fixed position, and the so-called maximum ratio transmission/selected combining (MRT-SC and selected transmission/maximum ratio combining (ST-MRC schemes are adopted in uplink and downlink, respectively. Then, based on a newly proposed nonuniform MS cell distribution model, which is more consistent with the MS cell hotspot distribution in an actual communication environment, the average outage probability and capacity formulas are further derived. Finally, the accuracy of the approximation method and the rationality of the corresponding theoretical analysis regarding the system performance are proven and illustrated by computer simulations.

  10. ALARA database value in future outage work planning and dose management

    International Nuclear Information System (INIS)

    Miller, D.W.; Green, W.H.

    1995-01-01

    ALARA database encompassing job-specific duration and man-rem plant specific information over three refueling outages represents an invaluable tool for the outage work planner and ALARA engineer. This paper describes dose-management trends emerging based on analysis of three refueling outages at Clinton Power Station. Conclusions reached based on hard data available from a relational database dose-tracking system is a valuable tool for planning of future outage work. The system's ability to identify key problem areas during a refueling outage is improving as more outage comparative data becomes available. Trends over a three outage period are identified in this paper in the categories of number and type of radiation work permits implemented, duration of jobs, projected vs. actual dose rates in work areas, and accuracy of outage person-rem projection. The value of the database in projecting 1 and 5 year station person-rem estimates is discussed

  11. ALARA database value in future outage work planning and dose management

    Energy Technology Data Exchange (ETDEWEB)

    Miller, D.W.; Green, W.H. [Clinton Power Station Illinois Power Co., IL (United States)

    1995-03-01

    ALARA database encompassing job-specific duration and man-rem plant specific information over three refueling outages represents an invaluable tool for the outage work planner and ALARA engineer. This paper describes dose-management trends emerging based on analysis of three refueling outages at Clinton Power Station. Conclusions reached based on hard data available from a relational database dose-tracking system is a valuable tool for planning of future outage work. The system`s ability to identify key problem areas during a refueling outage is improving as more outage comparative data becomes available. Trends over a three outage period are identified in this paper in the categories of number and type of radiation work permits implemented, duration of jobs, projected vs. actual dose rates in work areas, and accuracy of outage person-rem projection. The value of the database in projecting 1 and 5 year station person-rem estimates is discussed.

  12. Partnership - its contribution to outage success

    International Nuclear Information System (INIS)

    Gill, K.S.; Kirton-Darling, F.; Robinson, F.T.

    1996-01-01

    An innovative approach to developing the teamwork between the power station and the outage contractor has been pioneered over the past three years at the Bradwell nuclear power station in the UK, which houses two Magnox reactors. Magnox Electric and Rolls-Royce Nuclear Engineering Services are now undertaking their third outage under a partnership contract which has provided significant benefits to both parties. (Author)

  13. San Onofre - the evolution of outage management

    International Nuclear Information System (INIS)

    Slagle, K.A.

    1993-01-01

    With the addition of units 2 and 3 to San Onofre nuclear station in 1983 and 1984, it became evident that a separate group was needed to manage outages. Despite early establishment of a division to handle outages, it was a difficult journey to make the changes to achieve short outages. Early organizational emphasis was on developing an error-free operating environment and work culture. This is difficult for a relatively large organization at a three-unit site. The work processes and decision styles were designed to be very deliberate with many checks and balances. The organization leadership and accountability were focused in the traditional operations, maintenance, and engineering divisions. Later, our organization emphasis shifted to achieving engineering excellence. With a sound foundation of operating and engineering excellence, our organizational focus has turned to achieving quality outages. This means accomplishing the right work in a shorter duration and having the units run until the next refueling

  14. The status of the Hanaro class 4 power outage

    International Nuclear Information System (INIS)

    Hyungkyoo, K.; Hoansung, J.; Jongsup, W.

    2004-01-01

    Electric power is essential for all industrial plant. All who use electric power desire a perfect frequency, voltage stability, and reliability all the time. But this cannot be realized in practice because of the many causes of a power supply disturbance that are beyond the control of the utility. Since the first criticality of the Hanaro research reactor, the major reasons for reactor trips were system malfunctions and inexperienced operators in the initial stage of its operation. As Hanaro is stabilizing, the power supply outage becomes the major reason for a reactor trip. This paper describes the status of power supply outages. This paper deals with not only the outages which have an effect on Hanaro operation but also the reasons for the Hanaro class-4 power outages. The class-4 power is a commercial power which supplies the load centers and the large motors such as primary cooling pumps and secondary cooling pumps. Even if a class-4 power outage occurs, Hanaro is safe because of the reactor cooling by natural convection and the flywheel effect of the primary cooling pumps. The analysis of the characteristics and the trends of the outages can provide clues to how the outages can be minimized and what the impact of the outages are on the operation. For the site-wide class-4 power, the latest failure rate has been 2.36 per year and the mean time to repair is 23,78 minutes for the exponentially weighted mowing average. The unavailability of the Class-4 power is 1.5 10 -4

  15. Nuclear safety risk control in the outage of CANDU unit

    International Nuclear Information System (INIS)

    Wu Mingliang; Zheng Jianhua

    2014-01-01

    Nuclear fuel remains in the core during the outage of CANDU unit, but there are still nuclear safety risks such as reactor accidental criticality, fuel element failure due to inability to properly remove residual heat. Furthermore, these risks are aggravated by the weakening plant system configuration and multiple cross operations during the outage. This paper analyzes the phases where there are potential nuclear safety risks on the basis of the typical critical path arrangement of the outage of Qinshan NPP 3 and introduces a series of CANDU-specific risk control measures taken during the past plant outages to ensure nuclear safety during the unit outage. (authors)

  16. Outage time reduction in GKN II without loss of safety

    International Nuclear Information System (INIS)

    Sturm, J.

    1999-01-01

    GKN II is a 1340 MWE 4-loop pressurised water reactor from Siemens KONVOI type, located in the south of Germany. It was originally connected to the grid at the end of 1988. Commercial operation under utility responsibility started at the second half of 1989. The first outage was performed in 1990. Beginning from this date, the outage duration was contiguously reduced from 33 days to 15 days in 1996. In 1998, two refueling and maintenance outages were performed, each with a duration of 7 days. Key planning factors to achieve these results are: A well adapted planning organisation with an outage manager and an outage planning team. An effective long term planning. This means the combination of work with a long duration every 4 or 8 years. No longlasting work in the years in between. Main work only on one safety train per year. Optimisation and standardisation of the shutdown and the startup sequence. The real change of reactor states have been modified, compared to the vendor recommendations. An tests are assigned to plant conditions, where they are most effective and are less time critical. Small modifications in the plant, mainly on the auxiliary systems, to speedup some sequences. Extreme detailed planning of maintenance and periodic tests. Each work/test can be found in a detailed schedule with a dedicated time widow. Optimized tools to perform the detailed planning and to implement the feedback of experience from former outages. Optimized tools for maintenance and handlings of heavy equipment on the critical path. Optimized tools to perform periodic tests. Key factors during outage are: Permanent control of the schedules with an updated 3-day program. Best and permanent information with this 3-day program of all people that are involved. Fast reaction on delays. Outage managers permanent on site. Gain in safety during shutdown states, with reduced outage duration: It has to be proven, that short outages don't lead to faster and less accurate work. It can be

  17. Partnership - the heart of integrated outage management

    International Nuclear Information System (INIS)

    Robinson, F.T.

    1995-01-01

    Changes in the power generating industry continue apace. The effects of privatisation are widely visible: nowhere more so than in the growing national and international competition facing the generators around the world. A successful, long-term marriage between generator and contractor on power station outage management offers significant scope for cost reduction, shortening annual plant downtime and generating more megawatts, all within a safety environment of continuous improvement. Working in close partnership, Nuclear Electric and Rolls-Royce Nuclear Engineering Services have remodelled the whole contractor/client strategy. The new discipline, known as integrated outage management and partnering, is already producing shorter outage periods at Bradwell, a Magnox Station in Essex. (author)

  18. Evolution of an outage management organization in a small utility

    International Nuclear Information System (INIS)

    Oubre, R.P.; Shetler, J.

    1985-01-01

    Six refueling outages with a number of major equipment failure outages have taught Rancho Seco management three main items. One is that a dedicated management organization must be formed for the purpose of controlling work functions at Rancho Seco. This dedicated organization must have the experience of the plant and not have the responsibility for the actual maintenance. Second, upper management within a power plant must get directly involved in the outage. Upper management must show their presence, give input, and be available when needed. The third item learned is that the scheduling organization must be adequately staffed. Although Rancho Seco completed a refueling outage in 1978 within only 36 days, additional inspection requirements due to regulatory changes and/or previous equipment failures requiring follow-up actions would place the shortest possible outage today at approx.70 days. The only way an organization can keep this outage time down is with the proper scheduling of the resources and the timely coordination of activities to reduce conflicts

  19. Analysis of scrams and forced outages at boiling water reactors

    International Nuclear Information System (INIS)

    Earle, R.T.; Sullivan, W.P.; Miller, K.R.; Schwegman, W.J.

    1980-07-01

    This report documents the results of a study of scrams and forced outages at General Electric Boiling Water Reactors (BWRs) operating in the United States. This study was conducted for Sandia Laboratories under a Light Water Reactor Safety Program which it manages for the United States Department of Energy. Operating plant data were used to identify the causes of scrams and forced outages. Causes of scrams and forced outages have been summarized as a function of operating plant and plant age and also ranked according to the number of events per year, outage time per year, and outage time per event. From this ranking, identified potential improvement opportunities were evaluated to determine the associated benefits and impact on plant availability

  20. Maintenance, outages and chemistry really can be compatible

    International Nuclear Information System (INIS)

    Roberts, J.G.; Deaconescu, R.

    2006-01-01

    'Full text:' In their address to the Canadian Nuclear Society, Bruce Power's Chemistry Design staff will describe how maintenance and outages can impact negatively on chemistry control and asset protection. Considerations of material impacts and material condition have significant influences on the approach to, and control of, chemistry. This applies equally to operation as it does during unit and/or system outages. Ideas will be presented as to how to facilitate making maintenance, outages and chemistry compatible. It will be shown how the lack of such an approach can lead to disastrous results. (author)

  1. Evaluation of the Planned Outage Durations in EU-APR

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Byung Joon; Lee, Keun Sung [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    EU-APR has been designed to comply with European Utility Requirements (EUR) and nuclear design requirements of the European countries. And it is modified and improved from its original design of APR1400. The whole duration varies depending on items for additional process. Refueling and regular maintenance outage is comprised of basic processes and Main turbine-generator outage includes dismantling inspection of main generator and high pressure turbine as a critical path in addition to basic processes. In-Service Inspection Outage includes Automatic ultrasonic inspection on the upper side/lower side of a nuclear reactor as a critical path in addition to basic processes. The planned outage durations of EU-APR are optimized according to the above results. And they are complied with EUR Requirement (EUR 2.2.7.2.2 B), respectively. In addition, outage duration can be reduced with improved operating technology and more maintenance friendly environment including betterment of filling, drain and ventilation.

  2. Evaluation of the Planned Outage Durations in EU-APR

    International Nuclear Information System (INIS)

    Jung, Byung Joon; Lee, Keun Sung

    2016-01-01

    EU-APR has been designed to comply with European Utility Requirements (EUR) and nuclear design requirements of the European countries. And it is modified and improved from its original design of APR1400. The whole duration varies depending on items for additional process. Refueling and regular maintenance outage is comprised of basic processes and Main turbine-generator outage includes dismantling inspection of main generator and high pressure turbine as a critical path in addition to basic processes. In-Service Inspection Outage includes Automatic ultrasonic inspection on the upper side/lower side of a nuclear reactor as a critical path in addition to basic processes. The planned outage durations of EU-APR are optimized according to the above results. And they are complied with EUR Requirement (EUR 2.2.7.2.2 B), respectively. In addition, outage duration can be reduced with improved operating technology and more maintenance friendly environment including betterment of filling, drain and ventilation

  3. Improving refueling outages through partnership

    International Nuclear Information System (INIS)

    Mercado, Angelo L.

    2004-01-01

    This paper describes an approach to reduce nuclear plant outage duration and cost through partnership. Partnership is defined as a long-term commitment between the utility and the vendor with the objective of achieving shared business goals by maximizing the effectiveness of each party's resources. The elements of an effective partnership are described. Specific examples are given as to how partnership has worked in the effective performance of refueling outages. To gain the full benefits of a partnership, both parties must agree to share information, define the scope early, communicate goals and expectations, and identify boundaries for technical ownership. (author)

  4. Outages planning; Planificacion de recargas

    Energy Technology Data Exchange (ETDEWEB)

    Blanquer, N.

    2010-07-01

    The reason of a nuclear power plant outage seems easy. Replace 1/3 of the total core fuel inside reactor for a new, store the old one in a pool and shuffle the rest 2/3 in other positions in the core to optimize fuel burn up. Also is needed to make the preventive, corrective and conservative maintenance, the selected design changes and the regulatory and technical requirements for equipment and systems. To make the plant outage strategy for all the above pack with nuclear safety not challenged is the objective of this article for the Spanish Nuclear Society magazine. (Author)

  5. Outage management

    International Nuclear Information System (INIS)

    Anonymous

    2006-01-01

    Since constructing Japan's first PWR plant, Mihama Unit 1, MHI has been working to upgrade its technologies. The ongoing goal is to provide PWR nuclear power plants with levels of reliability, safety, economy operation and maintainability unparalleled in the world market. To fulfill its obligations and responsibility as an integrated plant manufacturer in the nuclear industry, MHI keeps a close eye on every facility, component, device and sub-component from the viewpoint of its customers. Backed by its rich experience and advanced technology, MHI continues to enhance the safety, reliability and economy of nuclear plants introducing improvements at every level. MHI continues to develop and improve diagnostic and inspection technologies based on its more than 30 years of experience in inspection and servicing the major and auxiliary facilities within nuclear power plants. MHI secures the integrity of components by developing and deploying technologies to minimize the wear of components and to repair and replace parts either degraded by age or unduly susceptible to wear. MHI backs its development of these technologies with its comprehensive technical capabilities in the design of remote operation equipment and electro mechanics as well as its expertise in basic technologies such as welding and machining. Mitsubishi Heavy Industries, Ltd. is not only a PWR plant constructor, but also offers complete outage support and component services. In partnership with our customers, MHI is helping to reduce outage duration, radiation exposure and costs, by providing its state of the art engineering knowledge, advanced non-destructive examination, inspection, maintenance and repair technologies mentioned above. MHI is performing large equipment refurbishment such as Steam Generator Replacement, Reactor Vessel Head Replacement, LP/HP turbine replacement, and recently completed the first Core Internal Replacement in the world. The following activities are part of the outage

  6. Maintenance, outages and chemistry really can be compatible

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, J.G.; Deaconescu, R. [Bruce Power, Tiverton, Ontario (Canada)

    2006-07-01

    'Full text:' In their address to the Canadian Nuclear Society, Bruce Power's Chemistry Design staff will describe how maintenance and outages can impact negatively on chemistry control and asset protection. Considerations of material impacts and material condition have significant influences on the approach to, and control of, chemistry. This applies equally to operation as it does during unit and/or system outages. Ideas will be presented as to how to facilitate making maintenance, outages and chemistry compatible. It will be shown how the lack of such an approach can lead to disastrous results. (author)

  7. Approach to shortening duration of nuclear plant refueling outage

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Yoshiharu; Nakanishi, Tooru [Mitsubishi Heavy Industries Ltd., Kobe (Japan). Kobe Shipyard and Machinery Works; Yoshihara, Seiichi; Kanbara, Masayuki; Yamanaka, Misao; Shimizu, Takeshi

    1998-07-01

    This paper summarizes the mission role of the MHI in-house project team for a shorter outage duration for PWR plants operating in Japan and its results. The major tasks of project team are benchmarking to develop outage performance goals, and develop recommendation packages for outage enhancement covering field procedures and tooling betterment. An optimization study for maintenance tasks was also carried out. This paper highlights the results of efforts the activities of the project team. (author)

  8. Elimination of maintenance outage and cost reduction by development of outage-free maintenance techniques

    International Nuclear Information System (INIS)

    Jakabe, Hideo; Maruyama, Yoshinaga

    1996-01-01

    The development program of KEPCO on outage-free maintenance techniques for distribution line work since 1984 is overviewed. It has succeeded in eliminating maintenance outages since 1989. The original aim was to improve customer satisfaction. However, in all, four benefits were realised through the development. These are cost reduction, securing of worker safety, improvement of customer service, and advancement of distribution techniques and morale in KEPCO. The introduction of robotic techniques for maintenance work and manipulator techniques for repair work is planned for further modernization. These new techniques are helping in both work safety and work efficiency improvement. Cost reduction and advancement of distribution line work techniques is also considered. (R.P.)

  9. On Outage Performance of Spectrum-Sharing Communication over M-Block Fading

    KAUST Repository

    Alabbasi, AbdulRahman

    2015-12-06

    In this paper, we consider a cognitive radio system in which a block-fading channel is assumed. Each transmission frame consists of M blocks and each block undergoes a different channel gain. Instantaneous channel state information about the interference links remains unknown to the primary and secondary users. We minimize the secondary user\\'s targeted outage probability over the block-fading channels. To protect the primary user, a statistical constraint on its targeted outage probability is enforced. The secondary user\\'s targeted outage region and the corresponding optimal power are derived. We also propose two sub-optimal power strategies and derive compact expressions for the corresponding outage probabilities. These probabilities are shown to be asymptotic lower and upper bounds on the outage probability. Utilizing these bounds, we derive the exact diversity order of the secondary user outage probability. Selected numerical results are presented to characterize the system\\'s behavior.

  10. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-11-01

    This single page document is the November 1, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the production reactor.

  11. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-10-01

    This single page document is the October 1, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the Production Reactor.

  12. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-10-15

    This single page document is the October 15, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the Production Reactor.

  13. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-09-15

    This single page document is the September 15, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the Production Reactor.

  14. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-12-15

    This single page document is the December 16, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the Production reactor.

  15. Reactor outage schedule (tentative)

    Energy Technology Data Exchange (ETDEWEB)

    Walton, R.P.

    1969-12-01

    This single page document is the December 1, 1969 reactor refueling outage schedule for the Hanford Production Reactor. It also contains data on the amounts and types of fuels to be loaded and relocated in the Production reactor.

  16. Integrated use of Primavera and ORAM codes in outage 1999 at NPP Krsko

    International Nuclear Information System (INIS)

    Krajnc, J.; Skaler, F.; Basic, I.; Kocnar, R.

    1999-01-01

    The paper deals with the following postulated main goals of outage scheduling with Primavera tool at Krsko NPP: planning and controlling of resources (people, equipment, locations, sources), controlling the safety aspects of an outage and assuring defense-in-depth philosophy (through integrated safety assessment by ORAM code), diversity use of the plan during preparations period and outage progress (MCB, work leaders, management, planning Dept., subcontractors, support, etc.), allowing for optimization of outage duration. A snapshot in Primavera of what actually happened in outage 1999, lessons learned and a new work template is the scope of the next year outage.(author)

  17. Line outage contingency analysis including the system islanding scenario

    Energy Technology Data Exchange (ETDEWEB)

    Hazarika, D.; Bhuyan, S. [Assam Engineering College, Jalukbari, Guwahati 781013 (India); Chowdhury, S.P. [Jadavpur University, Jadavpur, Kolkata 700 032 (India)

    2006-05-15

    The paper describes an algorithm for determining the line outage contingency of a line taking into account of line over load effect in remaining lines and subsequent tripping of over loaded line(s) leading to possible system split or islanding of a power system. The optimally ordered sparse [B'], [B'] matrices for the integrated system are used for load flow analysis to determine modified values of voltage phase angles [{delta}] and bus voltages [V] to determine the over loading effect on the remaining lines due to outage of a selected line outage contingency. In case of over loading in remaining line(s), the over loaded lines are removed from the system and a topology processor is used to find the islands. A fast decoupled load flow (FDLF) analysis is carried out for finding out the system variables for the islanded (or single island) system by incorporating appropriate modification in the [B'] and [B'] matrices of the integrated system. Line outage indices based on line overload, loss of load, loss of generation and static voltage stability are computed to indicate severity of a line outage of a selected line. (author)

  18. Good practices for outage management in nuclear power plants

    International Nuclear Information System (INIS)

    1991-09-01

    As a follow-up to an earlier Technical Document on Good Practices for Improved Nuclear Power Plant Performance (IAEA-TECDOC-498), the Agency has produced a more focused technical report on good practices associated with nuclear power plant outage planning and execution. As with the earlier document, the overall aim is that by identifying good practices in the key aspects of outage management, overall world nuclear performance will improve and the gap between excellent performers and operators with developing programmes will be narrowed. This document has been produced through the contribution of numerous operators and government agencies. It aims at minimizing text and focusing on actual good practices in use which can be found in the annexes. While the specific methods used to achieve excellence in maintenance/refuelling outages may differ, the fundamental requirements of outage management are discussed

  19. Saving doses by outage planning strategy and architectural arrangements

    International Nuclear Information System (INIS)

    Wahlstroem, B.

    1993-01-01

    All radiation doses come out as a result of dose rate and exposure time, and the main part of the occupational exposure is caused during outages. While every reasonable attempt should be made to lower the dose rates, the other factor, the exposure time, may not be forgotten. The paper presents possible ways of saving man-hours in the controlled zone by outage planning strategy. And every saved man-hour means a saved radiation dose. At Loviisa NPS also some special architectural arrangements contribute to shortening the outage time, thus saving doses

  20. Outage performance of cognitive radio systems with Improper Gaussian signaling

    KAUST Repository

    Amin, Osama

    2015-06-14

    Improper Gaussian signaling has proved its ability to improve the achievable rate of the systems that suffer from interference compared with proper Gaussian signaling. In this paper, we first study impact of improper Gaussian signaling on the performance of the cognitive radio system by analyzing the outage probability of both the primary user (PU) and the secondary user (SU). We derive exact expression of the SU outage probability and upper and lower bounds for the PU outage probability. Then, we design the SU signal by adjusting its transmitted power and the circularity coefficient to minimize the SU outage probability while maintaining a certain PU quality-of-service. Finally, we evaluate the proposed bounds and adaptive algorithms by numerical results.

  1. Long-term optimization of outage performance

    International Nuclear Information System (INIS)

    Huemmeler, Alexander; Jakobs, Norbert; Seifert, Siegfried

    2003-01-01

    Deregulation of the power markets and the accompanying pressure on electricity prices have forced all electric utilities to reduce their power generating costs in order to be able to hold their own in the new market environment. This has also particularly affected the operators of nuclear power plants since they have to compete against the lower power generating costs of fossil-fired combined-cycle power plants and, in Germany are faced with a difficult political climate. The areas identified as having the greatest cost-cutting potential were fuel costs, operating costs and measures to increase plant availability. The main objective behind increasing plant availability was not only to improve the already high standard of operational reliability and plant safety even further, but also to significantly shorten the downtime needed for annual refueling outages. A variety of measures aimed at shortening scheduled plant outages have thus been developed and successfully implemented by nuclear plant operators. At the same time, process improvements and new technologies have been introduced by the service providers. Both initiatives together have contributed towards substantially reducing outage time and cost. (author)

  2. Line outage contingency analysis including the system islanding ...

    African Journals Online (AJOL)

    The optimally ordered sparse [Bʹ], [Bʺ] matrices for the integrated system are used for load flow analysis to determine modified values of voltage phase angles [d] and bus voltages [V] to determine the over loading effect on the remaining lines due to outage of a selected line outage contingency. In case of over loading in ...

  3. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  4. Use of collaboration software to improve nuclear power plant outage management

    Energy Technology Data Exchange (ETDEWEB)

    Germain, Shawn

    2015-02-01

    Nuclear Power Plant (NPP) refueling outages create some of the most challenging activities the utilities face in both tracking and coordinating thousands of activities in a short period of time. Other challenges, including nuclear safety concerns arising from atypical system configurations and resource allocation issues, can create delays and schedule overruns, driving up outage costs. Today the majority of the outage communication is done using processes that do not take advantage of advances in modern technologies that enable enhanced communication, collaboration and information sharing. Some of the common practices include: runners that deliver paper-based requests for approval, radios, telephones, desktop computers, daily schedule printouts, and static whiteboards that are used to display information. Many gains have been made to reduce the challenges facing outage coordinators; however; new opportunities can be realized by utilizing modern technological advancements in communication and information tools that can enhance the collective situational awareness of plant personnel leading to improved decision-making. Ongoing research as part of the Light Water Reactor Sustainability Program (LWRS) has been targeting NPP outage improvement. As part of this research, various applications of collaborative software have been demonstrated through pilot project utility partnerships. Collaboration software can be utilized as part of the larger concept of Computer-Supported Cooperative Work (CSCW). Collaborative software can be used for emergent issue resolution, Outage Control Center (OCC) displays, and schedule monitoring. Use of collaboration software enables outage staff and subject matter experts (SMEs) to view and update critical outage information from any location on site or off.

  5. Assessing energy supply security: Outage costs in private households

    International Nuclear Information System (INIS)

    Praktiknjo, Aaron J.; Hähnel, Alexander; Erdmann, Georg

    2011-01-01

    The objective of this paper is to contribute to the topic of energy supply security by proposing a Monte Carlo-based and a survey based model to analyze the costs of power interruptions. Outage cost estimations are particularly important when deciding on investments to improve supply security (e.g. additional transmission lines) in order to compare costs to benefits. But also other policy decisions on measures that have direct or indirect consequences for the supply security (e.g. a phasing out of nuclear energy) need to be based on results from outage cost estimations. The main focus of this paper lies with residential consumers, but the model is applied to commercial, industrial and governmental consumers as well. There are limited studies that have approached the problem of evaluating outage cost. When comparing the results of these studies, they often display a high degree of diversification. As consumers have different needs and dependencies towards the supply of electricity because of varying circumstances and preferences, a great diversity in outage cost is a logical consequence. To take the high degree of uncertainties into account, a Monte Carlo simulation was conducted in this study for the case of private households in Germany. - Highlights: ► A macroeconomic model to assess outage cost is proposed. ► Possibilities for substitution are considered by analyzing individual preferences for the time-use. ► Uncertainties are taken into account by using a Monte Carlo simulation. ► This study reveals the distribution of outage costs to different electricity consumers. ► Implications for energy policy decisions are discussed.

  6. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hina Nasir

    2016-07-01

    Full Text Available This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs; performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE efficient depth based routing and Enhanced-ACE (E-ACE are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ. E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment.

  7. ANALISIS TRANSFER RATE PENAMBAHAN NODE PADA INFRASTRUKTUR MOBILE ADHOC NETWORK (MANET UNTUK FILE SERVER

    Directory of Open Access Journals (Sweden)

    Rudi Kurniawan

    2017-05-01

    Full Text Available Teknologi Wireless Network sudah lama ditemukan dan seiring waktu juga mengalami perkembangan, Namun sifat teknologi ini menggantungkan diri pada infrastruktur jaringan yang ada. Hal ini bias menjadi kelemahan tersendiri saat kondisi infrastruktur jaringan sedang mengalami gangguan, karena setiap komunikasi yang melewati infrastruktur jaringan tersebut tidak akan sampai pada tujuan. Teknologi jaringan Mobile Ad-hoc Network (MANET diciptakan sebagai antisipasi jika infrastruktur jaringan sedang mengalami gangguan. Dengan jaringan MANET sistem komunikasi yang dilakukan tidak membutuhkan infrastruktur jaringan karena tiap node pada jaringan tersebut bersifat mobile. Untuk menguji kemampuan MANET, pada penelitian ini akan menerapkan File Transfer Protocol (FTP sebagai media untuk melakukan komunikasi data file transfer yang diimplementasi pada jaringan MANET. Dari pengujian yang telah dilakukan diperoleh hasil bahwa File Transfer dapat berfungsi dengan baik saat diterapkan pada jaringan MANET.

  8. Balance-of-plant outage availability study. Phase I. Extension report

    International Nuclear Information System (INIS)

    Thomasson, F.R.

    1978-09-01

    After completion of the Phase 1 Refueling Outage Availability Study, Babcock and Wilcox and the U.S. Department of Energy entered into a supplemental agreement to perform a balance-of-plant maintenance, inspection, and test study with the cooperation of Duke Power Company and Arkansas Power and Light Company. The objectives were (1) to expand the Phase 1 data base, including balance-of-plant activities, to reduce outage time and increase plant availability and (2) to conduct an onsite review of plant maintenance, practices to complement the utility efforts in reducing outage time and increasing on-line operational time. Data were obtained from (1) observations during the 1977 refueling outage at Oconee 3, (2) review of maintenance practices during the Arkansas Nuclear One, Unit 1, operational cycle in 1977, and (3) selected observations of the 1978 refueling outage at ANO-1. Accumulated data were then reviewed and analyzed to produce a list of improvement recommendations for Oconee 3 and ANO-1 that can be generically applied to plants of similar design and construction

  9. Underlay Cognitive Radio Systems with Improper Gaussian Signaling: Outage Performance Analysis

    KAUST Repository

    Amin, Osama

    2016-03-29

    Improper Gaussian signaling has the ability over proper (conventional) Gaussian signaling to improve the achievable rate of systems that suffer from interference. In this paper, we study the impact of using improper Gaussian signaling on the performance limits of the underlay cognitive radio system by analyzing the achievable outage probability of both the primary user (PU) and secondary user (SU). We derive the exact outage probability expression of the SU and construct upper and lower bounds of the PU outage probability which results in formulating an approximate expression of the PU outage probability. This allows us to design the SU signal by adjusting its transmitted power and the circularity coefficient to minimize the SU outage probability while maintaining a certain PU quality-of-service. Finally, we evaluate the derived expressions for both the SU and the PU and the corresponding adaptive algorithms by numerical results.

  10. Underlay Cognitive Radio Systems with Improper Gaussian Signaling: Outage Performance Analysis

    KAUST Repository

    Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    Improper Gaussian signaling has the ability over proper (conventional) Gaussian signaling to improve the achievable rate of systems that suffer from interference. In this paper, we study the impact of using improper Gaussian signaling on the performance limits of the underlay cognitive radio system by analyzing the achievable outage probability of both the primary user (PU) and secondary user (SU). We derive the exact outage probability expression of the SU and construct upper and lower bounds of the PU outage probability which results in formulating an approximate expression of the PU outage probability. This allows us to design the SU signal by adjusting its transmitted power and the circularity coefficient to minimize the SU outage probability while maintaining a certain PU quality-of-service. Finally, we evaluate the derived expressions for both the SU and the PU and the corresponding adaptive algorithms by numerical results.

  11. Planning and management of outages in nuclear power plants

    International Nuclear Information System (INIS)

    Sica, G.F.; Fusari, W.; Reginelli, A.

    1984-01-01

    At present the Ente Nazionale per l'Energia Elettrica (ENEL) operates three nuclear power plants, only one of which belongs to the new generation, i.e. the Caorso Nuclear Power Plant which has been in commercial operation since December 1981. Outage planning, implementation and analysis are very important in order to minimize the shutdown time and thus improve plant availability, which is of particular importance for a large nuclear power plant. Such activities are very complicated because of the large number of jobs that have to be performed in accordance with detailed written procedures and which have to be properly documented and controlled. Large off-site resources are required which have to be accurately interfaced with on-site staff. The ENEL is making a great effort to define both the administrative and technical aspects of refuelling outages. As outage planning requires the availability and handling of a large amount of data and information, a maintenance information system that has been widely used in conventional plants was applied, with some modifications made especially for the Caorso Nuclear Power Plant. After two years the following results have been achieved: a large number of raw and processed data are now available, the first refuelling outage was carried out with few problems and according to schedule, and the second refuelling outage, based on the experience of the first, required somewhat less preparation and is developing well even though many special activities have had to be scheduled. The ENEL believes that the efforts made in the planning and management areas will pay off in terms of the short duration, smoothness and economy of further outages, both for Caorso and for future plants. (author)

  12. Estimating Power Outage Cost based on a Survey for Industrial Customers

    Science.gov (United States)

    Yoshida, Yoshikuni; Matsuhashi, Ryuji

    A survey was conducted on power outage cost for industrial customers. 5139 factories, which are designated energy management factories in Japan, answered their power consumption and the loss of production value due to the power outage in an hour in summer weekday. The median of unit cost of power outage of whole sectors is estimated as 672 yen/kWh. The sector of services for amusement and hobbies and the sector of manufacture of information and communication electronics equipment relatively have higher unit cost of power outage. Direct damage cost from power outage in whole sectors reaches 77 billion yen. Then utilizing input-output analysis, we estimated indirect damage cost that is caused by the repercussion of production halt. Indirect damage cost in whole sectors reaches 91 billion yen. The sector of wholesale and retail trade has the largest direct damage cost. The sector of manufacture of transportation equipment has the largest indirect damage cost.

  13. Reliabilty worth: Development of a relationship with outage magnitude, duration and frequency

    International Nuclear Information System (INIS)

    Turner, F.P.P.; Katrichak, A.M.; Dwyer, A.; Edwards, D.; Ibrahim, A.

    1994-01-01

    British Columbia Hydro's Worth Project Team was founded to determine values for reliability for reference in evaluation of investment and operating decisions. Work to date has produced key preliminary values for specific outages and concepts for the shape of the relationship between value and these determinates of reliability worth, frequency, magnitude and duration. These values and concepts are described. The values are developed through an iterative, trial and refinement approach. The approach incorporates direct input from customers, common sense and judgement, and micro- and macro-economic concepts. Reliability worth values for reduced or prevented outages are presented for residential, commercial, small industrial and mixed sectors and various outage durations. Reliability worth values were obtained through customer surveys. Limitations of the reliability worth value are numerous and are listed. Study of cost vs magnitude of interruption using microeconomic models has shown that costly system improvements to reduce the possibility of widespread outages may not be justified. The case of exceptionally large area outages (blackouts) is examined. The cost vs frequency relationship was examined in terms of the economic concept of utility or satisfaction. Different loss/frequency characteristics are demonstrated for different customer classes. Customer value for reduced outage duration is expressed in a curve with flatter slope than that for eliminated outages. 2 refs., 6 figs

  14. The Role of Occupational Health and Safety in Complex Outage Services to NPPs

    International Nuclear Information System (INIS)

    Rozman, A.; Androjna, A.

    2010-01-01

    Meeting outage schedules in NPPs which are increasingly demanding, apart from all other aspects, introduces a new perspective on occupational health and safety (OHS). Not only is the OHS a constituent part of a plant's overall outage management, it above all dictates paramount objectives to outage service providers. The paper reviews the impacts of reductions of outage durations on OHS and presents related experience of the leading Slovenian outage services provider, NUMIP d.o.o. over the last ten years. The company is now getting prepared for its 12th outage at Krsko NPP in 2010, and has not have recorded a major injury so far, even though these projects engaged over 450 people at a time on-site. To achieve such results, a lot of emphasis is being put onto OHS management prior to and during outages. A certified OHSAS 18001 system has been established and implemented to further support preparation and execution of NUMIP's outage activities at Krsko NPP, and also for other projects. An effective continuous improvement system is built into the project, providing for implementation of lessons learned from domestic and foreign plants. To illustrate the topic in more detail, a case on a Seismic protection of polar crane project is presented. It took place in the 2009 Outage and has certainly been one of the most demanding projects from the OHS point of view for NUMIP so far. The paper aims at contributing to a better understanding of the role of effective management of OHS on the side of a service provider, and, consequently, in the overall outage success of a plant.(author).

  15. Outage Risk Assessment and Management (ORAM) thermal-hydraulics toolkit

    International Nuclear Information System (INIS)

    Denny, V.E.; Wassel, A.T.; Issacci, F.; Pal Kalra, S.

    2004-01-01

    A PC-based thermal-hydraulic toolkit for use in support of outage optimization, management and risk assessment has been developed. This mechanistic toolkit incorporates simple models of key thermal-hydraulic processes which occur during an outage, such as recovery from or mitigation of outage upsets; this includes heat-up of water pools following loss of shutdown cooling, inadvertent drain down of the RCS, boiloff of coolant inventory, heatup of the uncovered core, and reflux cooling. This paper provides a list of key toolkit elements, briefly describes the technical basis and presents illustrative results for RCS transient behavior during reflux cooling, peak clad temperatures for an uncovered core and RCS response to loss of shutdown cooling. (author)

  16. Activities of maintenance and outage

    International Nuclear Information System (INIS)

    Gracia-Orellan, J. M.; Gonzalez, P. L.; Verdu, M. F.; Fernandez, J. A.

    2004-01-01

    Iberinco Nuclear Generation Department have wanted to promote service activities in nuclear power plants for years besides its dedication to engineering activities. for it, in 1997 Nuclear Services Management was created to complement engineering activities and to be able to make an offer for products and turn key services. People involved in this Management have an extensive experience in Services Area, so that all type of maintenance works are promoted, as well other services like dismantling, fallout management and new equipment's for nuclear power plants services. Iberinco's experience in Support Services in Nuclear Power Plants allows to answer effectively to special workers during operation cycle and outages periods. These activities have been made in spanish nuclear power plants and Angra I and II plants, both of them in Brazil. In this area we provide Technical Consulting Management and Supervision to develop the following activities: - Improvement Maintenance Programs based in PSA: Implantation of Maintenance Rule in the plants. - Supervision and Assembly of design modifications in structures, systems and components. - Fulfilment of efficiency tests, inspection and turbo-group modification. - Noise and vibrations analysis. - Valves and rotative equipment calculations and diagnosis tests. Iberinco develop these outage activities itself or as contractors coordinator under its management. A lot of them have been working with Iberinco for many years and have a great experience in the Service Area they are developing. In this article, the main outage activities developed for Iberinco are detailed. (Author)

  17. Seamless handoff in Mobile IP

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert; El Malki, Karim; Soliman, Hesham

    2001-01-01

    In a system and method for handing off a mobile node in a seamless manner in a wireless access network, procedures are implemented for allowing the mobile node to synchronize the handoff with a base node (e.g., a home agent) and a correspondent node. In this way, a seamless handoff may be achieved,

  18. Balance-of-plant outage availability study. Phase I. Extension report. [PWR

    Energy Technology Data Exchange (ETDEWEB)

    Thomasson, F.R.

    1978-09-01

    After completion of the Phase 1 Refueling Outage Availability Study, Babcock and Wilcox and the U.S. Department of Energy entered into a supplemental agreement to perform a balance-of-plant maintenance, inspection, and test study with the cooperation of Duke Power Company and Arkansas Power and Light Company. The objectives were (1) to expand the Phase 1 data base, including balance-of-plant activities, to reduce outage time and increase plant availability and (2) to conduct an onsite review of plant maintenance, practices to complement the utility efforts in reducing outage time and increasing on-line operational time. Data were obtained from (1) observations during the 1977 refueling outage at Oconee 3, (2) review of maintenance practices during the Arkansas Nuclear One, Unit 1, operational cycle in 1977, and (3) selected observations of the 1978 refueling outage at ANO-1. Accumulated data were then reviewed and analyzed to produce a list of improvement recommendations for Oconee 3 and ANO-1 that can be generically applied to plants of similar design and construction.

  19. Seasonal and Local Characteristics of Lightning Outages of Power Distribution Lines in Hokuriku Area

    Science.gov (United States)

    Sugimoto, Hitoshi; Shimasaki, Katsuhiko

    The proportion of the lightning outages in all outages on Japanese 6.6kV distribution lines is high with approximately 20 percent, and then lightning protections are very important for supply reliability of 6.6kV lines. It is effective for the lightning performance to apply countermeasures in order of the area where a large number of the lightning outages occur. Winter lightning occurs in Hokuriku area, therefore it is also important to understand the seasonal characteristics of the lightning outages. In summer 70 percent of the lightning outages on distribution lines in Hokuriku area were due to sparkover, such as power wire breakings and failures of pole-mounted transformers. However, in winter almost half of lightning-damaged equipments were surge arrester failures. The number of the lightning outages per lightning strokes detected by the lightning location system (LLS) in winter was 4.4 times larger than that in summer. The authors have presumed the occurrence of lightning outages from lightning stroke density, 50% value of lightning current and installation rate of lightning protection equipments and overhead ground wire by multiple regression analysis. The presumed results suggest the local difference in the lightning outages.

  20. Estimating the Propagation of Interdependent Cascading Outages with Multi-Type Branching Processes

    Energy Technology Data Exchange (ETDEWEB)

    Qi, Junjian; Ju, Wenyun; Sun, Kai

    2016-01-01

    In this paper, the multi-type branching process is applied to describe the statistics and interdependencies of line outages, the load shed, and isolated buses. The offspring mean matrix of the multi-type branching process is estimated by the Expectation Maximization (EM) algorithm and can quantify the extent of outage propagation. The joint distribution of two types of outages is estimated by the multi-type branching process via the Lagrange-Good inversion. The proposed model is tested with data generated by the AC OPA cascading simulations on the IEEE 118-bus system. The largest eigenvalues of the offspring mean matrix indicate that the system is closer to criticality when considering the interdependence of different types of outages. Compared with empirically estimating the joint distribution of the total outages, good estimate is obtained by using the multitype branching process with a much smaller number of cascades, thus greatly improving the efficiency. It is shown that the multitype branching process can effectively predict the distribution of the load shed and isolated buses and their conditional largest possible total outages even when there are no data of them.

  1. Questions and perceptions about nuclear power plant outages

    International Nuclear Information System (INIS)

    Mc Donald, R.P.

    1985-01-01

    The most commonly used measure of nuclear power plant productivity is ''availability'' which is usually construed to be the percentage of time in a given period that a nuclear unit is actually tied to a grid supplying electrical power. When a unit is not tied to a grid, it is in an ''outage'' condition, possibly being shutdown, refueled, repaired, or in some stage of startup. There are some very positive by-products of well performed outages in addition to cost and availability enhancements: almost all supervisory and engineering personnel participate in planning and preparations. This approach promotes the professional and leadership development of each person, the supervisors and engineers participate in a competitive venture as a team and enjoy and benefit from comparative interactions with other utilities, perhaps the greatest benefit reaped from the development of outage management expertise is the improved ability to handle unexpected plant problems

  2. World class performance: the outage/operating cycle continuum

    Energy Technology Data Exchange (ETDEWEB)

    Remphal, M. [Ontario Power Generation, Darlington, Ontario (Canada)

    2011-07-01

    It's all about Performance! Predictable and sustainable high performance is the key to public and stakeholder confidence in the nuclear industry. Why? Because nuclear is unique and safe, reliable operation each and every day is required to keep public trust. What better way to demonstrate this predictability than in breaker to breaker operating runs? Delivering on what was promised is the essence of our OPG accountability model: 'Say it, Do it'. This presentation is drawn from practical experience gained during the most recent planned maintenance outages at Darlington Nuclear. Key elements for outage success that will be discussed include; Human Performance: Ensuring each action is deliberate and executed right the first time; Continuous Learning: Recent examples demonstrating how drawing from lessons learned and operating experience worldwide can dramatically improve outage performance; Teamwork and Partnership: Recognizing our industry is too complex for a single; individual or organization to run on its own; Scope Selection: Darlington currently has an industry leading 0.5% Forced Loss Rate (FLR). If right work is selected and executed at the right time then ultimately the plant speaks and it shows up in low FLR and high Nuclear Performance Index; Planning: Ask and anticipate what can go wrong, what options exist and then pre-decide what path you would take. Some practical tools will be provided which have been recently used to plan out surprises; Oversight: An outage left to run its own course will have a surprise outcome. Strong management oversight is required to meet the goals of outage execution. Tips on how to improve communication and accountability will be discussed. Trust is built on confidence and confidence is built on sustainable performance. World class sustainable performance requires using all the tools available. This discussion will provide insight on these very tools. (author)

  3. World class performance: the outage/operating cycle continuum

    International Nuclear Information System (INIS)

    Remphal, M.

    2011-01-01

    It's all about Performance! Predictable and sustainable high performance is the key to public and stakeholder confidence in the nuclear industry. Why? Because nuclear is unique and safe, reliable operation each and every day is required to keep public trust. What better way to demonstrate this predictability than in breaker to breaker operating runs? Delivering on what was promised is the essence of our OPG accountability model: 'Say it, Do it'. This presentation is drawn from practical experience gained during the most recent planned maintenance outages at Darlington Nuclear. Key elements for outage success that will be discussed include; Human Performance: Ensuring each action is deliberate and executed right the first time; Continuous Learning: Recent examples demonstrating how drawing from lessons learned and operating experience worldwide can dramatically improve outage performance; Teamwork and Partnership: Recognizing our industry is too complex for a single; individual or organization to run on its own; Scope Selection: Darlington currently has an industry leading 0.5% Forced Loss Rate (FLR). If right work is selected and executed at the right time then ultimately the plant speaks and it shows up in low FLR and high Nuclear Performance Index; Planning: Ask and anticipate what can go wrong, what options exist and then pre-decide what path you would take. Some practical tools will be provided which have been recently used to plan out surprises; Oversight: An outage left to run its own course will have a surprise outcome. Strong management oversight is required to meet the goals of outage execution. Tips on how to improve communication and accountability will be discussed. Trust is built on confidence and confidence is built on sustainable performance. World class sustainable performance requires using all the tools available. This discussion will provide insight on these very tools. (author)

  4. The role of mobile phones in facilitating communication among the ...

    African Journals Online (AJOL)

    It was also revealed that mobile phones are used for communicating with friends, family and veterinarians in carrying out financial transactions, finding out livestock prices in the market and information on new grazing areas. The constraints encountered in the use of mobile phones include network outage, high cost of ...

  5. Excellence through outage planning and scheduling

    International Nuclear Information System (INIS)

    Ferriole, G.

    1987-01-01

    The Nuclear and Fossil Generation Division of Electricite de France (EdF) has been the largest nuclear plant operating utility in France since 1984. The size of the units, their standardization, and extensive operating experience were favorable parameters leading to the development of a very complete maintenance organization. Electricite de France believes in the importance of well-defined maintenance concepts. These maintenance concepts contribute to outage performance by requiring a careful consideration of work to be done and by defining the techniques and means of accomplishing this work. In addition to maintenance concepts and careful planning and scheduling, good outage management is achieved through the motivation and dedication of the people involved. It is the key to good operational results

  6. Verification and Enhancement of VIIRS Day-Night Band Power Outage Detection Product

    Science.gov (United States)

    Burke, A.; Schultz, L. A.; Omitaomu, O.; Molthan, A.; Cole, T.; Griffin, R.

    2017-12-01

    The NASA SPoRT (Short-term Prediction Research and Transition) Center has collaborated with scientists at NASA Goddard Space Flight Center to create a power outage detection product from radiance data obtained by the VIIRS (Visible Infrared Imaging Radiometer Suite) sensor aboard the Suomi-NPP satellite. This product uses a composite of pre-event radiance values from the VIIRS Day-Night Band to establish a baseline of "normal" nighttime lights for a study area. Then, after a severe weather event or other disaster, post-event images are compared to the composite to generate a percent-of-normal radiance product to identify areas that are experiencing outages and to aid in disaster response and monitor recovery. This project will use ground-truth county-level outage data provided by Oak Ridge National Laboratory (ORNL) in order validate the product and to establish a percent-of-normal threshold for identifying power outages. Once a threshold is found, ORNL's LandScan Global population data will be combined with the product to estimate how many electrical customers are being affected by power outages after a disaster. Two case studies will be explored to examine power outage recovery after severe weather events, including Hurricane Matthew from 2016 and the Washington D.C. Derecho event of 2012.

  7. Status Report on the Development of Micro-Scheduling Software for the Advanced Outage Control Center Project

    Energy Technology Data Exchange (ETDEWEB)

    Germain, Shawn St. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Thomas, Kenneth [Idaho National Lab. (INL), Idaho Falls, ID (United States); Farris, Ronald [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    The long-term viability of existing nuclear power plants (NPPs) in the United States (U.S.) is dependent upon a number of factors, including maintaining high capacity factors, maintaining nuclear safety, and reducing operating costs, particularly those associated with refueling outages. Refueling outages typically take 20-30 days, and for existing light water NPPs in the U.S., the reactor cannot be in operation during the outage. Furthermore, given that many NPPs generate between $1-1.5 million/day in revenue when in operation, there is considerable interest in shortening the length of refueling outages. Yet, refueling outages are highly complex operations, involving multiple concurrent and dependent activities that are difficult to coordinate. Finding ways to improve refueling outage performance while maintaining nuclear safety has proven to be difficult. The Advanced Outage Control Center project is a research and development (R&D) demonstration activity under the Light Water Reactor Sustainability (LWRS) Program. LWRS is a R&D program which works with industry R&D programs to establish technical foundations for the licensing and managing of long-term, safe, and economical operation of current NPPs. The Advanced Outage Control Center project has the goal of improving the management of commercial NPP refueling outages. To accomplish this goal, this INL R&D project is developing an advanced outage control center (OCC) that is specifically designed to maximize the usefulness of communication and collaboration technologies for outage coordination and problem resolution activities. This report describes specific recent efforts to develop a capability called outage Micro-Scheduling. Micro-Scheduling is the ability to allocate and schedule outage support task resources on a sub-hour basis. Micro-Scheduling is the real-time fine-tuning of the outage schedule to react to the actual progress of the primary outage activities to ensure that support task resources are

  8. Trust Based Algorithm for Candidate Node Selection in Hybrid MANET-DTN

    Directory of Open Access Journals (Sweden)

    Jan Papaj

    2014-01-01

    Full Text Available The hybrid MANET - DTN is a mobile network that enables transport of the data between groups of the disconnected mobile nodes. The network provides benefits of the Mobile Ad-Hoc Networks (MANET and Delay Tolerant Network (DTN. The main problem of the MANET occurs if the communication path is broken or disconnected for some short time period. On the other side, DTN allows sending data in the disconnected environment with respect to higher tolerance to delay. Hybrid MANET - DTN provides optimal solution for emergency situation in order to transport information. Moreover, the security is the critical factor because the data are transported by mobile devices. In this paper, we investigate the issue of secure candidate node selection for transportation of the data in a disconnected environment for hybrid MANET- DTN. To achieve the secure selection of the reliable mobile nodes, the trust algorithm is introduced. The algorithm enables select reliable nodes based on collecting routing information. This algorithm is implemented to the simulator OPNET modeler.

  9. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.

    Science.gov (United States)

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  10. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Seung-Wha Yoo

    2009-07-01

    Full Text Available Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob, which employs Mobility Support Points (MSPs to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  11. Options for shortening nuclear power plant refueling outages

    International Nuclear Information System (INIS)

    Kastl, H.

    2001-01-01

    Deregulation of the European electricity market on 01.01.1999 forced a large number of electric utilities- especially nuclear power plant operators - to find ways of drastically cutting down their costs in order to be able to compete successfully within the new market environment. Nuclear power plants currently in operation mainly have three potential ways of reducing their power generating costs: by increasing plant availability, reducing fuel costs and cutting down operating costs. The optimization of plant refueling outages offers considerable potential for enhancing plant availability, but also helps bring down operating costs by reducing expenditure on maintenance. In order to optimize an outage in terms of its duration and costs, a variety of approaches are possible - all of which, however, involve certain key factors such as good organization, planning, logistics and control, improvement of equipment and tools, as well as motivation of personnel. Another aspect is the introduction of innovative technologies. In the last few years, such technologies have frequently enabled maintenance effort to be reduced, thus saving considerable time, and have also resulted in a need for fewer personnel to carry out the work, thus reducing radiation exposure. In many instances they have also improved the quality of work and outage performance as a whole. The paper uses recent examples to show how innovative technologies can contribute to-wards reducing nuclear plant maintenance costs and shorten the duration of refueling out-ages. (author)

  12. Mobile Router Developed and Tested

    Science.gov (United States)

    Ivancic, William D.

    2002-01-01

    The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP

  13. Does Your Domestic Photovoltaic Energy System Survive Grid Outages?

    Directory of Open Access Journals (Sweden)

    Marijn R. Jongerden

    2016-09-01

    Full Text Available Domestic renewable energy systems, including photovoltaic energy generation, as well as local storage, are becoming increasingly popular and economically feasible, but do come with a wide range of options. Hence, it can be difficult to match their specification to specific customer’s needs. Next to the usage-specific demand profiles and location-specific production profiles, local energy storage through the use of batteries is becoming increasingly important, since it allows one to balance variations in production and demand, either locally or via the grid. Moreover, local storage can also help to ensure a continuous energy supply in the presence of grid outages, at least for a while. Hybrid Petri net (HPN models allow one to analyze the effect of different battery management strategies on the continuity of such energy systems in the case of grid outages. The current paper focuses on one of these strategies, the so-called smart strategy, that reserves a certain percentage of the battery capacity to be only used in case of grid outages. Additionally, we introduce a new strategy that makes better use of the reserved backup capacity, by reducing the demand in the presence of a grid outage through a prioritization mechanism. This new strategy, called power-save, only allows the essential (high-priority demand to draw from the battery during power outages. We show that this new strategy outperforms previously-proposed strategies through a careful analysis of a number of scenarios and for a selection of survivability measures, such as minimum survivability per day, number of survivable hours per day, minimum survivability per year and various survivability quantiles.

  14. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  15. Practice of fuel management and outage strategy at Paks NPP

    International Nuclear Information System (INIS)

    Farago, P.; Hamvas, I.; Szecsenyi, Zs.; Nemes, I.; Javor, E.

    2000-01-01

    The Paks Nuclear Power Plant generates almost 40% of Hungarian electricity production at lowest price. In spite of this fact the reduction of operational and maintenance costs is one of the most important goal of the plant management. The proper fuel management and outage strategy can give a considerable influence for this cost reduction. The aim of loading pattern planning is to get the required cycle length with available fuel cassettes and to keep all key parameters of safety analysis under safety limits. Another important point is production at profit, where both the fuel and spent fuel cost are determining. Earlier the conditions given by our only fuel supplier restricted our possibilities, so at the beginning the fuel arrangement changing was the only way to improve efficiency of fuel using. As first step we introduced the low leakage core design. The next step was the 4 years cycle using of some cassettes. By this way nearly half of 3 years cycle old cassettes remained in the core for fourth cycle. In the immediate future we want to use profiled cassettes developed by Russian supplier. Simultaneously we will load new type of WWER cassettes with burnable poison developed by BNFL Company. Hereby we can apply more BNFL cassettes for four years cycle even more. Both cost of fuel and number of spent fuel can be reduced besides keeping parameters under safety limits. The Hungarian in service inspection rules determine that every four year we have to make a complete inspection of reactor vessel. Therefore earlier we had two types of outages. Every 4 years we planned a long outage with 55-65 days duration and normal ones with about 30-35 days duration between the long ones. During the normal outages this way did not give us enough room to utilise the shortest possible critical path determined by works on reactor. Some years ago we changed our outage strategy. Now we plan every 4 years a long outage, and between them one normal and two short ones. As a result the

  16. Impacts of organization and management on outage performance

    International Nuclear Information System (INIS)

    Huang Yuhao; Cheng, S.-K.

    2004-01-01

    From probabilistic safety assessments and root cause analyses for incidents/accidents, the risk at refueling outage has recently been recognized to be comparable to (or even more significant than) the commonly evaluated risk at power in a Nuclear Power Plant (NPP). This paper summarizes the major findings in the aspect of 'organization and management', which is identified to have significant impacts on outage performance in the qualitative assessment of a PWR plant. In order to reduce the potential risk arisen from those identified imperfections, the corresponding suggestions are also proposed. (author)

  17. Development of an Overview Display to Allow Advanced Outage Control Center Management to Quickly Evaluate Outage Status

    Energy Technology Data Exchange (ETDEWEB)

    St Germain, Shawn Walter [Idaho National Lab. (INL), Idaho Falls, ID (United States); Hugo, Jacques Victor [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    This report describes recent advances made in developing a framework for the design of visual outage information presentation, as well as an overview of the scientific principles that informed the development of the visualizations.

  18. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  19. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements.

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-09-15

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period.

  20. Exponential Reliability Coefficient based Reputation Mechanism for isolating selfish nodes in MANETs

    Directory of Open Access Journals (Sweden)

    J. Sengathir

    2015-07-01

    Full Text Available In mobile ad hoc networks, cooperation among active mobile nodes is considered to play a vital role in reliable transmission of data. But, the selfish mobile nodes present in an ad hoc environment refuse to forward neighbouring nodes’ packet for conserving its own energy. This intentional selfish behaviour drastically reduces the degree of cooperation maintained between the mobile nodes. Hence, a need arises for devising an effective mechanism which incorporates both energy efficiency and reputation into account for mitigating selfish behaviour in MANETs. In this paper, we propose an Exponential Reliability Coefficient based reputation Mechanism (ERCRM which isolates the selfish nodes from the routing path based on Exponential Reliability Coefficient (ExRC. This reliability coefficient manipulated through exponential failure rate based on moving average method highlights the most recent past behaviour of the mobile nodes for quantifying its genuineness. From the simulation results, it is evident that, the proposed ERCRM approach outperforms the existing Packet Conservation Monitoring Algorithm (PCMA and Spilt Half Reliability Coefficient based Mathematical Model (SHRCM in terms of performance evaluation metrics such as packet delivery ratio, throughput, total overhead and control overhead. Further, this ERCRM mechanism has a successful rate of 28% in isolating the selfish nodes from the routing path. Furthermore, it also aids in framing the exponential threshold point of detection as 0.4, where a maximum number of selfish nodes are identified when compared to the existing models available in the literature.

  1. Commercial operation and outage experience of ABWR at Kashiwazaki-Kariwa units Nos. 6 and 7

    International Nuclear Information System (INIS)

    Anahara, N.; Yamada, M.; Kataoka, H.

    2000-01-01

    Kashiwazaki-Kariwa Nuclear Power Station Units Nos. 6 and 7, the world's first ABWRs (Advanced Boiling Water Reactor), started commercial operation on November 7, 1996 and July 2, 1997, respectively, and continued their commercial operation with a high capacity factor, low occupational radiation exposure and radioactive waste. Units 6 and 7 were in their 3rd cycle operation until 25th April 1999 and 1st November 1999, respectively. Thermal efficiency was 35.4-35.8% (design thermal efficiency: 34.5%) during these period, demonstrating better performance than that of BWR-5 (design thermal efficiency: 33.4%). Nos. 6 and 7 have experienced 2 annual outages. The first outage of unit No. 6 started on November 20, 1997 and was completed within 61 days (including 6 New Year holidays), and the second outage started on March 13, 1999 and was completed within 44 days. The first annual outage of unit No. 7 started on May 27, 1998, earlier than it would normally have been, to avoid an annual outage during the summer, and was completed within 55 days, and the second outage started on September 18th, 1999 and was completed within 45 days, All annual outages were carried out within a very short time period without any severe malfunctions, including newly designed ABWR systems and equipment. As the first outage in Japan, 55 days is a very short period, despite the fact that the Nos. 6 and 7 are the first ABWRs in the world and the largest capacity units in Japan. The total occupational radiation exposure of No. 6 was 300 man-mSv (1st outage) and 331 man-mSv (2nd outage). That of Unit 7 was 153 man-mSv (1st outage) Those of unit No. 6 were at the same level as those of unit No. 3, which is the latest design 1100MW(e) BWR-5. That of unit No. 7 was the lowest ever at Kashiwazaki-Kariwa nuclear power station. The drums of radioactive waste discharged during the annual outage numbered 54 (1st outage) for No. 6 and 62 (1st outage) for No. 7, which was less than the design target of 100

  2. Distributed power-line outage detection based on wide area measurement system.

    Science.gov (United States)

    Zhao, Liang; Song, Wen-Zhan

    2014-07-21

    In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i) high computational complexity; and (ii) relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM) for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  3. Hybrid Cascading Outage Analysis of Extreme Events with Optimized Corrective Actions

    Energy Technology Data Exchange (ETDEWEB)

    Vallem, Mallikarjuna R.; Vyakaranam, Bharat GNVSR; Holzer, Jesse T.; Samaan, Nader A.; Makarov, Yuri V.; Diao, Ruisheng; Huang, Qiuhua; Ke, Xinda

    2017-10-19

    Power system are vulnerable to extreme contingencies (like an outage of a major generating substation) that can cause significant generation and load loss and can lead to further cascading outages of other transmission facilities and generators in the system. Some cascading outages are seen within minutes following a major contingency, which may not be captured exclusively using the dynamic simulation of the power system. The utilities plan for contingencies either based on dynamic or steady state analysis separately which may not accurately capture the impact of one process on the other. We address this gap in cascading outage analysis by developing Dynamic Contingency Analysis Tool (DCAT) that can analyze hybrid dynamic and steady state behavior of the power system, including protection system models in dynamic simulations, and simulating corrective actions in post-transient steady state conditions. One of the important implemented steady state processes is to mimic operator corrective actions to mitigate aggravated states caused by dynamic cascading. This paper presents an Optimal Power Flow (OPF) based formulation for selecting corrective actions that utility operators can take during major contingency and thus automate the hybrid dynamic-steady state cascading outage process. The improved DCAT framework with OPF based corrective actions is demonstrated on IEEE 300 bus test system.

  4. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  5. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  6. Outage performance of reactive cooperation in Nakagami-m fading channels

    KAUST Repository

    Benjillali, Mustapha

    2010-06-01

    In this paper, we investigate the outage performance of Decode-and-Forward with reactive relaying in dual-hop cooperetive Nakagaml-m fading links. The destination, based on the umque knowledge of local second hop channel state information, selects the best relay to increase the chances of cooperation when the direct link is also available. After deriving the exact distribution of the variables of interest, the outage probability of the system - with and without the direct link - is obtained in closed-form, and the ε-outage capacity is derived in the particular c.se wh.ere the channel model is reduced to a Rayleigh fading. Simulation results confirm the accuracy of our analysis for a large selection of system and fading parameters.

  7. R and D proposals to improve outages operation. Methods, practices and tools

    International Nuclear Information System (INIS)

    Dionis, Francois

    2014-01-01

    This paper deals with outage operation improvement. It offers a number of tracks on the interactions between the operation activities and maintenance, with a methodological perspective and proposals concerning the Information System. On the methodological point of view, a clever plant systems modeling may allow representing the needed characteristics in order to optimize tagouts, alignment procedures and the schedule. Tools must be taken n into account for new tagout practices such as tags sharing. It is possible to take advantage of 2D drawings integrated into the information system in order to improve the data controls and to visualize operation activities. An integrated set of mobile applications should allow field operators to join the information system for a better and safer performance. (author)

  8. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  9. Wolsong Unit 1 restart chemistry procedures during retubing outage

    International Nuclear Information System (INIS)

    Yun, Hyunran; Lee, Sarang; Moon, Yunyong; Kim, Seoyul

    2015-01-01

    Lay-up is aimed at protecting systems from degradation during outage, mainly by minimizing corrosion and particularly, when the outage is longer than 16 weeks. Due to the intrinsic design of CANDU reactors, their horizontal fuel channels should be replaced for another service life time. This poster presents the lay-up guidelines and methods recommended for re-tubing outage based on the first re-tubing operation made in Korea (at the Wolsung Unit 1). It is shown that dry lay-up with specific gas blanket was the sole choice for the primary heat transfer system, the moderator system and the steam cycle system while wet lay-up under circulation was recommended for the end shield cooling system and the liquid zone control system. The water filled part of steam generators, of the liquid zone control system and of the end shield cooling system was maintained normal

  10. Outage Probability Minimization for Energy Harvesting Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Fan Zhang

    2017-01-01

    Full Text Available The incorporation of cognitive radio (CR capability in wireless sensor networks yields a promising network paradigm known as CR sensor networks (CRSNs, which is able to provide spectrum efficient data communication. However, due to the high energy consumption results from spectrum sensing, as well as subsequent data transmission, the energy supply for the conventional sensor nodes powered by batteries is regarded as a severe bottleneck for sustainable operation. The energy harvesting technique, which gathers energy from the ambient environment, is regarded as a promising solution to perpetually power-up energy-limited devices with a continual source of energy. Therefore, applying the energy harvesting (EH technique in CRSNs is able to facilitate the self-sustainability of the energy-limited sensors. The primary concern of this study is to design sensing-transmission policies to minimize the long-term outage probability of EH-powered CR sensor nodes. We formulate this problem as an infinite-horizon discounted Markov decision process and propose an ϵ-optimal sensing-transmission (ST policy through using the value iteration algorithm. ϵ is the error bound between the ST policy and the optimal policy, which can be pre-defined according to the actual need. Moreover, for a special case that the signal-to-noise (SNR power ratio is sufficiently high, we present an efficient transmission (ET policy and prove that the ET policy achieves the same performance with the ST policy. Finally, extensive simulations are conducted to evaluate the performance of the proposed policies and the impaction of various network parameters.

  11. Outage Analysis of Spectrum-Sharing over M-Block Fading with Sensing Information

    KAUST Repository

    Alabbasi, Abdulrahman

    2016-07-13

    Future wireless technologies, such as, 5G, are expected to support real-time applications with high data throughput, e.g., holographic meetings. From a bandwidth perspective, cognitive radio is a promising technology to enhance the system’s throughput via sharing the licensed spectrum. From a delay perspective, it is well known that increasing the number of decoding blocks will improve the system robustness against errors, while increasing the delay. Therefore, optimally allocating the resources to determine the tradeoff of tuning the length of decoding blocks while sharing the spectrum is a critical challenge for future wireless systems. In this work, we minimize the targeted outage probability over the block-fading channels while utilizing the spectrum-sharing concept. The secondary user’s outage region and the corresponding optimal power are derived, over twoblocks and M-blocks fading channels. We propose two suboptimal power strategies and derive the associated asymptotic lower and upper bounds on the outage probability with tractable expressions. These bounds allow us to derive the exact diversity order of the secondary user’s outage probability. To further enhance the system’s performance, we also investigate the impact of including the sensing information on the outage problem. The outage problem is then solved via proposing an alternating optimization algorithm, which utilizes the verified strict quasiconvex structure of the problem. Selected numerical results are presented to characterize the system’s behavior and show the improvements of several sharing concepts.

  12. Outage Performance Analysis of Cooperative Diversity with MRC and SC in Correlated Lognormal Channels

    Directory of Open Access Journals (Sweden)

    Skraparlis D

    2009-01-01

    Full Text Available Abstract The study of relaying systems has found renewed interest in the context of cooperative diversity for communication channels suffering from fading. This paper provides analytical expressions for the end-to-end SNR and outage probability of cooperative diversity in correlated lognormal channels, typically found in indoor and specific outdoor environments. The system under consideration utilizes decode-and-forward relaying and Selection Combining or Maximum Ratio Combining at the destination node. The provided expressions are used to evaluate the gains of cooperative diversity compared to noncooperation in correlated lognormal channels, taking into account the spectral and energy efficiency of the protocols and the half-duplex or full-duplex capability of the relay. Our analysis demonstrates that correlation and lognormal variances play a significant role on the performance gain of cooperative diversity against noncooperation.

  13. Outage Analysis of Spectrum-Sharing over M-Block Fading with Sensing Information

    KAUST Repository

    Alabbasi, Abdulrahman; Rezki, Zouheir; Shihada, Basem

    2016-01-01

    on the outage probability with tractable expressions. These bounds allow us to derive the exact diversity order of the secondary user’s outage probability. To further enhance the system’s performance, we also investigate the impact of including the sensing

  14. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  15. Data Collection Method for Mobile Control Sink Node in Wireless Sensor Network Based on Compressive Sensing

    Directory of Open Access Journals (Sweden)

    Ling Yongfa

    2016-01-01

    Full Text Available The paper proposes a mobile control sink node data collection method in the wireless sensor network based on compressive sensing. This method, with regular track, selects the optimal data collection points in the monitoring area via the disc method, calcu-lates the shortest path by using the quantum genetic algorithm, and hence determines the data collection route. Simulation results show that this method has higher network throughput and better energy efficiency, capable of collecting a huge amount of data with balanced energy consumption in the network.

  16. Estimating the spatial distribution of power outages during hurricanes in the Gulf coast region

    International Nuclear Information System (INIS)

    Han, S.-R.; Guikema, Seth D.; Quiring, Steven M.; Lee, Kyung-Ho; Rosowsky, David; Davidson, Rachel A.

    2009-01-01

    Hurricanes have caused severe damage to the electric power system throughout the Gulf coast region of the US, and electric power is critical to post-hurricane disaster response as well as to long-term recovery for impacted areas. Managing power outage risk and preparing for post-storm recovery efforts requires accurate methods for estimating the number and location of power outages. This paper builds on past work on statistical power outage estimation models to develop, test, and demonstrate a statistical power outage risk estimation model for the Gulf Coast region of the US. Previous work used binary hurricane-indicator variables representing particular hurricanes in order to achieve a good fit to the past data. To use these models for predicting power outages during future hurricanes, one must implicitly assume that an approaching hurricane is similar to the average of the past hurricanes. The model developed in this paper replaces these indicator variables with physically measurable variables, enabling future predictions to be based on only well-understood characteristics of hurricanes. The models were developed using data about power outages during nine hurricanes in three states served by a large, investor-owned utility company in the Gulf Coast region

  17. Outages 1999 and 2000, investments in safety and long-term operation of NE Krsko

    International Nuclear Information System (INIS)

    Sirola, P.; Krajnc, J.; Androjna, F.

    1999-01-01

    Plant outage is an important part of nuclear power plant operation. During that time the conditions are established for the performance of specific activities, such as refueling, tests, inspections, preventive and corrective maintenance and modifications, that are intended to confirm proper condition and availability of safety and other important components and improve overall plant safety and reliability. It is well know that in Nuclear Power Plant Krsko (Nuklearna elektrarna Krsko NEK) during Outage 2000 new Steam Generators (SGs) will be placed in service, while Outage '99 was used for preparatory works. But the importance of those two outages is even greater, because they are implementing a broad number of improvements and establishing a basis for long-term plant operation. Outage '99 required very detailed planning to assure a good control over the outage activities and operational plant systems necessary for safe shutdown. Numerous activities took place in a relatively narrow space in the Reactor Building. Some of these activities will have a big significance for the future. The article treats the status update and summarizes the specifics and importance of the mentioned activities to long-term plant safe and reliable operation.(author)

  18. World-class outage performance of the Olkiluoto nuclear power plant

    International Nuclear Information System (INIS)

    Paavola, M.

    1998-01-01

    The production of the Olkiluoto power plant units covered 17% of the electricity consumption in Finland in 1997; the total share of nuclear energy was 27% of the electricity consumed in the country. Based on Finnish experience, nuclear energy is a safe, environmentally friendly and economic way to produce electricity provided that the plants and their personnel are well taken care of. TVO's policy is to keep the plant units in good condition and technically modern. This requires continuous investments in the plant. In maintenance, attention is paid to monitoring the condition of the plant and to preventive maintenance aiming at avoiding disturbances in production. TVO has chosen continuous development as the operational line develops the plant by annual investments and performs the necessary modifications during planned annual outages trying to avoid long production interruptions. The load factors of the Olkiluoto nuclear power plant have been high. The average load factor during the last decade was over 93%. The most significant single factor in the production deficits is the amount or electricity, which has not been produced because of the annual outages. Due to this, special attention has been paid to the performance of the annual outages. TVO aims at continuous development of the annual outage procedure. A centralized task management system makes it possible to perform simultaneously more tasks than before. The company has also invested in equipment and systems, which ease and speed up servicing. Normal outage length varies between 10 and 16 days. By keeping the plant units as modern as possible and in good condition we facilitate reaching TVO's target, which is also stated in TVO's slogan 'always 40 years lifetime'. (author)

  19. Optimization of safety equipment outages improves safety

    International Nuclear Information System (INIS)

    Cepin, Marko

    2002-01-01

    Testing and maintenance activities of safety equipment in nuclear power plants are an important potential for risk and cost reduction. An optimization method is presented based on the simulated annealing algorithm. The method determines the optimal schedule of safety equipment outages due to testing and maintenance based on minimization of selected risk measure. The mean value of the selected time dependent risk measure represents the objective function of the optimization. The time dependent function of the selected risk measure is obtained from probabilistic safety assessment, i.e. the fault tree analysis at the system level and the fault tree/event tree analysis at the plant level, both extended with inclusion of time requirements. Results of several examples showed that it is possible to reduce risk by application of the proposed method. Because of large uncertainties in the probabilistic safety assessment, the most important result of the method may not be a selection of the most suitable schedule of safety equipment outages among those, which results in similarly low risk. But, it may be a prevention of such schedules of safety equipment outages, which result in high risk. Such finding increases the importance of evaluation speed versus the requirement of getting always the global optimum no matter if it is only slightly better that certain local one

  20. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang

    2018-04-09

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  1. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Zhang, Zufan; Pan, Gaofeng; Alouini, Mohamed-Slim

    2018-01-01

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  2. Study of Arkansas Nuclear One-1 13th refueling outage

    International Nuclear Information System (INIS)

    Hashiba, Takashi

    1997-01-01

    Recently performance of nuclear power plants in the USA has improved remarkably. Their average automatic shutdown rate has been sharply dropping, although it is still higher than that in Japan, and their average capacity factor has become higher than that in Japan in recent years. One of the main contributors is an extension of the operational period, and another is a shortening of refueling-outage time. It is considerably difficult to have accomplished both the improvement of plant reliability and shortening of refueling-outage time because their refueling outage corresponds to our periodical inspection which is central to maintenance activities in Japanese plants. In order to learn how they have been achieved, a visit to Arkansas Nuclear One-1 (ANO-1) which obtained the top-class result of SALP (Systematic Assessment of Licensee Performance) performed by the Nuclear Regulatory Commission was planned and study of their 13th refueling outage was carried out. Their achievements result from performance-base maintenance and on-line maintenance, based on a proper preventive maintenance program, and untiring efforts of efficiency improvement, represented by the introduction of several on-line systems. And the reason behind this is severe competition concerning power generation cost reduction. (author)

  3. Study of Arkansas Nuclear One-1 13th refueling outage

    Energy Technology Data Exchange (ETDEWEB)

    Hashiba, Takashi [Institute of Nuclear Safety System Inc., Seika, Kyoto (Japan)

    1997-09-01

    Recently performance of nuclear power plants in the USA has improved remarkably. Their average automatic shutdown rate has been sharply dropping, although it is still higher than that in Japan, and their average capacity factor has become higher than that in Japan in recent years. One of the main contributors is an extension of the operational period, and another is a shortening of refueling-outage time. It is considerably difficult to have accomplished both the improvement of plant reliability and shortening of refueling-outage time because their refueling outage corresponds to our periodical inspection which is central to maintenance activities in Japanese plants. In order to learn how they have been achieved, a visit to Arkansas Nuclear One-1 (ANO-1) which obtained the top-class result of SALP (Systematic Assessment of Licensee Performance) performed by the Nuclear Regulatory Commission was planned and study of their 13th refueling outage was carried out. Their achievements result from performance-base maintenance and on-line maintenance, based on a proper preventive maintenance program, and untiring efforts of efficiency improvement, represented by the introduction of several on-line systems. And the reason behind this is severe competition concerning power generation cost reduction. (author)

  4. Outage Performance of Flexible OFDM Schemes in Packet-Switched Transmissions

    Directory of Open Access Journals (Sweden)

    Romain Couillet

    2009-01-01

    Full Text Available α-OFDM, a generalization of the OFDM modulation, is proposed. This new modulation enhances the outage capacity performance of bursty communications. The α-OFDM scheme is easily implementable as it only requires an additional time symbol rotation after the IDFT stage and a subsequent phase rotation of the cyclic prefix. The physical effect of the induced rotation is to slide the DFT window over the frequency spectrum. When successively used with different angles α at the symbol rate, α-OFDM provides frequency diversity in block fading channels. Interestingly, simulation results show a substantial gain in terms of outage capacity and outage BER in comparison with classical OFDM modulation schemes. The framework is extended to multiantenna and multicellular OFDM-based standards. Practical simulations, in the context of 3GPP-LTE, called hereafter α-LTE, sustain our theoretical claims.

  5. On test and maintenance: Optimization of allowed outage time

    International Nuclear Information System (INIS)

    Mavko, B.; Cepin, M.T.

    2000-01-01

    Probabilistic Safety Assessment is widely becoming standard method for assessing, maintaining, assuring and improving the nuclear power plant safety. To achieve one of its many potential benefits, the optimization of allowed outage time specified in technical specifications is investigated. Proposed is the risk comparison approach for evaluation of allowed outage time. The risk of shutting the plant down due to failure of certain equipment is compared to the risk of continued plant operation with the specified equipment down. The core damage frequency serves as a risk measure. (author)

  6. Outage capacity of multicarrier systems

    KAUST Repository

    Yilmaz, Ferkan; Alouini, Mohamed-Slim

    2010-01-01

    The probability density function and the cumulative distribution function of the product of shifted Gamma variates are obtained in terms of the generalized Fox's H function. Using these new results, the exact outage capacity of multi carrier transmission through a slow Nakagami-m fading channel is presented. Moreover, it is shown that analytical and simulation results are in perfect agreement. © 2009 IEEE.

  7. Allowable outage analysis for the LOFT CIS and reflood assist bypass valves

    International Nuclear Information System (INIS)

    Trainer, J.E.; Matthews, S.D.

    1977-06-01

    To determine the outage time allowable for a typical 1 of 2 redundant valve configuration, a Markov model was created to analyze the various operating states for the valves. Since no performance criteria have been specified, an availability model was constructed with regard to the valve outage

  8. A Fuzzy Adaptive Tightly-Coupled Integration Method for Mobile Target Localization Using SINS/WSN

    Directory of Open Access Journals (Sweden)

    Wei Li

    2016-11-01

    Full Text Available In recent years, mobile target localization for enclosed environments has been a growing interest. In this paper, we have proposed a fuzzy adaptive tightly-coupled integration (FATCI method for positioning and tracking applications using strapdown inertial navigation system (SINS and wireless sensor network (WSN. The wireless signal outage and severe multipath propagation of WSN often influence the accuracy of measured distance and lead to difficulties with the WSN positioning. Note also that the SINS are known for their drifted error over time. Using as a base the well-known loosely-coupled integration method, we have built a tightly-coupled integrated positioning system for SINS/WSN based on the measured distances between anchor nodes and mobile node. The measured distance value of WSN is corrected with a least squares regression (LSR algorithm, with the aim of decreasing the systematic error for measured distance. Additionally, the statistical covariance of measured distance value is used to adjust the observation covariance matrix of a Kalman filter using a fuzzy inference system (FIS, based on the statistical characteristics. Then the tightly-coupled integration model can adaptively adjust the confidence level for measurement according to the different measured accuracies of distance measurements. Hence the FATCI system is achieved using SINS/WSN. This innovative approach is verified in real scenarios. Experimental results show that the proposed positioning system has better accuracy and stability compared with the loosely-coupled and traditional tightly-coupled integration model for WSN short-term failure or normal conditions.

  9. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    KAUST Repository

    Xia, Minghua

    2012-11-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.

  10. Upgrading BWR training simulators for annual outage operation training

    International Nuclear Information System (INIS)

    Yamakabe, K.; Nakajima, A.; Shiyama, H.; Noji, K.; Okabe, N.; Murata, F.

    2006-01-01

    Based upon the recently developed quality assurance program by the Japanese electric companies, BWR Operator Training Center (BTC) identified the needs to enhance operators' knowledge and skills for operations tasks during annual outage, and started to develop a dedicated operator training course specialized for them. In this paper, we present the total framework of the training course for annual outage operations and the associated typical three functions of our full-scope simulators specially developed and upgraded to conduct the training; namely, (1) Simulation model upgrade for the flow and temperature behavior concerning residual heat removal (RHR) system with shutdown cooling mode, (2) Addition of malfunctions for DC power supply equipment, (3) Simulation model upgrade for water filling operation for reactor pressurization (future development). We have implemented a trial of the training course by using the upgraded 800MW full-scope training simulator with functions (1) and (2) above. As the result of this trial, we are confident that the developed training course is effective for enhancing operators' knowledge and skills for operations tasks during annual outage. (author)

  11. Health and maintenance outages in nuclear power plants: an epidemiological survey

    International Nuclear Information System (INIS)

    Telle, M.A.; Huez, D.; Niedbala, J.M.; Auclair, J.; Canales, J.P.; Duverge, C.; Forest, H.; Gerondal, M.; Paris, P.M.; Renault, J.C.; Bossevain, L.; Blaise, P.; Blanc, M.C.; Goldberg, M.; Charpak, Y.

    1995-01-01

    An epidemiological survey, started in 1989, was carried out at the nuclear power plants in the Loire river valley and at Le Blayais (France). Working conditions, work organisation and their impact on health during annual maintenance outages were studied. The main areas covered in this cross-sectional study were: anxiety and symptoms of depression using the Spielberger and CES-D scales. Comparisons were made during both a scheduled outage and in normal operation on four distinct groups of workers, each individual being his own control. A chi-square test was used for the quantitative variables and a test on differences for the quantitative variables. During a unit outage, more frequent overtime and atypical working hours were reported (p<0.01); working rhythms and safety rules were felt as more restrictive and exposure to radiation higher (p<0.01). Detrimental modifications of anxiety and symptoms of depression were observed on controllers whereas expected on maintenance agents. Similar results were observed when considering the rates of outages. Possible readings are given with reference to qualitative studies carried out on this topic, which implies extending our research with both the quantitative and qualitative approaches. (authors). 10 refs., 6 tabs

  12. ZONE BASED PATH ROUTING APPROACH FOR THE DETECTION AND PREVENTION OF MALICIOUS BEHAVIOUR OF THE NODE IN MANET

    Directory of Open Access Journals (Sweden)

    Akansha Shrivastava

    2016-09-01

    Full Text Available Mobile Ad-hoc Network (MANET is one of the important research areas. MANET is a cluster of movable nodes that communicate without any wired connection. It refers to a network of moving nodes communicating with other mobile nodes in a multi-hop fashion. Mobile nodes provide flexibility to this network. Thus this flexible network is prone to a variety of attacks. Wormhole attack is a major threat to this network. In this attack, a tunnel is created between two nodes. These nodes transmit all communication through this tunnel. Detecting such attack is a major task. This paper presents a zone-based approach that detects and prevents such attack.

  13. Outage capacity of multicarrier systems

    KAUST Repository

    Yilmaz, Ferkan

    2010-01-01

    The probability density function and the cumulative distribution function of the product of shifted Gamma variates are obtained in terms of the generalized Fox\\'s H function. Using these new results, the exact outage capacity of multi carrier transmission through a slow Nakagami-m fading channel is presented. Moreover, it is shown that analytical and simulation results are in perfect agreement. © 2009 IEEE.

  14. Outage Analysis of Asymmetric RF-FSO Systems

    KAUST Repository

    Ansari, Imran Shafique; Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2017-01-01

    In this work, the outage performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) channels cascaded with free-space optical (FSO) links is presented. The RF links are modeled by the Rayleigh fading

  15. Using Link Disconnection Entropy Disorder to Detect Fast Moving Nodes in MANETs.

    Science.gov (United States)

    Alvarez, Carlos F; Palafox, Luis E; Aguilar, Leocundo; Sanchez, Mauricio A; Martinez, Luis G

    2016-01-01

    Mobile ad-hoc networks (MANETs) are dynamic by nature; this dynamism comes from node mobility, traffic congestion, and other transmission conditions. Metrics to evaluate the effects of those conditions shine a light on node's behavior in an ad-hoc network, helping to identify the node or nodes with better conditions of connection. In this paper, we propose a relative index to evaluate a single node reliability, based on the link disconnection entropy disorder using neighboring nodes as reference. Link disconnection entropy disorder is best used to identify fast moving nodes or nodes with unstable communications, this without the need of specialized sensors such as GPS. Several scenarios were studied to verify the index, measuring the effects of Speed and traffic density on the link disconnection entropy disorder. Packet delivery ratio is associated to the metric detecting a strong relationship, enabling the use of the link disconnection entropy disorder to evaluate the stability of a node to communicate with other nodes. To expand the utilization of the link entropy disorder, we identified nodes with higher speeds in network simulations just by using the link entropy disorder.

  16. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  17. Enhanced outage prediction modeling for strong extratropical storms and hurricanes in the Northeastern United States

    Science.gov (United States)

    Cerrai, D.; Anagnostou, E. N.; Wanik, D. W.; Bhuiyan, M. A. E.; Zhang, X.; Yang, J.; Astitha, M.; Frediani, M. E.; Schwartz, C. S.; Pardakhti, M.

    2016-12-01

    The overwhelming majority of human activities need reliable electric power. Severe weather events can cause power outages, resulting in substantial economic losses and a temporary worsening of living conditions. Accurate prediction of these events and the communication of forecasted impacts to the affected utilities is necessary for efficient emergency preparedness and mitigation. The University of Connecticut Outage Prediction Model (OPM) uses regression tree models, high-resolution weather reanalysis and real-time weather forecasts (WRF and NCAR ensemble), airport station data, vegetation and electric grid characteristics and historical outage data to forecast the number and spatial distribution of outages in the power distribution grid located within dense vegetation. Recent OPM improvements consist of improved storm classification and addition of new predictive weather-related variables and are demonstrated using a leave-one-storm-out cross-validation based on 130 severe extratropical storms and two hurricanes (Sandy and Irene) in the Northeast US. We show that it is possible to predict the number of trouble spots causing outages in the electric grid with a median absolute percentage error as low as 27% for some storm types, and at most around 40%, in a scale that varies between four orders of magnitude, from few outages to tens of thousands. This outage information can be communicated to the electric utility to manage allocation of crews and equipment and minimize the recovery time for an upcoming storm hazard.

  18. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  19. Use of a Computerized Tool (ORAM) to Help Manage Outage Safety and Risk at NPP Krsko

    International Nuclear Information System (INIS)

    Spiler, J.; Basic, I.; Vrbanic, I.; Fifnja, I.; Kastelan, M.; Dagan, W. J.; Shanley, L. B.; Naum, T. J.

    1998-01-01

    Outage Risk Assessment and Management (ORAM) is a computerized methodology developed by the U.S. Electric Power Research Institute (EPRI) to help Nuclear Power Plant personnel manage the risk and safety associated with refueling and forced plant outages. Today, over 60 plants including NPP Krsko are using ORAM during the preparation and performance of plant outages. In fact, many plants are attributing much of the reductions in the duration of refueling outages to the use of ORAM. The success of the ORAM methodology is the capability to provide plant and management personnel with understandable results from both deterministic evaluations of plant safety and quantitative risk assessments. The Nuklearna Elektrarna Krsko (NEK) use of ORAM involves both of these approaches. The deterministic portion of ORAM is used to model the NPP Krsko Shutdown Technical Specifications and administrative considerations. The probabilistic portion of ORAM uses industry and NEK specific initiating events and other risk elements pertaining to shutdown to derive a quantitative risk assessment for various end states, including core damage and RCS boiling. This paper expands on the value of each approach and demonstrates the benefits of combining these elements in the decision-making process. Another key advantage of ORAM is the ability to apply the methodology to specific outages. Since no outage is identical, this provides tremendous benefits to plant personnel for managing the safety and risk of a particular outage. ORAM does this ba organizing all of the various plant configurations and equipment unavailability windows into numerous plant states. Furthermore, ORAM evaluations can be a utomated b y interfacing with outage scheduling software programs such as Primavera. For each plant state, the deterministic and the probabilistic logic evaluations are applied. This paper will demonstrate the ORAM evaluation for an actual NPP Krsko outage. (author)

  20. Outage analysis of opportunistic decode-and-forward relaying

    KAUST Repository

    Tourki, Kamel

    2010-09-01

    In this paper, we investigate a dual-hop opportunistic decode-and-forward relaying scheme where the source may or not be able to communicate directly with the destination. We first derive statistics based on exact probability density function (PDF) of each hop. Then, the PDFs are used to determine closed-form outage probability expression for a transmission rate R. Furthermore, we evaluate the asymptotic outage performance and the diversity order is deduced. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results under practical assumption of unbalanced hops. © 2010 IEEE.

  1. Ontario-U.S. power outages : impacts on critical infrastructure

    International Nuclear Information System (INIS)

    2006-01-01

    This paper described the power outage and resulting blackout that occurred on August 14, 2003 and identified how critical infrastructure was directly and interdependently impacted in Canada. The aim of the paper was to assist critical infrastructure protection and emergency management professionals in assessing the potential impacts of large-scale critical infrastructure disruptions. Information for the study was acquired from Canadian and American media reports and cross-sectoral information sharing with provincial and federal governments and the private sector. The blackout impacted most of the sources and means of generating, transmitting and distributing power within the area, which in turn impacted all critical infrastructure sectors. Landline and cellular companies experienced operational difficulties, which meant that emergency responders were impacted. Newspapers and the electronic media struggled to release information to the public. The banking and finance industry experienced an immediate degradation of services. The power outage caused shipping and storage difficulties for commercial retailers and dairy producers. A number of incidents were reported where only partially treated waste water was released into neighbouring waterways. The timing of the blackout coincided with the closures of workplaces and created additional difficulties on transportation networks. Many gas station pumps were inoperable. Police, fire departments and ambulance services experienced a dramatic increase in the volume of calls received, and all branches of the emergency services sector encountered transportation delays and difficulties with communications equipment. Nuclear reactors were also impacted. An estimated 150,000 Government of Canada employees were unable to report to work. Estimates have indicated that the power outage cost Ontario's economy between $1 and $2 billion. The outage negatively impacted 82 per cent of small businesses in Ontario. 170 refs., 3 figs

  2. Arm morbidity following sentinel lymph node biopsy or axillary lymph node dissection: a study from the Danish Breast Cancer Cooperative Group

    DEFF Research Database (Denmark)

    Husted, Madsen A.; Haugaard, K.; Soerensen, J.

    2008-01-01

    BACKGROUND: Sentinel lymph node biopsy was implemented in the treatment of early breast cancer with the aim of reducing shoulder and arm morbidity. Relatively few prospective studies have been published where the morbidity was assessed by clinical examination. Very few studies have examined...... lymph node biopsy with node negative patients having a lymph node dissection of levels I and II of the axilla, we found significant increase in arm volume among the patients who had an axillary dissection. Only minor, but significant, differences in shoulder mobility were observed comparing the two...... groups of node negative patients. Highly significant difference was found comparing sensibility. Comparing the morbidity in node positive patients who had a one-step axillary dissection with patients having a two-step procedure (sentinel lymph node biopsy followed by delayed axillary dissection) revealed...

  3. A mobile sensing system for structural health monitoring: design and validation

    International Nuclear Information System (INIS)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-01-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring

  4. A mobile sensing system for structural health monitoring: design and validation

    Science.gov (United States)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-05-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring.

  5. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  6. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  7. Bingham Pump Outage Pits: Environmental information document

    International Nuclear Information System (INIS)

    Pekkala, R.O.; Jewell, C.E.; Holmes, W.G.; Marine, I.W.

    1987-03-01

    Seven waste sites known as the Bingham Pump Outage Pits located in areas of the Savannah River Plant (SRP) received solid waste containing an estimated 4 Ci of low-level radioactivity in 1957-1958. These sites were subsequently backfilled and have been inactive since that time. Most of the radioactivity at the Bingham Pump Outage Pits has been eliminated by radioactive decay. A total of approximately 1 Ci of activity (primarily 137 Cs and 90 Sr) is estimated to remain at the seven sites. The closure options considered for the Bingham Pump Outage Pits are waste removal and closure, no waste removal and closure, and no action. The predominant pathways for human exposure to chemical and/or radioactive constituents are through surface, subsurface, and atmospheric transport. Modeling calculations were made to determine the risks to human population via these general pathways for the three postulated closure options. An ecological assessment was conducted to predict the environmental impacts on aquatic and terrestrial biota. The relative costs for each of the closure options were estimated. Evaluation indicates that the relative human health risks for all closure options are small. The greatest public risk would occur after the waste site was released to unrestricted public use (assumed to occur in Year 2085) via the groundwater pathway to a well. The cost estimates show that the waste removal and closure option is the most expensive (89.6 million dollars). The cost of the no waste removal and the no action options is $800,000. 35 refs., 26 figs., 47 tabs

  8. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  9. Design Concepts for an Outage Control Center Information Dashboard

    International Nuclear Information System (INIS)

    Hugo, Jacques Victor; St Germain, Shawn Walter; Thompson, Cheradan Jo; Whitesides, McKenzie Jo; Farris, Ronald Keith

    2015-01-01

    The nuclear industry, and the business world in general, is facing a rapidly increasing amount of data to be dealt with on a daily basis. In the last two decades, the steady improvement of data storage devices and means to create and collect data along the way influenced the manner in which we deal with information. Most data is still stored without filtering and refinement for later use. Many functions at a nuclear power plant generate vast amounts of data, with scheduled and unscheduled outages being a prime example of a source of some of the most complex data sets at the plant. To make matters worse, modern information and communications technology is making it possible to collect and store data faster than our ability to use it for making decisions. However, in most applications, especially outages, raw data has no value in itself; instead, managers, engineers and other specialists want to extract the information contained in it. The complexity and sheer volume of data could lead to information overload, resulting in getting lost in data that may be irrelevant to the task at hand, processed in an inappropriate way, or presented in an ineffective way. To prevent information overload, many data sources are ignored so production opportunities are lost because utilities lack the ability to deal with the enormous data volumes properly. Decision-makers are often confronted with large amounts of disparate, conflicting and dynamic information, which are available from multiple heterogeneous sources. Information and communication technologies alone will not solve this problem. Utilities need effective methods to exploit and use the hidden opportunities and knowledge residing in unexplored data resources. Superior performance before, during and after outages depends upon the right information being available at the right time to the right people. Acquisition of raw data is the easy part; instead, it is the ability to use advanced analytical, data processing and data

  10. Design Concepts for an Outage Control Center Information Dashboard

    Energy Technology Data Exchange (ETDEWEB)

    Hugo, Jacques Victor [Idaho National Lab. (INL), Idaho Falls, ID (United States); St Germain, Shawn Walter [Idaho National Lab. (INL), Idaho Falls, ID (United States); Thompson, Cheradan Jo [Idaho National Lab. (INL), Idaho Falls, ID (United States); Whitesides, McKenzie Jo [Idaho National Lab. (INL), Idaho Falls, ID (United States); Farris, Ronald Keith [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-12-01

    The nuclear industry, and the business world in general, is facing a rapidly increasing amount of data to be dealt with on a daily basis. In the last two decades, the steady improvement of data storage devices and means to create and collect data along the way influenced the manner in which we deal with information. Most data is still stored without filtering and refinement for later use. Many functions at a nuclear power plant generate vast amounts of data, with scheduled and unscheduled outages being a prime example of a source of some of the most complex data sets at the plant. To make matters worse, modern information and communications technology is making it possible to collect and store data faster than our ability to use it for making decisions. However, in most applications, especially outages, raw data has no value in itself; instead, managers, engineers and other specialists want to extract the information contained in it. The complexity and sheer volume of data could lead to information overload, resulting in getting lost in data that may be irrelevant to the task at hand, processed in an inappropriate way, or presented in an ineffective way. To prevent information overload, many data sources are ignored so production opportunities are lost because utilities lack the ability to deal with the enormous data volumes properly. Decision-makers are often confronted with large amounts of disparate, conflicting and dynamic information, which are available from multiple heterogeneous sources. Information and communication technologies alone will not solve this problem. Utilities need effective methods to exploit and use the hidden opportunities and knowledge residing in unexplored data resources. Superior performance before, during and after outages depends upon the right information being available at the right time to the right people. Acquisition of raw data is the easy part; instead, it is the ability to use advanced analytical, data processing and data

  11. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes.

    Science.gov (United States)

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-12-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  12. Environmental determinants of unscheduled residential outages in the electrical power distribution of Phoenix, Arizona

    International Nuclear Information System (INIS)

    Maliszewski, Paul J.; Larson, Elisabeth K.; Perrings, Charles

    2012-01-01

    The sustainability of power infrastructures depends on their reliability. One test of the reliability of an infrastructure is its ability to function reliably in extreme environmental conditions. Effective planning for reliable electrical systems requires knowledge of unscheduled outage sources, including environmental and social factors. Despite many studies on the vulnerability of infrastructure systems, the effect of interacting environmental and infrastructural conditions on the reliability of urban residential power distribution remains an understudied problem. We model electric interruptions using outage data between the years of 2002 and 2005 across Phoenix, Arizona. Consistent with perceptions of increased exposure, overhead power lines positively correlate with unscheduled outages indicating underground cables are more resistant to failure. In the presence of overhead lines, the interaction between birds and vegetation as well as proximity to nearest desert areas and lakes are positive driving factors explaining much of the variation in unscheduled outages. Closeness to the nearest arterial road and the interaction between housing square footage and temperature are also significantly positive. A spatial error model was found to provide the best fit to the data. Resultant findings are useful for understanding and improving electrical infrastructure reliability. - Highlights: ► Unscheduled outages were related to interacting environmental and infrastructural conditions. ► Underground feeders are more resistant to failure. ► In the presence of overhead lines, birds, vegetation, and proximity to desert areas are positive driving factors. ► Proximity to arterial roads and a proxy for energy demand were significantly positive. ► Outages were most spatially dependent up to around 350 m.

  13. Consequences of long-term power outages and high electricity prices lasting for months

    International Nuclear Information System (INIS)

    2005-01-01

    Several areas in the world have experienced electricity outages for longer periods of time, but the consequences of these are sparsely documented. There is a need for further analysis of the socioeconomic consequences of the outages. In addition to KILE (Quality adjusted revenue framework for un supplied energy) costs one has to take into account that the costs often increase proportionally with the durance of the outage, and that KILE tariffs do not reflect lost consumer's surplus for products that are not produced during an outage. A good example is the public underground transport, where the company's economical loss can be significantly smaller than the loss of utility value for the travellers. If the authorities act with reasonability it is difficult to see that periods with very high prices represent a big problem. The most important problems are related to diffused effects, especially for households with a weak economy. These problems can be solved with improved contractual forms (price guarantees) or by transfers to the households, without weakening the incentives for electricity economising (ml)

  14. Outage Probability Analysis of FSO Links over Foggy Channel

    KAUST Repository

    Esmail, Maged Abdullah

    2017-02-22

    Outdoor Free space optic (FSO) communication systems are sensitive to atmospheric impairments such as turbulence and fog, in addition to being subject to pointing errors. Fog is particularly severe because it induces an attenuation that may vary from few dBs up to few hundreds of dBs per kilometer. Pointing errors also distort the link alignment and cause signal fading. In this paper, we investigate and analyze the FSO systems performance under fog conditions and pointing errors in terms of outage probability. We then study the impact of several effective communication mitigation techniques that can improve the system performance including multi-hop, transmit laser selection (TLS) and hybrid RF/FSO transmission. Closed-form expressions for the outage probability are derived and practical and comprehensive numerical examples are suggested to assess the obtained results. We found that the FSO system has limited performance that prevents applying FSO in wireless microcells that have a 500 m minimum cell radius. The performance degrades more when pointing errors appear. Increasing the transmitted power can improve the performance under light to moderate fog. However, under thick and dense fog the improvement is negligible. Using mitigation techniques can play a major role in improving the range and outage probability.

  15. Outage Probability Analysis of FSO Links over Foggy Channel

    KAUST Repository

    Esmail, Maged Abdullah; Fathallah, Habib; Alouini, Mohamed-Slim

    2017-01-01

    Outdoor Free space optic (FSO) communication systems are sensitive to atmospheric impairments such as turbulence and fog, in addition to being subject to pointing errors. Fog is particularly severe because it induces an attenuation that may vary from few dBs up to few hundreds of dBs per kilometer. Pointing errors also distort the link alignment and cause signal fading. In this paper, we investigate and analyze the FSO systems performance under fog conditions and pointing errors in terms of outage probability. We then study the impact of several effective communication mitigation techniques that can improve the system performance including multi-hop, transmit laser selection (TLS) and hybrid RF/FSO transmission. Closed-form expressions for the outage probability are derived and practical and comprehensive numerical examples are suggested to assess the obtained results. We found that the FSO system has limited performance that prevents applying FSO in wireless microcells that have a 500 m minimum cell radius. The performance degrades more when pointing errors appear. Increasing the transmitted power can improve the performance under light to moderate fog. However, under thick and dense fog the improvement is negligible. Using mitigation techniques can play a major role in improving the range and outage probability.

  16. Performance Shaping Factors Assessments and Application to PHWR Outages

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Woo

    2007-02-15

    Human reliability analysis is definitely related to the quality of PSA because human errors have been identified as major contributors to PSA. According to NRC's 'Office of analysis and evaluation of operational data (AEOD)',82% of the reactor trips and accident during outage is caused by the events related to human errors. There is, however, no one HRA method universally accepted. Furthermore, HRA during PHWR outages has not been performed around the world yet. HRA during PHWR outages is especially important since manual management of operator is more required during PHWR. In this study, accident scenarios which HYU developed are used to perform a quantification of human error probability. In this study, overall procedures of standard HRA methodology are introduced and follows the quantification of 10 possible selected human actions during PHWR outages based on standard HRA methodology. To see the verification, quantified values were compared with the values from 'Generic CANDU Probabilistic Safety Assessment' and the values estimated by ASEP.Core Damage Frequency was estimated 3.35 x 10{sup -4} more higher than CDF estimated by AECL data. It was considered that the differences between the HEPs for OPAFW and OPECC3 make CDF higher. Therefore, complementary study of reestimating HEP for OPAFW and OPECC3 in detail is required for increasing the qualities of HRA and PSA. Moreover, one of the difficulties in performing human reliability analysis is to evaluate performance shaping factors which represent the characteristics and circumstances. For assessing a specific human action more exactly, it is necessary to consider all of the PSFs at the same time which makes an effect on the human action. Also, it requires the effect comparison among PSFs to minimize the uncertainties which are usually caused by the subjective judgements of HRA analysts. To see the sensitivity, performance shaping factors of each decision rule are changed which resulted

  17. Performance Shaping Factors Assessments and Application to PHWR Outages

    International Nuclear Information System (INIS)

    Lee, Seung Woo

    2007-02-01

    Human reliability analysis is definitely related to the quality of PSA because human errors have been identified as major contributors to PSA. According to NRC's 'Office of analysis and evaluation of operational data (AEOD)',82% of the reactor trips and accident during outage is caused by the events related to human errors. There is, however, no one HRA method universally accepted. Furthermore, HRA during PHWR outages has not been performed around the world yet. HRA during PHWR outages is especially important since manual management of operator is more required during PHWR. In this study, accident scenarios which HYU developed are used to perform a quantification of human error probability. In this study, overall procedures of standard HRA methodology are introduced and follows the quantification of 10 possible selected human actions during PHWR outages based on standard HRA methodology. To see the verification, quantified values were compared with the values from 'Generic CANDU Probabilistic Safety Assessment' and the values estimated by ASEP.Core Damage Frequency was estimated 3.35 x 10 -4 more higher than CDF estimated by AECL data. It was considered that the differences between the HEPs for OPAFW and OPECC3 make CDF higher. Therefore, complementary study of reestimating HEP for OPAFW and OPECC3 in detail is required for increasing the qualities of HRA and PSA. Moreover, one of the difficulties in performing human reliability analysis is to evaluate performance shaping factors which represent the characteristics and circumstances. For assessing a specific human action more exactly, it is necessary to consider all of the PSFs at the same time which makes an effect on the human action. Also, it requires the effect comparison among PSFs to minimize the uncertainties which are usually caused by the subjective judgements of HRA analysts. To see the sensitivity, performance shaping factors of each decision rule are changed which resulted in changes of core damage

  18. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  19. Comparison and validation of statistical methods for predicting power outage durations in the event of hurricanes.

    Science.gov (United States)

    Nateghi, Roshanak; Guikema, Seth D; Quiring, Steven M

    2011-12-01

    This article compares statistical methods for modeling power outage durations during hurricanes and examines the predictive accuracy of these methods. Being able to make accurate predictions of power outage durations is valuable because the information can be used by utility companies to plan their restoration efforts more efficiently. This information can also help inform customers and public agencies of the expected outage times, enabling better collective response planning, and coordination of restoration efforts for other critical infrastructures that depend on electricity. In the long run, outage duration estimates for future storm scenarios may help utilities and public agencies better allocate risk management resources to balance the disruption from hurricanes with the cost of hardening power systems. We compare the out-of-sample predictive accuracy of five distinct statistical models for estimating power outage duration times caused by Hurricane Ivan in 2004. The methods compared include both regression models (accelerated failure time (AFT) and Cox proportional hazard models (Cox PH)) and data mining techniques (regression trees, Bayesian additive regression trees (BART), and multivariate additive regression splines). We then validate our models against two other hurricanes. Our results indicate that BART yields the best prediction accuracy and that it is possible to predict outage durations with reasonable accuracy. © 2011 Society for Risk Analysis.

  20. Programming and organisation of unit outages

    International Nuclear Information System (INIS)

    Hadjidakis, Y.; Cezard, C.; Audierne, J.

    1997-01-01

    The unit outages are scheduled every 12 to 18 months for fuel reloading. The success of these shutdowns, with the whole of objectives (duration, dosimetry, costs), with maintaining the safety level, is an important stake for the competitiveness of the enterprise. In this article are described the planning, the experience return and the organisation of scheduled shutdowns which have contribute to the improvement of availability. (N.C.)

  1. Exact Outage Probability of Dual-Hop CSI-Assisted AF Relaying Over Nakagami-m Fading Channels

    KAUST Repository

    Xia, Minghua; Aissa, Sonia; Wu, Yik-Chung

    2012-01-01

    to evaluate the outage performance of the system under study. The analytical results of outage probability coincide exactly with Monte-Carlo simulation results and outperform the previously reported upper bounds in the low and medium SNR regions.

  2. Synergistic Use of Nighttime Satellite Data, Electric Utility Infrastructure, and Ambient Population to Improve Power Outage Detections in Urban Areas

    Directory of Open Access Journals (Sweden)

    Tony A. Cole

    2017-03-01

    Full Text Available Natural and anthropogenic hazards are frequently responsible for disaster events, leading to damaged physical infrastructure, which can result in loss of electrical power for affected locations. Remotely-sensed, nighttime satellite imagery from the Suomi National Polar-orbiting Partnership (Suomi-NPP Visible Infrared Imaging Radiometer Suite (VIIRS Day/Night Band (DNB can monitor power outages in disaster-affected areas through the identification of missing city lights. When combined with locally-relevant geospatial information, these observations can be used to estimate power outages, defined as geographic locations requiring manual intervention to restore power. In this study, we produced a power outage product based on Suomi-NPP VIIRS DNB observations to estimate power outages following Hurricane Sandy in 2012. This product, combined with known power outage data and ambient population estimates, was then used to predict power outages in a layered, feedforward neural network model. We believe this is the first attempt to synergistically combine such data sources to quantitatively estimate power outages. The VIIRS DNB power outage product was able to identify initial loss of light following Hurricane Sandy, as well as the gradual restoration of electrical power. The neural network model predicted power outages with reasonable spatial accuracy, achieving Pearson coefficients (r between 0.48 and 0.58 across all folds. Our results show promise for producing a continental United States (CONUS- or global-scale power outage monitoring network using satellite imagery and locally-relevant geospatial data.

  3. Data Transmission Scheme Using Mobile Sink in Static Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.

  4. Study on optimization of normal plant outage work plan for nuclear power plants

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Kodama, Noriko; Takase, Kentaro; Miya, Kenzo

    2011-01-01

    This paper discusses maintenance optimization in maintenance implementation stage following maintenance planning stage in nuclear power plants and proposes a methodology to get an optimum maintenance work plan. As a result of consideration, the followings were obtained. (1) The quantitative evaluation methodology for optimizing maintenance work plan in nuclear power plants was developed. (2) Utilizing the above methodology, a simulation analysis of maintenance work planning for BWR's PLR and RHR systems in a normal plant outage was performed. Maintenance cost calculation in several cases was carried out on the condition of smoothening man loading over the plant outage schedule as much as possible. (3) As a result of the simulation, the economical work plans having a flat man loading over the plant outage schedule were obtained. (author)

  5. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  6. Kozloduy NPP units 5 and 6 modernization program. Measures implementation in outages

    International Nuclear Information System (INIS)

    Naydenov, N.; Mignone, O.

    2004-01-01

    The units 5 and 6 modernization program is a highly demanding program composed by many plant modifications and studies about plant conditions. The program measures implementation during the units outages represents a challenge by the need to compromise shut down duration with the workload related to measures installation. The units shutdown duration should be kept to the planned duration. In parallel, contractors work has to be organized, planned and performed to allow successful measures completion. In accordance with the contract requirements, contractors prepare installation documents which comprise all activities to be performed during the installation and testing of the measures. The subcontractors complement these installation documents with the project organization and execution documents, which include the manpower skills, qualifications, work orders, and other important installation instructions and information. Contractors prepared detailed installation schedules, and these were integrated by Parsons E and C in the Integrated installation schedule. The integrated schedule proved to be useful to identify possible area usage conflicts and manpower overlapping, with appropriate results for electrical, instrumentation and control work, and for the utilization of the polar crane in the containment building. Contractors installation schedules were updated on a weekly basis, showing variances versus the target, and manpower histograms for the resource loading. Organization of contractors work was supported by KNPP plant outage meetings, in which status and problems were addressed, and solution and/or corrective actions defined for further implementation. KNPP meetings were planned on a daily basis for most relevant or critical measures, or on a weekly basis for less intensive measures. KNPP meetings proved to be an excellent communication tool for keeping the measures under control and monitoring KNPP defined personnel responsible for authorizing changes, in

  7. The course of a true outage never ran so smooth

    International Nuclear Information System (INIS)

    Harberts, Craig

    1994-01-01

    In order to improve the performance of outages at San Onofre Nuclear Generating Station in California, the working structure of the entire organisation has had to be radically altered, in order to bring San Onofre up to standard with other nuclear plants known to be performing well. Working systems were simplified and efficiency improved. Personnel needed to be remotivated to work cooperatively and the outage budget process was revised to include input from all relevant organizations, historical costs and benchmark information from other plants that performed well. Finally, the decision making and teamwork culture has altered radically at San Onofre over the last decade. (UK)

  8. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  9. Outage Analysis of Asymmetric RF-FSO Systems

    KAUST Repository

    Ansari, Imran Shafique

    2017-03-20

    In this work, the outage performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) channels cascaded with free-space optical (FSO) links is presented. The RF links are modeled by the Rayleigh fading distribution and the FSO links are modeled by Malaga (M) turbulence distribution. The FSO links account for pointing errors and both types of detection techniques (i.e. heterodyne detection as well as intensity modulation/direct detection (IM/DD)). Transmit diversity is applied at the source, selection combining is applied at the destination, and the relay is equipped with single RF receive antenna and single aperture for relaying the information over FSO links. With this model, a new exact closed-form expression is derived for the outage probability of the end-to- end signal-to-noise ratio of such communication systems in terms of the Meijer\\'s G function under fixed amplify-and-forward relay scheme. All new analytical results are verified via computer-based Monte-Carlo simulations and are illustrated by some selected numerical results.

  10. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    Science.gov (United States)

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-02-19

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance.

  11. Large Scale Experiments of Multihop Networks in Mobile Scenarios

    Directory of Open Access Journals (Sweden)

    Yacine Benchaïb

    2016-03-01

    Full Text Available This paper presents the latest advances in our research work focused on VIRMANEL and SILUMOD, a couple of tools developed for research in wireless mobile multihop networks. SILUMOD is a domain specific language dedicated to the definition of mobility models. This language contains key- words and special operators that make it easy to define a mobility model and calculate the positions of a trajectory. These positions are sent to VIRMANEL, a tool that man- ages virtual machines corresponding to mobile nodes, emu- lates their movements and the resulting connections and dis- connections, and displays the network evolution to the user, thanks to its graphical user interface. The virtualization ap- proach we take here allows to run real code and to test real protocol implementations without deploying an important experimental platform. For the experimentation of a large number of virtual mobile nodes, we defined and implemented a new algorithm for the nearest neighbor search to find the nodes that are within communication range. We then car- ried out a considerable measurement campaign in order to evaluate the performance of this algorithm. The results show that even with an experiment using a large number of mobile nodes, our algorithm make it possible to evaluate the state of connectivity between mobile nodes within a reasonable time and number of operations.

  12. Verification and Enhancement of VIIRS Day-Night Band (DNB) Power Outage Detection Product

    Science.gov (United States)

    Burke, Angela; Schultz, Lori A.; Omitaomu, Olufemi; Molthan, Andrew L.; Cole, Tony; Griffin, Robert

    2017-01-01

    This case study of Hurricane Matthew (October 2016) uses the NASA Short-Term Prediction Research and Transition (SPoRT) Center DNB power outage product (using GSFC VIIRS DNB preliminary Black Marble product, Roman et al.. 2017) and 2013 LandScan Global population data to look for correlations between the post-event %-of-normal radiance and the utility company-reported outage numbers (obtained from EAGLE-1).

  13. Economic costs of electrical system instability and power outages caused by snakes on the Island of Guam

    Science.gov (United States)

    Fritts, T.H.

    2002-01-01

    The Brown Tree Snake, Boiga irregularis, is an introduced species on Guam where it causes frequent electrical power outages. The snake's high abundance, its propensity for climbing, and use of disturbed habitats all contribute to interruption of Guam's electrical service and the activities that depend on electrical power. Snakes have caused more than 1600 power outages in the 20-yr period of 1978–1997 and most recently nearly 200 outages per year. Single outages spanning the entire island and lasting 8 or more hours are estimated to cost in excess of $3,000,000 in lost productivity, but the costs of outages that involve only parts of the island or those of shorter durations are more difficult to quantify. Costs to the island's economy have exceeded $4.5 M $4.5M"> per year over a 7-yr period without considering repair costs, damage to electrical equipment, and lost revenues. Snakes pose the greatest problem on high voltage transmission lines, on transformers, and inside electrical substations.

  14. Psychosocial work strain of maintenance personnel during annual outage and normal operation in a nuclear power plant

    International Nuclear Information System (INIS)

    Jacobsson, L.; Svensson, O.

    1991-01-01

    This paper reports on a study which evaluates psychosocial work demands during the annual outage for a maintenance work group in a nuclear power plant. The study is based on a stress paradigm and it has been asserted that increased work strain would have a negative effect on performance. Nineteen workers, aged 20-55 years, participated in the study. The subjects filled out a questionnaire comparing work strain during annual outage and normal operation. During the outage period a 3-shift 24-hour work schedule, including nightwork, was used (working hours during normal operation was 7-16). Increased demands on concentration and vigilance, increased time pressure and strain on social relations within the group were found to characterize work during annual outage. Interestingly, for specific work tasks an association was found between the risk of making errors and high psychological workload. Increased work strain, shiftwork including nightwork and reduced social support are important psychosocial risk factors that might contribute to human error during the outage period

  15. IMPROVING THE TRANSMISSION PERFORMANCE BASED ON MINIMIZING ENERGY IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2015-06-01

    Full Text Available Networking is collectively no of mobile nodes allocate users to correctly detect a distant environment. These wireless mobile networks want strong but simple, scalable, energy efficient and also self organize routing algorithms. In Mobile technology small quantity of power electronics and less power radio frequency have permit the expansion of small, comparatively economical and less power nodes, are associated in a wireless mobile networkIn this study we proposed method are: energy effectiveness, energetic occurrence zone and multiple hop TRANSMIT, taking into concern between the energy of transmit nodes and distance from the transmit node to the trusted neighbor node, link weight energy utilization and distance are measured as most important constraint for decide on greatest possible path from Zone Head (ZH to the neighbor node. In this we use the different constraints and lessen the quantity of distribution messages during the Transmit node choice point to decrease the energy utilization of the complete network.

  16. Proceedings of a joint OECD/NEA-IAEA symposium on human factors and organisation in NPP maintenance outages: impact on safety

    International Nuclear Information System (INIS)

    1995-01-01

    The sessions of this conference dealt with outage strategy and methods (in Sweden, France and United States), the organisation and management of outages (organisation during refuelling shutdowns in France, safety approaches in France, in the USA, in Canada, in the United Kingdom and in Sweden), case studies and lessons learned (in France, Korea, Sweden, UK, USA), regulatory aspects of outages (UK, Germany, Mexico, France), the development of outage techniques

  17. Methodology if inspections to carry out the nuclear outages model

    International Nuclear Information System (INIS)

    Aycart, J.; Mortenson, S.; Fourquet, J. M.

    2005-01-01

    Before the nuclear generation industry was deregulated in the United States, refueling and maintenance outages in nuclear power plants usually lasted orotund 100 days. After deregulation took effect, improved capability factors and performances became more important. As a result, it became essential to reduce the critical path time during the outage, which meant that activities that had typically been done in series had to be executed in parallel. The new outage model required the development of new tools and new processes, The 360-degree platform developed by GE Energy has made it possible to execute multiple activities in parallel. Various in-vessel visual inspection (IVVI) equipments can now simultaneously perform inspections on the pressurized reactor vessel (RPV) components. The larger number of inspection equipments in turn results in a larger volume of data, with the risk of increasing the time needed for examining them and postponing the end of the analysis phase, which is critical for the outage. To decrease data analysis times, the IVVI Digitalisation process has been development. With this process, the IVVI data are sent via a high-speed transmission line to a site outside the Plant called Center of Excellence (COE), where a team of Level III experts is in charge of analyzing them. The tools for the different product lines are being developed to interfere with each other as little as possible, thus minimizing the impact of the critical path on plant refueling activities. Methods are also being developed to increase the intervals between inspection. In accordance with the guidelines of the Boiling Water Reactor Vessel and Internals project (BWRVIP), the intervals between inspections are typically longer if ultrasound volumetric inspections are performed than if the scope is limited to IVVI. (Author)

  18. Localization with a mobile beacon in underwater acoustic sensor networks.

    Science.gov (United States)

    Lee, Sangho; Kim, Kiseon

    2012-01-01

    Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB). The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node's location and then the node's location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  19. Mobility Management Algorithms for the Client-Driven Mobility Frame System–Mobility from a Brand New Point of View

    Directory of Open Access Journals (Sweden)

    Péter Fülöp

    2009-01-01

    Full Text Available In this paper a new mobility management is introduced. The main idea in this approach is that the mobil node should manage the mobility for itself not the network. The network nodes provide only basic services for mobile entities: connectivity and administration. We construct a framework called the Client-based Mobility Frame System (CMFS for this mobility environment. We developed the CMFS protocol as a solution over IPv4 and we show how to use Mobile IPv6 to realize our concept. We propose some basic mobility management solutions that can be implemented into the mobile clients and give details about a working simulation of a complete Mobility Management System. Example mobility management approaches such as the centralized- and hierarchical- or cellular-like ones are also defined and hints are given what kind of algorithms might be implemented upon the Client-based Mobility Frame System over IPv4 and IPv6 as well. We introduce some example algorithms that can work with the CMFS making mobility management efficient by minimizing signalling load on the network. In the present work modeling and detailed discussion on the parameters of the algorithms is given and comparison to existing mobility approaches and protocols is done. We prepared a simulation to test our protocol and to back up the proposals we provide the reader with simulation results. We stress that still one the most important benefit of our findings is that all the MNs can run different management strategies and can optimize mobility for themselves.

  20. Impact of Co-Channel Interference on the Outage Performance Under Multiple Type II Relay Environments

    KAUST Repository

    Choi, Seyeong; Alouini, Mohamed-Slim; Nam, Sung Sik

    2017-01-01

    In this paper, through an exact analysis of the outage probability, we investigate the impact of co-channel interference (CCI) on the outage performance of type II (or user equipment) relay under multiple-relay environments considering the selection combining-based relay selection scheme with the decode-and-forward protocol. We consider the signal to interference plus noise ratio (SINR) over both independent and identically distributed and independent but non-identically distributed fading channels. To fully take into account the effect of CCI, we adopt a more practical parameter such as the CCI coefficient. The major difficulty in the analysis resides in the determination of the statistics of the output SINR. To settle this problem, we first present the general but relatively simplified expressions for the statistics and then the related outage probability in closed-form. Furthermore, to consider more practical scenario, based on the fact that the number of participating relays can be random, we investigate the average outage probability by averaging the number of participating relays.

  1. Impact of Co-Channel Interference on the Outage Performance Under Multiple Type II Relay Environments

    KAUST Repository

    Choi, Seyeong

    2017-11-15

    In this paper, through an exact analysis of the outage probability, we investigate the impact of co-channel interference (CCI) on the outage performance of type II (or user equipment) relay under multiple-relay environments considering the selection combining-based relay selection scheme with the decode-and-forward protocol. We consider the signal to interference plus noise ratio (SINR) over both independent and identically distributed and independent but non-identically distributed fading channels. To fully take into account the effect of CCI, we adopt a more practical parameter such as the CCI coefficient. The major difficulty in the analysis resides in the determination of the statistics of the output SINR. To settle this problem, we first present the general but relatively simplified expressions for the statistics and then the related outage probability in closed-form. Furthermore, to consider more practical scenario, based on the fact that the number of participating relays can be random, we investigate the average outage probability by averaging the number of participating relays.

  2. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  3. REDISTRIBUTION OF BASE STATIONS LOAD IN MOBILE COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Igor Ruban

    2017-09-01

    Full Text Available The subject matter of the article is the processes of load distribution in mobile communication networks. The object of research is the handover. The goal is to develop a method for redistributing the load between neighboring areas for mobile nodes. The considered base stations are supposed to have the signal-to-noise ratios that are equal or close. The methods that are used: methods of system analysis, methods of digital signal processing. The following results are obtained. The method that allows mobile nodes, whose signal-to-noise ratios are equal or close, to switch to a less loaded base station. This method allows the base station to launch the handover process enabling more even distribution of the load from mobile nodes among neighboring base stations in wireless and mobile networks. In the suggested modification of the method, the function assessing the bandwidth of the uplink channel is added to the base stations, as well a threshold value for using its bandwidth. Thus, when the current value of bandwidth reaches the threshold, the base station starts sending out a message to all mobile nodes and verifies free neighboring areas for switching over mobile nodes. If there are adjacent areas with a lower load, the base station notifies all potential candidates about the necessity of their switching over. The handover process is launched when the available bandwidth of the base station decreases below a certain threshold. Therefore, it is possible to optimize the operation of the WiMAX network with respect to the criterion of the total bandwidth capacity of the base stations. Besides, the results of the comparative analysis of the handover process in networks based on the WiMAX technology that are obtained using the OpNet simulation environment are presented. Conclusions.The suggested approach can be used to improve the basic software of mobile communication networks. When moving a node from one area to another one in access servers, the

  4. Partner cooperation with decode-and-forward: Closed-form outage analysis and comparison

    KAUST Repository

    Benjillali, Mustapha

    2013-01-01

    In this paper, we investigate the outage performance of "partner cooperation" based on opportunistic Decodeand- Forward with constrained partial selection and reactive relaying strategies in dual-hop cooperative Nakagami-m fading links. The source/destination, which is based on the unique knowledge of local channel state information, selects the best relay to increase the chances of cooperation in both uplink and downlink communications when the direct link is also available. After deriving new expressions for the cumulative distribution functions of the variables of interest, the outage probability of the system is obtained in closed-form. We also derive the ε-outage capacity in different particular cases, and the obtained results - when the channel model is reduced to a Rayleigh fading - either are new or correspond to those previously obtained in other works. Simulation results confirm the accuracy of our analysis for a large selection of system and fading parameters and provide a new insight into the design and optimization of cooperative configurations. © 2012 IEEE.

  5. Improvement of availability of PWR nuclear plants through the reduction of the time required for refueling/maintenance outages

    International Nuclear Information System (INIS)

    Mayers, J.B.; Soth, L.G.

    1978-04-01

    The objective of the project, conducted by Commonwealth Research Corporation and Westinghouse Electric Corporation, is to identify improvements in procedures and equipment which will reduce the time required for refueling/maintenance outages at PWR nuclear power plants. The outage of Commonwealth Edison Zion Station Unit 1 in March through May of 1976 was evaluated to identify those items which caused delays and those work activities that offer the potential for significant improvements that could reduce the overall duration of the outage and achieve an improvement in the plant's availability for power production. Modifications in procedures have been developed and were evaluated during one or more outages in 1977. Conceptual designs have been developed for equipment modifications to the refueling system that could reduce the time required for the refueling portion of the outage. The purpose of the interim report is to describe those conceptual designs and to assess their impact upon future outages. Recommendations are included for the implementation of these equipment improvements in a continuation of this program as a demonstration of plant availability benefits that can be realized in PWR nuclear plants already in operation or under construction

  6. Outage Analysis and Optimization of SWIPT in Network-Coded Two-Way Relay Networks

    Directory of Open Access Journals (Sweden)

    Ruihong Jiang

    2017-01-01

    Full Text Available This paper investigates the outage performance of simultaneous wireless information and power transfer (SWIPT in network-coded two-way relay systems, where a relay first harvests energy from the signals transmitted by two sources and then uses the harvested energy to forward the received information to the two sources. We consider two transmission protocols, power splitting two-way relay (PS-TWR and time switching two-way relay (TS-TWR protocols. We present two explicit expressions for the system outage probability of the two protocols and further derive approximate expressions for them in high and low SNR cases. To explore the system performance limits, two optimization problems are formulated to minimize the system outage probability. Since the problems are nonconvex and have no known solution methods, a genetic algorithm- (GA- based algorithm is designed. Numerical and simulation results validate our theoretical analysis. It is shown that, by jointly optimizing the time assignment and SWIPT receiver parameters, a great performance gain can be achieved for both PS-TWR and TS-TWR. Moreover, the optimized PS-TWR always outperforms the optimized TS-TWR in terms of outage performance. Additionally, the effects of parameters including relay location and transmit powers are also discussed, which provide some insights for the SWIPT-enabled two-way relay networks.

  7. CoAP-Based Mobility Management for the Internet of Things.

    Science.gov (United States)

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-07-03

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss.

  8. CoAP-Based Mobility Management for the Internet of Things

    Science.gov (United States)

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-01-01

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214

  9. CoAP-Based Mobility Management for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2015-07-01

    Full Text Available Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6, Hierarchical Mobile IPv4/v6 (HMIPv4/v6, in terms of the handover latency and packet loss.

  10. HealthNode: Software Framework for Efficiently Designing and Developing Cloud-Based Healthcare Applications

    Directory of Open Access Journals (Sweden)

    Ho-Kyeong Ra

    2018-01-01

    Full Text Available With the exponential improvement of software technology during the past decade, many efforts have been made to design remote and personalized healthcare applications. Many of these applications are built on mobile devices connected to the cloud. Although appealing, however, prototyping and validating the feasibility of an application-level idea is yet challenging without a solid understanding of the cloud, mobile, and the interconnectivity infrastructure. In this paper, we provide a solution to this by proposing a framework called HealthNode, which is a general-purpose framework for developing healthcare applications on cloud platforms using Node.js. To fully exploit the potential of Node.js when developing cloud applications, we focus on the fact that the implementation process should be eased. HealthNode presents an explicit guideline while supporting necessary features to achieve quick and expandable cloud-based healthcare applications. A case study applying HealthNode to various real-world health applications suggests that HealthNode can express architectural structure effectively within an implementation and that the proposed platform can support system understanding and software evolution.

  11. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  12. Strategies for a better performance of RPL under mobility in wireless sensor networks

    Science.gov (United States)

    Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.

    2017-09-01

    A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.

  13. International outage coding system for nuclear power plants. Results of a co-ordinated research project

    International Nuclear Information System (INIS)

    2004-05-01

    The experience obtained in each individual plant constitutes the most relevant source of information for improving its performance. However, experience of the level of the utility, country and worldwide is also extremely valuable, because there are limitations to what can be learned from in-house experience. But learning from the experience of others is admittedly difficult, if the information is not harmonized. Therefore, such systems should be standardized and applicable to all types of reactors satisfying the needs of the broad set of nuclear power plant operators worldwide and allowing experience to be shared internationally. To cope with the considerable amount of information gathered from nuclear power plants worldwide, it is necessary to codify the information facilitating the identification of causes of outages, systems or component failures. Therefore, the IAEA established a sponsored Co-ordinated Research Project (CRP) on the International Outage Coding System to develop a general, internationally applicable system of coding nuclear power plant outages, providing worldwide nuclear utilities with a standardized tool for reporting outage information. This TECDOC summarizes the results of this CRP and provides information for transformation of the historical outage data into the new coding system, taking into consideration the existing systems for coding nuclear power plant events (WANO, IAEA-IRS and IAEA PRIS) but avoiding duplication of efforts to the maximum possible extent

  14. Management of planned unit outages

    International Nuclear Information System (INIS)

    Brune, W.

    1984-01-01

    Management of planned unit outages at the Bruno Leuschner Nuclear Power Plant is based on the experience gained with Soviet PWR units of the WWER type over a period of more than 50 reactor-years. For PWR units, planned outages concentrate almost exclusively on annual refuellings and major maintenance of the power plant facilities involved. Planning of such major maintenance work is based on a standardized basic network plan and a catalogue of standardized maintenance and inspection measures. From these, an overall maintenance schedule of the unit and partial process plans of the individual main components are derived (manually or by computer) and, in the temporal integration of major maintenance at every unit, fixed starting times and durations are determined. More than 75% of the maintenance work at the Bruno Leuschner Nuclear Power Plant is carried out by the plant's own maintenance personnel. Large-scale maintenance of every unit is controlled by a special project head. He is assisted by commissioners, each of whom is responsible for his own respective item. A daily control report is made. The organizational centre is a central office which works in shifts around the clock. All maintenance orders and reports of completion pass through this office; thus, the overall maintenance schedule can be corrected daily. To enforce the proposed operational strategy, suitable accompanying technical measures are required with respect to effective facility monitoring and technical diagnosis, purposeful improvement of particularly sensitive components and an increase in the effectiveness of maintenance work by special technologies and devices. (author)

  15. On the benefits of location-based relay selection in mobile wireless networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2016-01-01

    We consider infrastructure-based mobile networks that are assisted by a single relay transmission where both the downstream destination and relay nodes are mobile. Selecting the optimal transmission path for a destination node requires up-to-date link quality estimates of all relevant links....... If the relay selection is based on link quality measurements, the number of links to update grows quadratically with the number of nodes, and measurements need to be updated frequently when nodes are mobile. In this paper, we consider a location-based relay selection scheme where link qualities are estimated...... from node positions; in the scenario of a node-based location system such as GPS, the location-based approach reduces signaling overhead, which in this case only grows linearly with the number of nodes. This paper studies these two relay selection approaches and investigates how they are affected...

  16. Control Room Tasks During Refueling in Ringhals 1 Nuclear Power Plant - Operator performance during refuelling outages

    International Nuclear Information System (INIS)

    Stroebeck, Einar; Olausson, Jesper; Van Gemst, Paul

    1998-01-01

    This paper discusses the performance and tasks of the operators in the control room during refuelling outages. Analyses of such events have, during the last years, shown that the risk for nuclear accidents is not negligible compared with the risk at higher reactor power levels. Some experts have the opinion that, due to mistakes during an outage, the risk for such accidents during the outage and other accidents later on during power operation is higher than in other plant situations. The high risk level is mainly a result of errors at maintenance actions and supervision of lining up of safety systems. Most of the control rooms in existing NPPs were designed more than 10 years ago. At that time the activities and the tasks for the operators were not very well understood. Procedures for refuelling and other activities during the outages were not described very well. Often the utility organisation for refuelling outages was not established at the start of the control room design. Experience from operation during many years has shown that the performance of operators can be improved in existing plant, and thus risks be reduced, by upgrading the control room. These issues have been studied as a part of the modernisation project for Ringhals 1, an ABB Atom BWR owned by Vattenfall AB in Sweden. The paper will describe the working model for upgrading the control room and important issues to take care of with respect to refuelling outages. The identified issues will be used as the input for improving control room philosophy and the individual technical systems. (authors)

  17. Integrated head area design of KNGR to reduce refueling outage duration

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Woo Tae; Park, Chi Yong; Kim, In Hwan; Kim, Dae Woong [Korea Electric Power Research Institute, Taejon (Korea, Republic of)

    1998-12-31

    In the design of KNGR (Korea Next Generation Reactor), we believe that economy is one of the most important factors to be considered. Thus, we reviewed and evaluated the consequences of designing the head area into an integrated package from an economical point of view. The refueling outage durations of the nuclear power plants currently in operation in Korea, some having and others not having integrated head package, are compared. This paper discusses the characteristics of head area design and the critical design issues of KNGR head area to evaluate the effect of the head area characteristics on the outage duration. 8 refs., 4 figs. (Author)

  18. Integrated head area design of KNGR to reduce refueling outage duration

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Woo Tae; Park, Chi Yong; Kim, In Hwan; Kim, Dae Woong [Korea Electric Power Research Institute, Taejon (Korea, Republic of)

    1997-12-31

    In the design of KNGR (Korea Next Generation Reactor), we believe that economy is one of the most important factors to be considered. Thus, we reviewed and evaluated the consequences of designing the head area into an integrated package from an economical point of view. The refueling outage durations of the nuclear power plants currently in operation in Korea, some having and others not having integrated head package, are compared. This paper discusses the characteristics of head area design and the critical design issues of KNGR head area to evaluate the effect of the head area characteristics on the outage duration. 8 refs., 4 figs. (Author)

  19. Protocol Design and Performance Analysis of Multiuser Mixed RF and Hybrid FSO/RF Relaying With Buffers

    KAUST Repository

    Al-Eryani, Yasser F.

    2018-03-07

    In this paper, a multiuser mixed radio frequency (RF) and hybrid free-space optical (FSO)/RF system is considered, where multiple mobile users transmit their data to an intermediate decode-and-forward relay node through RF links using a virtual multiple-input multipleoutput (MIMO) system, and the relay node forwards the multiplexed data of all users through a FSO link that is supported by a RF MIMO backup system to the destination. The relay node is equipped with a buffer in the physical layer for temporal storage of the users\\' data until the best channel conditions at the relay-destination link aremet. For this communication setup, we first propose a transmission protocol that achieves a multiplexing gain through a virtual MIMO system. After that, we derive closed-form expressions for the end-to-end outage probability, asymptotic outage probability, average symbol error rate, and the ergodic capacity when considering the delay-tolerant (finite buffer size) scenario. The results show that buffering in the physical layer provides a significant enhancement to the system performance (outage, error rate, and ergodic capacity). It is also found that pointing error and severe weather turbulence conditions become more tolerable with the existence of the relay\\'s buffer and RF backup link (in the second hop). In addition, the proposed virtual MIMO scheme shows a significant performance enhancement at a high number of receiving antennas, which introduces potential lowcomplexity diversity gain-based massive MIMO schemes.

  20. Protocol Design and Performance Analysis of Multiuser Mixed RF and Hybrid FSO/RF Relaying With Buffers

    KAUST Repository

    Al-Eryani, Yasser F.; Salhab, Anas; Zummo, Salam A.; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, a multiuser mixed radio frequency (RF) and hybrid free-space optical (FSO)/RF system is considered, where multiple mobile users transmit their data to an intermediate decode-and-forward relay node through RF links using a virtual multiple-input multipleoutput (MIMO) system, and the relay node forwards the multiplexed data of all users through a FSO link that is supported by a RF MIMO backup system to the destination. The relay node is equipped with a buffer in the physical layer for temporal storage of the users' data until the best channel conditions at the relay-destination link aremet. For this communication setup, we first propose a transmission protocol that achieves a multiplexing gain through a virtual MIMO system. After that, we derive closed-form expressions for the end-to-end outage probability, asymptotic outage probability, average symbol error rate, and the ergodic capacity when considering the delay-tolerant (finite buffer size) scenario. The results show that buffering in the physical layer provides a significant enhancement to the system performance (outage, error rate, and ergodic capacity). It is also found that pointing error and severe weather turbulence conditions become more tolerable with the existence of the relay's buffer and RF backup link (in the second hop). In addition, the proposed virtual MIMO scheme shows a significant performance enhancement at a high number of receiving antennas, which introduces potential lowcomplexity diversity gain-based massive MIMO schemes.

  1. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  2. Sensors for Detection of Misbehaving Nodes in MANETs

    OpenAIRE

    Klenk, Andreas; Kragl, Frank; Schlott, Stefan; Weber, Michael

    2004-01-01

    The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. A selfish node wants to preserve its resources while using the services of others and consuming their resources. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we focus on the detection and present different kinds of sensors that wil...

  3. A novel fusion methodology to bridge GPS outages for land vehicle positioning

    International Nuclear Information System (INIS)

    Chen, Wei; Li, Xu; Song, Xiang; Xu, Qimin; Li, Bin; Song, Xianghui

    2015-01-01

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle position information whether in open-sky environments or in Global Positioning System (GPS) denied environments. However, there remains a challenging task for land vehicles to achieve such positioning performance using low-cost sensors, especially microelectromechanical system (MEMS) sensors. In this paper, a novel and cost-effective fusion methodology to bridge GPS outages is proposed and applied in the Inertial Navigation System (INS)/GPS/ compass integrated positioning system. In the implementation of the proposed methodology, a key data preprocessing algorithm is first developed to eliminate the noise in inertial sensors in order to provide more accurate information for subsequent modeling. Then, a novel hybrid strategy incorporating the designed autoregressive model (AR model)-based forward estimator (ARFE) with Kalman filter (KF) is presented to predict the INS position errors during GPS outages. To verify the feasibility and effectiveness of the proposed methodology, real road tests with various scenarios were performed. The proposed methodology illustrates significant improvement in positioning accuracy during GPS outages. (paper)

  4. In/Out Status Monitoring in Mobile Asset Tracking with Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kwangsoo Kim

    2010-03-01

    Full Text Available A mobile asset with a sensor node in a mobile asset tracking system moves around a monitoring area, leaves it, and then returns to the region repeatedly. The system monitors the in/out status of the mobile asset. Due to the continuous movement of the mobile asset, the system may generate an error for the in/out status of the mobile asset. When the mobile asset is inside the region, the system might determine that it is outside, or vice versa. In this paper, we propose a method to detect and correct the incorrect in/out status of the mobile asset. To solve this problem, our approach uses data about the connection state transition and the battery lifetime of the mobile node attached to the mobile asset. The connection state transition is used to classify the mobile node as normal or abnormal. The battery lifetime is used to predict a valid working period for the mobile node. We evaluate our method using real data generated by a medical asset tracking system. The experimental results show that our method, by using the estimated battery life time or by using the invalid connection state, can detect and correct most cases of incorrect in/out statuses generated by the conventional approach.

  5. In/out status monitoring in mobile asset tracking with wireless sensor networks.

    Science.gov (United States)

    Kim, Kwangsoo; Chung, Chin-Wan

    2010-01-01

    A mobile asset with a sensor node in a mobile asset tracking system moves around a monitoring area, leaves it, and then returns to the region repeatedly. The system monitors the in/out status of the mobile asset. Due to the continuous movement of the mobile asset, the system may generate an error for the in/out status of the mobile asset. When the mobile asset is inside the region, the system might determine that it is outside, or vice versa. In this paper, we propose a method to detect and correct the incorrect in/out status of the mobile asset. To solve this problem, our approach uses data about the connection state transition and the battery lifetime of the mobile node attached to the mobile asset. The connection state transition is used to classify the mobile node as normal or abnormal. The battery lifetime is used to predict a valid working period for the mobile node. We evaluate our method using real data generated by a medical asset tracking system. The experimental results show that our method, by using the estimated battery life time or by using the invalid connection state, can detect and correct most cases of incorrect in/out statuses generated by the conventional approach.

  6. Refueling outage services in Spanish Nuclear Power Plants

    International Nuclear Information System (INIS)

    Landete, J. L.; Soto, M.; Nunuez, A.

    2007-01-01

    DOMINGUIS Group, through its 75 years of business development, has positioned as the Spanish leader Group in Services for the Nuclear Energy and Petrochemical Sectors. In this article, we present the most significant services summary that, through the companies that constitute DOMINGUIS Group, we have developed in Refueling Outage in Spanish Nuclear Power Plants. (Author)

  7. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  8. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  9. Outage performance of Decode-and-Forward partial selection in Nakagami-m fading channels

    KAUST Repository

    Benjillali, Mustapha

    2010-01-01

    In this paper, we investigate the outage performance of Decode-and-Forward with partial selection relaying in dualhop cooperative Nakagami-m fading links. The source, based on the unique knowledge of local first hop channel state information, selects the best relay to increase the chances of successful decoding and hence the possibility of cooperation when the direct link is also available. After deriving the exact distribution of the sum of two gamma variates with the same shape parameter, the outage probability of the system-with and without the direct link-is obtained in closed-form. We also derive the ε-outage capacity in different particular cases, and the obtained results- when the channel model is reduced to a Rayleigh fading-are either new or correspond to those previously obtained in other works. Simulation results confirm the accuracy of our analysis for a large selection of system and fading parameters. © 2009 IEEE.

  10. Shortened outage duration and increased safety with head assembly upgrade packages

    International Nuclear Information System (INIS)

    Leanne, M.; Lisien, P.E.; Plute, K.; Duran, J.

    2007-01-01

    To significantly reduce outage critical path duration and personnel radiation exposure, and to increase personnel safety, Westinghouse Electric Co., LLC has designed and installed upgrades to the existing head assemblies of operating pressurized water reactors. These upgrades are known as Head Assembly Upgrade Packages (HAUPs) or Simplified Head Assemblies (SHAs). Custom configurations are created from a set of standard elements to optimize the design for each unique containment, head assembly configuration, and licensing basis. Two primary options are available for implementation: a full HAUP or targeted component and system upgrades. Plants may achieve much of the outage savings, dose reduction, and safety improvements even with a more limited hardware scope. A range of improvements can be offered from integral missile shields, to redesigned duct work, radiation shields, and cable layout and connection optimization. The hardware changes are customized to target the scope that adds the most value for a given plant. While combining upgrades with a reactor vessel head (RVH) replacement adds some flexibility, it is not necessary. Some plants have chosen to implement targeted upgrades prior to a replacement RVH outage and then complete the remainder of the full HAUP during the replacement RVH outage. Three-dimensional computer aided design tools are used in the conceptual and detailed design phases to identify and avoid interferences between existing and replacement plant components. State-of-the-art computational fluid dynamics models for control drive mechanism (CDM) cooling systems are used to demonstrate the ability to maintain or improve the original design performance while greatly simplifying the disassembly/re-assembly activities. Likewise, state-of-the-art finite element analysis methods allow optimization of structural components while meeting code limits for design basis accident conditions. (authors)

  11. Thermal Hydraulic Assessment for Loss of SDCS Event During the Outage of CANDU Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jonghyun [Gnest, Inc. Taejon (Korea, Republic of); Lee, Kwangho; Oh, Haechol; Jun, Hwangyong [KEPRI, Taejon (Korea, Republic of)

    2006-07-01

    During the outage(overhaul) of the nuclear power plant, there are several operating states other than the full power state, that is 'Hot-Zero Power', 'Depressurized-Cooldown', and 'Partially Drained'. Until now safety assessment has not been done much for this operating state of CANDU type reactor worldwide. For the accuracy and confidence of PSA for the CANDU outage, the safety analysis is necessary. At the first stage, we analyzed the thermal hydraulic characteristics and safety of the postulated event of loss of shutdown cooling system (SDCS) during the partially drained state which is the longest one in the middle of outage period. As an analysis tool, this study uses the best estimate thermal hydraulic code, RELAP5/CANDU which was modified according to the CANDU specific characteristics and based on RELAP5.Mod3.

  12. Outage planning in nuclear power plants. A paradigm shift from an external towards an integrated project planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Rosemann, Andreas [Gesellschaft fuer integrierte Systemplanung (GiS) mbH, Weinheim (Germany)

    2014-05-15

    In nuclear power plants it is common to carry out the technical planning of the annual outage work orders in an Enterprise Application Management (EAM) system and to schedule the outage tasks in a project planning tool. The reason for this is historical: Former EAM systems did not (or just to some extend) offer the necessary functionalities to realise the scheduling of the outage; graphical support for the planning was not provided at all. Consequently, scheduling the annual outage was performed in a separate planning tool. Modern Enterprise Application Management (EAM) software builds on established project planning tools with respect to the functionalities and timing of work orders. As a standard they provide editable charts as well as a lot of functionalities which are required for scheduling the annual outage. The functional gap between the demanded planning functionalities and the functionalities provided by the EAM system has been significantly reduced. Depending on the deployed software itself it is possible to extend the EAM system with little effort (in comparison to the promising advantages) so that external project timing planning tools are not required any more. By shifting towards an integrated planning tool, efficiency in planning an outage as well as the quality of communication of the current planning status increases. Furthermore, the basis of information for work orders by the control room staff and therefore safety can be enhanced. (orig.)

  13. Outage planning in nuclear power plants. A paradigm shift from an external towards an integrated project planning tool

    International Nuclear Information System (INIS)

    Rosemann, Andreas

    2014-01-01

    In nuclear power plants it is common to carry out the technical planning of the annual outage work orders in an Enterprise Application Management (EAM) system and to schedule the outage tasks in a project planning tool. The reason for this is historical: Former EAM systems did not (or just to some extend) offer the necessary functionalities to realise the scheduling of the outage; graphical support for the planning was not provided at all. Consequently, scheduling the annual outage was performed in a separate planning tool. Modern Enterprise Application Management (EAM) software builds on established project planning tools with respect to the functionalities and timing of work orders. As a standard they provide editable charts as well as a lot of functionalities which are required for scheduling the annual outage. The functional gap between the demanded planning functionalities and the functionalities provided by the EAM system has been significantly reduced. Depending on the deployed software itself it is possible to extend the EAM system with little effort (in comparison to the promising advantages) so that external project timing planning tools are not required any more. By shifting towards an integrated planning tool, efficiency in planning an outage as well as the quality of communication of the current planning status increases. Furthermore, the basis of information for work orders by the control room staff and therefore safety can be enhanced. (orig.)

  14. Outage performance of opportunistic two-way amplify-and-forward relaying with outdated channel state information

    KAUST Repository

    Hwang, Kyusung

    2013-09-01

    In this paper, we study the outage performance of an amplify-and-forward (AF)-based two-way relaying (TWR) system with multiple relays where a single relay selection is performed based on outdated channel state information (CSI). Specifically, we propose a single relay selection scheme in AF-based TWR system under outdated CSI conditions. With this policy, we offer a statistical analysis of the signal-to-noise ratio per hop and analyze the outage probability with asymmetric outage thresholds based on CSI-assisted AF protocol. Additionally, we provide the exact and asymptotic expressions based on the provided statistical/joint statistical analyses of a dual-hop AF transmission. Finally, we verify our analytical results with some selected computer-based simulation results. © 1972-2012 IEEE.

  15. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

    OpenAIRE

    Raya, Maxim; Papadimitratos, Panagiotis; Aad, Imad; Jungels, Daniel; Hubaux, Jean-Pierre

    2007-01-01

    Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an ...

  16. Wireless Sensor Node for Autonomous Monitoring and Alerts in Remote Environments

    Science.gov (United States)

    Monacos, Steve P. (Inventor); Panangadan, Anand V. (Inventor)

    2015-01-01

    A method, apparatus, system, and computer program products provides personal alert and tracking capabilities using one or more nodes. Each node includes radio transceiver chips operating at different frequency ranges, a power amplifier, sensors, a display, and embedded software. The chips enable the node to operate as either a mobile sensor node or a relay base station node while providing a long distance relay link between nodes. The power amplifier enables a line-of-sight communication between the one or more nodes. The sensors provide a GPS signal, temperature, and accelerometer information (used to trigger an alert condition). The embedded software captures and processes the sensor information, provides a multi-hop packet routing protocol to relay the sensor information to and receive alert information from a command center, and to display the alert information on the display.

  17. Cost of Lightning Strike Related Outages of Visual Navigational Aids at Airports in the United States

    Science.gov (United States)

    Rakas, J.; Nikolic, M.; Bauranov, A.

    2017-12-01

    Lightning storms are a serious hazard that can cause damage to vital human infrastructure. In aviation, lightning strikes cause outages to air traffic control equipment and facilities that result in major disruptions in the network, causing delays and financial costs measured in the millions of dollars. Failure of critical systems, such as Visual Navigational Aids (Visual NAVAIDS), are particularly dangerous since NAVAIDS are an essential part of landing procedures. Precision instrument approach, an operation utilized during the poor visibility conditions, utilizes several of these systems, and their failure leads to holding patterns and ultimately diversions to other airports. These disruptions lead to both ground and airborne delay. Accurate prediction of these outages and their costs is a key prerequisite for successful investment planning. The air traffic management and control sector need accurate information to successfully plan maintenance and develop a more robust system under the threat of increasing lightning rates. To analyze the issue, we couple the Remote Monitoring and Logging System (RMLS) database and the Aviation System Performance Metrics (ASPM) databases to identify lightning-induced outages, and connect them with weather conditions, demand and landing runway to calculate the total delays induced by the outages, as well as the number of cancellations and diversions. The costs are then determined by calculating direct costs to aircraft operators and costs of passengers' time for delays, cancellations and diversions. The results indicate that 1) not all NAVAIDS are created equal, and 2) outside conditions matter. The cost of an outage depends on the importance of the failed system and the conditions that prevailed before, during and after the failure. The outage that occurs during high demand and poor weather conditions is more likely to result in more delays and higher costs.

  18. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  19. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2013-01-01

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  20. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  1. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  2. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  3. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  4. Outage performance of reactive cooperation in Nakagami-m fading channels

    KAUST Repository

    Benjillali, Mustapha; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate the outage performance of Decode-and-Forward with reactive relaying in dual-hop cooperetive Nakagaml-m fading links. The destination, based on the umque knowledge of local second hop channel state information, selects

  5. Outage performance of cognitive radio systems with Improper Gaussian signaling

    KAUST Repository

    Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2015-01-01

    design the SU signal by adjusting its transmitted power and the circularity coefficient to minimize the SU outage probability while maintaining a certain PU quality-of-service. Finally, we evaluate the proposed bounds and adaptive algorithms by numerical

  6. Community Core Evolution in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2013-01-01

    Full Text Available Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  7. Community core evolution in mobile social networks.

    Science.gov (United States)

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  8. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  9. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  10. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  12. A Study on the Frequency of Initiating Event of OPR-1000 during Outage Periods

    Energy Technology Data Exchange (ETDEWEB)

    Hong Jae Beol; Jae, Moo Sung [Hanyang Univ., Seoul (Korea, Republic of)

    2013-10-15

    These sources of data did not reflect the latest event data which have occurred during the PWR outage to the frequencies of initiating event Electric Power Research Institute(EPRI) in USA collected the data of loss of decay heat removal during outage from 1989 to 2009 and published technical report. Domestic operating experiences for LOOP is gathered in Operational Performance Information System for Nuclear Power Plant(OPIS). To reduce conservatism and obtain completeness for LPSD PSA, those data should be collected and used to update the frequencies. The frequencies of LOSDC and LOOP are reevaluated using the data of EPRI and OPIS in this paper. Quantification is conducted to recalculate core damage frequency(CDF), since the rate is changed. The results are discussed below. To make an accurate estimate of the initiating events of LPSD PSA, the event data were collected and the frequencies of initiating events were updated using Bayesian approach. CDF was evaluated through quantification. Δ CDF is -40% and the dominant contributor is pressurizer PSV stuck open event. The most of the event data in EPRI TR were collected from US nuclear power plant industry. Those data are not enough to evaluate outage risk precisely. Therefore, to reduce conservatism and obtain completeness for LPSD PSA, the licensee event report and domestic data should be collected and reflected to the frequencies of the initiating events during outage.

  13. 10 CFR 501.191 - Use of natural gas or petroleum for certain unanticipated equipment outages and emergencies...

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Use of natural gas or petroleum for certain unanticipated... Natural Gas or Petroleum for Emergency and Unanticipated Equipment Outage Purposes § 501.191 Use of natural gas or petroleum for certain unanticipated equipment outages and emergencies defined in section...

  14. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  15. A heuristic model for risk and cost impacts of plant outage maintenance schedule

    International Nuclear Information System (INIS)

    Mohammad Hadi Hadavi, S.

    2009-01-01

    Cost and risk are two major competing criteria in maintenance optimization problems. If a plant is forced to shutdown because of accident or fear of accident happening, beside loss of revenue, it causes damage to the credibility and reputation of the business operation. In this paper a heuristic model for incorporating three compelling optimization criteria (i.e., risk, cost, and loss) into a single evaluation function is proposed. Such a model could be used in any evaluation engine of outage maintenance schedule optimizer. It is attempted to make the model realistic and to address the ongoing challenges facing a schedule planner in a simple and commonly understandable fashion. Two simple competing schedules for the NPP feedwater system are examined against the model. The results show that while the model successfully addresses the current challenges for outage maintenance optimization, it properly demonstrates the dynamics of schedule in regards to risk, cost, and losses endured by maintenance schedule, particularly when prolonged outage and lack of maintenance for equipments in need of urgent care are of concern.

  16. Evaluation of allowed outage time using PRA results

    International Nuclear Information System (INIS)

    Johanson, G.

    1985-01-01

    In a probabilistic risk assessment (PRA) different measures of risk importance can be established. These measures can be used as a basis for further evaluation and determination of allowed outage time for specific components, within safety systems of a nuclear power plant. In order to optimize the allowed outage time (AOT) stipulated in the plant's Technical Specification it is necessary to create a methodology which could incorporate existing PRA data into a quantitative extrapolation. In order to evaluate the plant risk status due to AOT in a quantitative manner, the risk achievement worth is utilized. Risk achievement worth is defined as follows: to measure the worth of a feature, in achieving the present risk, one approach is to remove the feature and then determine how much the risk has increased. Thus, the risk achievement worth is formally defined to be the increase in risk if the feature were assumed not be there or to be failed. Another parameter of interest for this analysis is the shutdown risk increase. The shutdown risk achievement worth must be incorporated into the accident sequence risk achievement worth to arrive at an optimal set of plant specific AOTs

  17. An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks

    Science.gov (United States)

    Zhong, Peijun; Ruan, Feng

    2018-03-01

    With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.

  18. Lessons learned in planning ALARA/health physics support for major nuclear power plant outages

    International Nuclear Information System (INIS)

    Gilman, T.R.; Lesinski, M.L.

    1987-01-01

    Although as low as reasonably achievable (ALARA)/health physics is viewed as necessary support for nuclear power plant outage work, it can be the last area to which attention is given in preparing for a large-scope outage. Inadequate lead times cause last-minute preparations resulting in delays in planned work. The Dresden Unit 3 Recirculation Piping Replacement Project is examined from a planning viewpoint. The attention that was given the various areas of a comprehensive ALARA/health physics program is examined, and approximate recommended lead times are discussed. The discussion will follow a chronological path from project inception to the beginning stages of outage work. Initially, the scope of work needs to be assessed by individuals familiar with similar projects of equivalent magnitude. Those individuals need to be health physics professionals who understand the particular utility and/or the site's way of doing business. They should also possess a good understanding of preferred industry practices

  19. Study on European Nuclear Safety Practices during Planned Outages at Nuclear Power Plants

    International Nuclear Information System (INIS)

    2001-12-01

    The present project was aimed at providing: a description of the current status of nuclear safety practices during planned outages at nuclear power plants followed in Europe; the criteria for the safety analysis of future reactors at the design stage; proposing a set of recommendations on good practices and criteria leading to the improvement of nuclear safety during those conditions. The work was organised in 3 phases: Collecting data on current practices; Analysis of questionnaire answers and drawing up of safety good practices references and recommendations; Collecting relevant ideas related to the future reactors at design stage (European Pressurised Water Reactor, European Passive Plant project, European Utilities Requirements and Utilities Requirement Document project). The key element of the performed work was the detailed questionnaire, based on bibliographical review, expert experience and outage practices available in the working team. Different safety areas and activities were covered: outage context; nuclear safety; outage strategy, organisation and control; operating feedback; use of Probabilistic Safety Assessment. The questionnaire was answered by 12 European nuclear power plants, representing 9 different European countries and three different types of reactors (Pressurised Water Reactor, Boiling Water Reactor and Water Water Energy Reactor). Conclusions were drawn under the following headers: Organisational survey and generalities Organisational effectiveness Quality of maintenance Quality of operation Engineering support, management of modification Specific aspects Each analysed subject includes the following topics: Questions background with a summary and the aim of the questions. Current status, that describes common practices, as derived from the answers to the questionnaire, and some examples of good specific practices. Identified good practices. (author)

  20. Compressive sensing of high betweenness centrality nodes in networks

    Science.gov (United States)

    Mahyar, Hamidreza; Hasheminezhad, Rouzbeh; Ghalebi K., Elahe; Nazemian, Ali; Grosu, Radu; Movaghar, Ali; Rabiee, Hamid R.

    2018-05-01

    Betweenness centrality is a prominent centrality measure expressing importance of a node within a network, in terms of the fraction of shortest paths passing through that node. Nodes with high betweenness centrality have significant impacts on the spread of influence and idea in social networks, the user activity in mobile phone networks, the contagion process in biological networks, and the bottlenecks in communication networks. Thus, identifying k-highest betweenness centrality nodes in networks will be of great interest in many applications. In this paper, we introduce CS-HiBet, a new method to efficiently detect top- k betweenness centrality nodes in networks, using compressive sensing. CS-HiBet can perform as a distributed algorithm by using only the local information at each node. Hence, it is applicable to large real-world and unknown networks in which the global approaches are usually unrealizable. The performance of the proposed method is evaluated by extensive simulations on several synthetic and real-world networks. The experimental results demonstrate that CS-HiBet outperforms the best existing methods with notable improvements.

  1. Outage probability of dual-hop partial relay selection with feedback delay in the presence of interference

    KAUST Repository

    Al-Qahtani, Fawaz S.

    2011-09-01

    In this paper, we investigate the outage performance of a dual-hop relaying systems with partial relay selection and feedback delay. The analysis considers the case of Rayleigh fading channels when the relaying station as well as the destination undergo mutually independent interfering signals. Particularly, we derive the cumulative distribution function (c.d.f.) of a new type of random variable involving sum of multiple independent exponential random variables, based on which, we present closed-form expressions for the exact outage probability of a fixed amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols. Numerical results are provided to illustrate the joint effect of the delayed feedback and co-channel interference on the outage probability. © 2011 IEEE.

  2. Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangho Lee

    2012-04-01

    Full Text Available Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB. The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node’s location and then the node’s location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  3. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  4. Siemens capabilities to perform detailed fuel inspections during short outages

    International Nuclear Information System (INIS)

    Knecht, K.; Reparaz, A.

    1999-01-01

    Fuel inspection data are used to support development activities such as corrosion resistant cladding and advanced fuel assembly designs that will reach higher burnups. Increased inspection efforts are necessary to optimize fuel management and performance strategies. Additionally, there is an increasing trend to reduce outage time in Germany and abroad. Siemens has recently developed several timesaving systems for rapid inspection of fuel assemblies and core components. Siemens' focus in developing these systems has been to obtain data in reduced reactor outage time while increasing both the volume and the quality of the measured data. Mast sipping for PWRs is used for identifying leaking fuel assemblies and allows early detection of leaks during downloading of the fuel assemblies from the reactor. An In-Core sipping system for BWRs based on a hood technique to allow testing a full core within 16 hours is under development. (authors)

  5. Outage planning in nuclear power plants. A paradigm shift from an external towards an integrated project planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Rosemann, Andreas [Gesellschaft fuer integrierte Systemplanung (GIS) mbH, Weinheim (Germany)

    2014-07-01

    Latest demands on nuclear plant inspections are the ongoing actualisation of the outage plan on the basis of the current work progress and current events as well as the permanent access to the current planning status and work process of all people involved in the outage. Modern EAM systems (EAM: Enterprise Application Management) made up ground on established project planning tools with regard to functionalities for scheduling work orders. A shift towards an integrated planning in the EAM system increases the efficiency in the outage planning and improves the communication of current states of planning. (orig.)

  6. Outage planning in nuclear power plants. A paradigm shift from an external towards an integrated project planning tool

    International Nuclear Information System (INIS)

    Rosemann, Andreas

    2014-01-01

    Latest demands on nuclear plant inspections are the ongoing actualisation of the outage plan on the basis of the current work progress and current events as well as the permanent access to the current planning status and work process of all people involved in the outage. Modern EAM systems (EAM: Enterprise Application Management) made up ground on established project planning tools with regard to functionalities for scheduling work orders. A shift towards an integrated planning in the EAM system increases the efficiency in the outage planning and improves the communication of current states of planning. (orig.)

  7. Outage probability analysis of a secondary user in an underlay dual hop cognitive amplify and forward relay network

    Directory of Open Access Journals (Sweden)

    Kiran Chandra

    2016-09-01

    Full Text Available This paper presents the performance evaluation of a secondary user (SU in an underlay cognitive dual-hop relaying system considering instantaneous as well as average channel information of the interfering links (from the secondary source and relay to the primary receiver and the data link from the secondary source to relay, to calculate transmit power and amplifying gain of secondary system. Comparison of above mentioned cases is done for two different scenarios – with direct path and without direct path. We evaluate the performance considering two different diversity techniques namely as selection combining (SC and maximum ratio combining (MRC. The effect of different fading channels (Rayleigh and Nakagami on the outage performance of the SU for the two diversity techniques is also shown. The outage probability of the SU is reduced when the diversity techniques are used (with direct path as compared to the outage probability of SU without direct path. We find that the outage performance is better for instantaneous channel information as compared to average channel information for the links. We observe that MRC provides better performance than SC. Furthermore, this work shows that the outage performance of the SU has been improved when the Nakagami fading channel (m = 2 is considered instead of Rayleigh fading channel.

  8. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    Science.gov (United States)

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  9. An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-08-01

    Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  10. Relay selection in underlay cognitive networks with fixed transmission power nodes

    KAUST Repository

    Hussain, Syed Imtiaz

    2013-07-31

    Underlay cognitive networks operate simultaneously with primary networks satisfying stringent interference constraints, which reduces their transmission power and coverage area. To reach remote destinations, secondary sources use relaying techniques. Selecting the best relay among the available ones is a well known technique. Recently, selective cooperation is investigated in cognitive networks where the secondary nodes can adapt their transmission power to always satisfy the interference threshold. In this paper, we investigate a situation where the secondary nodes have a fixed transmission power and may violate the interference threshold. We present two relay selection schemes; the first one excludes the relays not satisfying the interference constraint and then picks up a relay from the remaining ones that can provide the maximum signal-to-noise ratio (SNR). The other scheme uses a quotient of the relay link SNR and the interference from the relay to the primary user and optimizes it to maximise the relay link SNR. We derive closed form expressions for outage probability, bit error rate, channel capacity and diversity of the system for both schemes by using tight approximations. We also study mutual effects of interference. Simulation results confirm the analytical results and reveal that the relay selection is feasible at low SNRs. Copyright © 2013 John Wiley & Sons, Ltd.

  11. Efficient Simulation of the Outage Probability of Multihop Systems

    KAUST Repository

    Ben Issaid, Chaouki; Alouini, Mohamed-Slim; Tempone, Raul

    2017-01-01

    In this paper, we present an efficient importance sampling estimator for the evaluation of the outage probability of multihop systems with amplify-and-forward channel state-information-assisted. The proposed estimator is endowed with the bounded relative error property. Simulation results show a significant reduction in terms of number of simulation runs compared to naive Monte Carlo.

  12. Efficient Simulation of the Outage Probability of Multihop Systems

    KAUST Repository

    Ben Issaid, Chaouki

    2017-10-23

    In this paper, we present an efficient importance sampling estimator for the evaluation of the outage probability of multihop systems with amplify-and-forward channel state-information-assisted. The proposed estimator is endowed with the bounded relative error property. Simulation results show a significant reduction in terms of number of simulation runs compared to naive Monte Carlo.

  13. Changing Trends in Modeling Mobility

    Directory of Open Access Journals (Sweden)

    Aarti Munjal

    2012-01-01

    Full Text Available A phenomenal increase in the number of wireless devices has led to the evolution of several interesting and challenging research problems in opportunistic networks. For example, the random waypoint mobility model, an early, popular effort to model mobility, involves generating random movement patterns. Previous research efforts, however, validate that movement patterns are not random; instead, human mobility is predictable to some extent. Since the performance of a routing protocol in an opportunistic network is greatly improved if the movement patterns of mobile users can be somewhat predicted in advance, several research attempts have been made to understand human mobility. The solutions developed use our understanding of movement patterns to predict the future contact probability for mobile nodes. In this work, we summarize the changing trends in modeling human mobility as random movements to the current research efforts that model human walks in a more predictable manner. Mobility patterns significantly affect the performance of a routing protocol. Thus, the changing trend in modeling mobility has led to several changes in developing routing protocols for opportunistic networks. For example, the simplest opportunistic routing protocol forwards a received packet to a randomly selected neighbor. With predictable mobility, however, routing protocols can use the expected contact information between a pair of mobile nodes in making forwarding decisions. In this work, we also describe the previous and current research efforts in developing routing protocols for opportunistic networks.

  14. Combined centralised and distributed mechanism for utilisation of node association in broadband wireless network

    Science.gov (United States)

    Ulvan, A.; Ulvan, M.; Pranoto, H.

    2018-02-01

    Mobile broadband wireless access system has the stations that might be fixed, nomadic or mobile. Regarding the mobility, the node association procedure is critical for network entry as well as network re-entry during handover. The flexibility and utilisation of MAC protocols scheduling have an important role. The standard provides the Partition Scheme as the scheduling mechanism which separates the allocation of minislots for scheduling. However, minislots cannot be flexibly reserved for centralised and distributed scheduling. In this paper we analysed the scheduling mechanism to improve the utilisation of minislots allocation during the exchange of MAC massages. The centralised and distributed scheduling is implemented in some topology scenarios. The result shows the proposed mechanism has better performance for node association than partition scheme.

  15. Outages of electric power supply resulting from cable failures Boston Edison Company system

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-07-01

    Factual data are provided regarding 5 electric power supply interruptions that occurred in the Boston Metropolitan area during April to June, 1979. Common to all of these outages was the failure of an underground cable as the initiating event, followed by multiple equipment failures. There was significant variation in the voltage ratings and types of cables which failed. The investigation was unable to delineate a single specific Boston Edison design operating or maintenance practice that could be cited as the cause of the outages. After reviewing the investigative report the following actions were recommended: the development and implementation of a plan to eliminate the direct current cable network; develop a network outage restoration plan; regroup primary feeder cables wherever possible to minimize the number of circuits in manholes, and to separate feeders to high load density areas; develop a program to detect incipient cable faults; evaluate the separation of the north and south sections of Back Bay network into separate networks; and, as a minimum, install the necessary facilities to make it possible to re-energize one section without interfering with the other; and re-evaluate the cathodic protection scheme where necessary. (LCL)

  16. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  17. Replacement power costs due to nuclear-plant outages: a higher standard of care

    International Nuclear Information System (INIS)

    Gransee, M.F.

    1982-01-01

    This article examines recent state public utility commission cases that deal with the high costs of replacement power that utilities must purchase after a nuclear power plant outage. Although most commissions have approved such expenses, it may be that there is a trend toward splitting the costs of such expenses between ratepayer and stockholder. Commissions are demanding a management prudence test to determine the cause of the outage and whether it meets the reasonable man standard before allowing these costs to be passed along to ratepayers. Unless the standard is applied with flexibility, however, utility companies could invoke the defenses covering traditional common law negligence

  18. Outage performance analysis of underlay cognitive RF and FSO wireless channels

    KAUST Repository

    Ansari, Imran Shafique; Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    In this work, the outage performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) channel cascaded with a free-space optical (FSO) link is presented. For the RF link, an underlay cognitive network

  19. Investigation on cause of outage of Wide Range Monitor (WRM) in High Temperature engineering Test Reactor (HTTR). Transport operation toward investigation for cause of outage

    International Nuclear Information System (INIS)

    Shinohara, Masanori; Sawahata, Hiroaki; Kawamoto, Taiki; Saito, Kenji; Takada, Shoji; Yoshida, Naoaki; Isozaki, Ryosuke; Katsuyama, Kozo; Motegi, Toshihiro

    2012-08-01

    An event, in which one of WRMs were disabled to detect the neutron flux in the reactor core, occurred during the period of reactor shut down of HTTR in March, 2010. The actual life time of WRM was unexpectedly shorter than the past developed life time. Investigation of the cause of the outage of WRM toward the recovery of the life time up to the developed life is one of the issues to develop the technology basis of High Temperature Gas cooled Reactor (HTGR). Then, a post irradiation examination was planned to specify the damaged part causing the event in the WRM was also planned. For the investigation, the X-ray computed tomography scanner in Fuels Monitoring Facility (FMF). This report describes the preliminary investigation on the cause of outage of the WRM. The results of study for transportation method of the irradiated WRM from HTTR to FMF is also reported with the record to complete the transport operation. (author)

  20. A RLS-SVM Aided Fusion Methodology for INS during GPS Outages.

    Science.gov (United States)

    Yao, Yiqing; Xu, Xiaosu

    2017-02-24

    In order to maintain a relatively high accuracy of navigation performance during global positioning system (GPS) outages, a novel robust least squares support vector machine (LS-SVM)-aided fusion methodology is explored to provide the pseudo-GPS position information for the inertial navigation system (INS). The relationship between the yaw, specific force, velocity, and the position increment is modeled. Rather than share the same weight in the traditional LS-SVM, the proposed algorithm allocates various weights for different data, which makes the system immune to the outliers. Field test data was collected to evaluate the proposed algorithm. The comparison results indicate that the proposed algorithm can effectively provide position corrections for standalone INS during the 300 s GPS outage, which outperforms the traditional LS-SVM method. Historical information is also involved to better represent the vehicle dynamics.

  1. A RLS-SVM Aided Fusion Methodology for INS during GPS Outages

    Directory of Open Access Journals (Sweden)

    Yiqing Yao

    2017-02-01

    Full Text Available In order to maintain a relatively high accuracy of navigation performance during global positioning system (GPS outages, a novel robust least squares support vector machine (LS-SVM-aided fusion methodology is explored to provide the pseudo-GPS position information for the inertial navigation system (INS. The relationship between the yaw, specific force, velocity, and the position increment is modeled. Rather than share the same weight in the traditional LS-SVM, the proposed algorithm allocates various weights for different data, which makes the system immune to the outliers. Field test data was collected to evaluate the proposed algorithm. The comparison results indicate that the proposed algorithm can effectively provide position corrections for standalone INS during the 300 s GPS outage, which outperforms the traditional LS-SVM method. Historical information is also involved to better represent the vehicle dynamics.

  2. On the Outage Performance of Full-Duplex Selective Decode-and-Forward Relaying

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-02-25

    We evaluate the outage performance in a three-terminal full-duplex relay channel that adopts a selective decode-and-forward protocol, taking relay self-interference into account. Previous work focused on coverage extension scenarios where direct source-destination transmissions are neglected or considered as interference. In this work, we account for the relay self-interference, and exploit the cooperative diversity offered by the independently fading source/relay message replicas that arrive at the destination. We present an approximate, yet accurate, closed-form expression for the end-to-end outage probability that captures their joint effect. With the derived expression in hand, we propose a relay transmit power optimization scheme that only requires the relay knowledge of channel statistics. Finally, we corroborate our analysis with simulations.

  3. Outage Performance of Hybrid FSO/RF System with Low-Complexity Power Adaptation

    KAUST Repository

    Rakia, Tamer

    2016-02-26

    Hybrid free-space optical (FSO) / radio-frequency (RF) systems have emerged as a promising solution for high data- rate wireless communication systems. We consider truncated channel inversion based power adaptation strategy for coherent and non- coherent hybrid FSO/RF systems, employing an adaptive combining scheme. Specifically, we activate the RF link along with the FSO link when FSO link quality is unacceptable, and adaptively set RF transmission power to ensure constant combined signal-to-noise ratio at receiver terminal. Analytical expressions for the outage probability of the hybrid system with and without power adaptation are derived. Numerical examples show that, the hybrid FSO/RF systems with power adaptation achieve considerable outage performance improvement over conventional hybrid FSO/RF systems without power adaptation. © 2015 IEEE.

  4. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications

    Directory of Open Access Journals (Sweden)

    Leila Melki

    2016-11-01

    Full Text Available In a cellular network it's very difficult to make spectrum resource more efficiently. Device-to-Device (D2D technology enables new service opportunities, and provides high throughput and reliable communication while reducing the base station load. For better total performance, short-range D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. Here we argue that single-hop D2D technology can be used to further improve cellular networks performance if the key D2D radio resource management algorithms are suitably extended to support multi-hop D2D communications. Aiming to establish a new paradigm for the analysis and design of multi-hop D2D communications, We propose a radio resource allocation for multi-hop D2D routes based on interference avoidance approach in LTE-A networks. On top of that, we investigate the outage probability of D2D communication. We first introduce a new definition of outage probability by considering the maximum distance to be allowable for single-hop transmission. Then we study and analyze the outage performance of a multi-hop D2D route. We derive the general closed form expression of outage probability of the multi-hop D2D routes. The results demonstrate that the D2D radio, sharing the same resources as the cellular network, provide higher capacity compared to pure cellular communication where all the data is transmitted through the base station. They also demonstrate that the new method of calculation of D2D multi hop outage probability has better performance than classical method defined in the literature.

  5. Power plant and utility performance: how world-record outages are being achieved in the USA

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    Two record-breaking refuelling outages at power reactors in the USA are described. The first, at Browns Ferry 3 BWR, was accomplished in 19 days 39 minutes - a shorter time than for an General Electric BWR anywhere in the world hitherto. The management attribute this success to planning, personnel and performance. As well as refuelling, inspections and maintenance, major modifications were carried out. These included the completion of the installation of digital feedwater reactor level control and digital feedwater heater level control. The second outage, at South Texas Project 2 BWR, at 17 days 14 hours and 10 minutes was the fastest yet recorded for any US nuclear unit. This achievement is ascribed to excellent outage preparation and scheduling, the superior condition of the plant equipment and teamwork and safety consciousness on behalf of the plant personnel. Finally, brief consideration is given to the nuclear performance recovery programme of Commonwealth Edison and Ontario Hydro Nuclear. (UK)

  6. Performance Analysis of Secrecy Outage Probability for AF-Based Partial Relay Selection with Outdated Channel Estimates

    Directory of Open Access Journals (Sweden)

    Kyu-Sung Hwang

    2017-01-01

    Full Text Available We study the secrecy outage probability of the amplify-and-forward (AF relaying protocol, which consists of one source, one destination, multiple relays, and multiple eavesdroppers. In this system, the aim is to transmit the confidential messages from a source to a destination via the selected relay in presence of eavesdroppers. Moreover, partial relay selection scheme is utilized for relay selection based on outdated channel state information where only neighboring channel information (source-relays is available and passive eavesdroppers are considered where a transmitter does not have any knowledge of eavesdroppers’ channels. Specifically, we offer the exact secrecy outage probability of the proposed system in a one-integral form as well as providing the asymptotic secrecy outage probability in a closed-form. Numerical examples are given to verify our provided analytical results for different system conditions.

  7. Resolving piping analysis issues to minimize impact on installation activities during refueling outage at nuclear power plants

    International Nuclear Information System (INIS)

    Bhavnani, D.

    1996-01-01

    While it is required to maintain piping code compliance for all phases of installation activities during outages at a nuclear plant, it is equally essential to reduce challenges to the installation personnel on how plant modification work should be performed. Plant betterment activities that incorporate proposed design changes are continually implemented during the outages. Supporting analysis are performed to back these activities for operable systems. The goal is to reduce engineering and craft man-hours and minimize outage time. This paper outlines how plant modification process can be streamlined to facilitate construction teams to do their tasks that involve safety related piping. In this manner, installation can proceed by minimizing on the spot analytical effort and reduce downtime to support the proposed modifications. Examples are provided that permit performance of installation work in any sequence. Piping and hangers including the branch lines are prequalified and determined operable. The system is up front analyzed for all possible scenarios. The modification instructions in the work packages is flexible enough to permit any possible installation sequence. The benefit to this approach is large enough in the sense that valuable outage time is not extended and on site analytical work is not required

  8. Sink-oriented Dynamic Location Service Protocol for Mobile Sinks with an Energy Efficient Grid-Based Approach

    Directory of Open Access Journals (Sweden)

    Hyunseung Choo

    2009-03-01

    Full Text Available Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs. They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR that efficiently forwards (or relays data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.

  9. Sink-oriented Dynamic Location Service Protocol for Mobile Sinks with an Energy Efficient Grid-Based Approach.

    Science.gov (United States)

    Jeon, Hyeonjae; Park, Kwangjin; Hwang, Dae-Joon; Choo, Hyunseung

    2009-01-01

    Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs). They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS) approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA) system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR) that efficiently forwards (or relays) data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.

  10. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-02-01

    Full Text Available Due to their special environment, Underwater Wireless Sensor Networks (UWSNs are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object’s mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  11. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Jiang, Shengming; Chen, Wei

    2016-02-06

    Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object's mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  12. Areva: experiences in outage services

    International Nuclear Information System (INIS)

    Wiemeier, R.; Mueller, N.; Blanco, I. J.

    2010-01-01

    As the world leader in the nuclear industry, Areva is firmly committed to the safe and reliable operation of the Spanish nuclear power plants. Following this commitment, Areva has established the subsidiary Areva NP Services Spain as a local platform to provide nuclear services for the Spanish nuclear power plants. being integrated and supported by the global Areva Group, Areva NP Services Spain is able to offer services solutions to all customers demands while maintaining close and sustainable relationships with them. This integration also allows the Spanish personnel of Areva to employ their skills by working in multinational teams in international projects. This article will present the capacities, and the most important recent national and international project performed by Areva NP Services Spain in the field of outage services. (Author)

  13. Olkiluoto 1 and 2 - Plant efficiency improvement and lifetime extension-project (PELE) implemented during outages 2010 and 2011

    Energy Technology Data Exchange (ETDEWEB)

    Kosonen, M.; Hakola, M. [Teollisuuden Voima Oyj, F- 27160 Eurajoki (Finland)

    2012-07-01

    Teollisuuden Voima Oyj (TVO) is a non-listed public company founded in 1969 to produce electricity for its stakeholders. TVO is the operator of the Olkiluoto nuclear power plant. TVO follows the principle of continuous improvement in the operation and maintenance of the Olkiluoto plant units. The PELE project (Plant Efficiency Improvement and Lifetime Extension), mainly completed during the annual outages in 2010 and 2011, and forms one part of the systematic development of Olkiluoto units. TVO maintains a long-term development program that aims at systematically modernizing the plant unit systems and equipment based on the latest technology. According to the program, the Olkiluoto 1 and Olkiluoto 2 plant units are constantly renovated with the intention of keeping them safe and reliable, The aim of the modernization projects is to improve the safety, reliability, and performance of the plant units. PELE project at Olkiluoto 1 was done in 2010 and at Olkiluoto 2 in 2011. The outage length of Olkiluoto 1 was 26 d 12 h 4 min and Olkiluoto 2 outage length was 28 d 23 h 46 min. (Normal service-outage is about 14 days including refueling and refueling-outage length is about seven days. See figure 1) The PELE project consisted of several single projects collected into one for coordinated project management. Some of the main projects were as follows: - Low pressure turbines: rotor, stator vane, casing and turbine instrumentation replacement. - Replacement of Condenser Cooling Water (later called seawater pumps) pumps - Replacement of inner isolation valves on the main steam lines. - Generator and the generator cooling system replacement. - Low voltage switchgear replacement. This project will continue during future outages. PELE was a success. 100 TVO employees and 1500 subcontractor employees participated in the project. The execution of the PELE projects went extremely well during the outages. The replacement of the low pressure turbines and seawater pumps improved the

  14. Olkiluoto 1 and 2 - Plant efficiency improvement and lifetime extension-project (PELE) implemented during outages 2010 and 2011

    International Nuclear Information System (INIS)

    Kosonen, M.; Hakola, M.

    2012-01-01

    Teollisuuden Voima Oyj (TVO) is a non-listed public company founded in 1969 to produce electricity for its stakeholders. TVO is the operator of the Olkiluoto nuclear power plant. TVO follows the principle of continuous improvement in the operation and maintenance of the Olkiluoto plant units. The PELE project (Plant Efficiency Improvement and Lifetime Extension), mainly completed during the annual outages in 2010 and 2011, and forms one part of the systematic development of Olkiluoto units. TVO maintains a long-term development program that aims at systematically modernizing the plant unit systems and equipment based on the latest technology. According to the program, the Olkiluoto 1 and Olkiluoto 2 plant units are constantly renovated with the intention of keeping them safe and reliable, The aim of the modernization projects is to improve the safety, reliability, and performance of the plant units. PELE project at Olkiluoto 1 was done in 2010 and at Olkiluoto 2 in 2011. The outage length of Olkiluoto 1 was 26 d 12 h 4 min and Olkiluoto 2 outage length was 28 d 23 h 46 min. (Normal service-outage is about 14 days including refueling and refueling-outage length is about seven days. See figure 1) The PELE project consisted of several single projects collected into one for coordinated project management. Some of the main projects were as follows: - Low pressure turbines: rotor, stator vane, casing and turbine instrumentation replacement. - Replacement of Condenser Cooling Water (later called seawater pumps) pumps - Replacement of inner isolation valves on the main steam lines. - Generator and the generator cooling system replacement. - Low voltage switchgear replacement. This project will continue during future outages. PELE was a success. 100 TVO employees and 1500 subcontractor employees participated in the project. The execution of the PELE projects went extremely well during the outages. The replacement of the low pressure turbines and seawater pumps improved the

  15. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  16. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks.

    Science.gov (United States)

    Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang

    2016-02-19

    Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain.

  17. Distributed Sensor Fusion for Scalar Field Mapping Using Mobile Sensor Networks.

    Science.gov (United States)

    La, Hung Manh; Sheng, Weihua

    2013-04-01

    In this paper, autonomous mobile sensor networks are deployed to measure a scalar field and build its map. We develop a novel method for multiple mobile sensor nodes to build this map using noisy sensor measurements. Our method consists of two parts. First, we develop a distributed sensor fusion algorithm by integrating two different distributed consensus filters to achieve cooperative sensing among sensor nodes. This fusion algorithm has two phases. In the first phase, the weighted average consensus filter is developed, which allows each sensor node to find an estimate of the value of the scalar field at each time step. In the second phase, the average consensus filter is used to allow each sensor node to find a confidence of the estimate at each time step. The final estimate of the value of the scalar field is iteratively updated during the movement of the mobile sensors via weighted average. Second, we develop the distributed flocking-control algorithm to drive the mobile sensors to form a network and track the virtual leader moving along the field when only a small subset of the mobile sensors know the information of the leader. Experimental results are provided to demonstrate our proposed algorithms.

  18. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  19. Mobile agents basic concepts, mobility models, and the tracy toolkit

    CERN Document Server

    Braun, Peter

    2005-01-01

    Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website.*Summarizes the state of the art in mobile agent research*Identifies the benefits...

  20. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  1. Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.

    Science.gov (United States)

    Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto

    2017-07-07

    This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.

  2. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  3. Outage analysis for underlay cognitive networks using incremental regenerative relaying

    KAUST Repository

    Tourki, Kamel

    2013-02-01

    Cooperative relay technology has recently been introduced into cognitive radio (CR) networks to enhance the network capacity, scalability, and reliability of end-to-end communication. In this paper, we investigate an underlay cognitive network where the quality of service (QoS) of the secondary link is maintained by triggering an opportunistic regenerative relaying once it falls under an unacceptable level. Analysis is conducted for two schemes, referred to as the channel-state information (CSI)-based and fault-tolerant schemes, respectively, where different amounts of CSI were considered. We first provide the exact cumulative distribution function (cdf) of the received signal-to-noise ratio (SNR) over each hop with colocated relays. Then, the cdf\\'s are used to determine a very accurate closed-form expression for the outage probability for a transmission rate $R$. In a high-SNR region, a floor of the secondary outage probability occurs, and we derive its corresponding expression. We validate our analysis by showing that the simulation results coincide with our analytical results in Rayleigh fading channels. © 1967-2012 IEEE.

  4. Final report of MoReMO 2011-2012. Modelling resilience for maintenance and outage

    International Nuclear Information System (INIS)

    Gotcheva, N.; Macchi, L.; Oedewald, P.; Eitrheim, M.H.R.; Axelsson, C.; Reiman, T.; Pietikaeinen, E.

    2013-04-01

    The project Modelling Resilience for Maintenance and Outage (MoReMO) represents a two-year joint effort by VTT Technical Research Centre of Finland, Institute for Energy Technology (IFE, Norway) and Vattenfall (Sweden) to develop and test new approaches for safety management. The overall goal of the project was to present concepts on how resilience can be operationalized and built in a safety critical and socio-technical context. Furthermore, the project also aimed at providing guidance for other organizations that strive to develop and improve their safety performance in a business driven industry. We have applied four approaches in different case studies: Organisational Core Task modelling (OCT), Functional Resonance Analysis Method (FRAM), Efficiency Thoroughness Trade-Off (ETTO) analysis, and Work Practice and Culture Characterisation. During 2011 and 2012 the MoReMO project team has collected data through field observations, interviews, workshops, and document analysis on the work practices and adjustments in maintenance and outage in Nordic NPPs. The project consisted of two sub-studies, one focused on identifying and assessing adjustments and supporting resilient work practices in maintenance activities, while the other focused on handling performance trade-offs in maintenance and outage, as follows: A. Adjustments in maintenance work in Nordic nuclear power plants (VTT and Vattenfall). B. Handling performance trade-offs - the support of adaptive capacities (IFE and Vattenfall). The historical perspective of maintenance and outage management (Chapter 1.1) was provided by Vattenfall. Together, the two sub-studies have provided valuable insights for understanding the rationale behind work practices and adjustments, their effects on resilience, promoting flexibility and balancing between flexibility and reliability. (Author)

  5. Final report of MoReMO 2011-2012. Modelling resilience for maintenance and outage

    Energy Technology Data Exchange (ETDEWEB)

    Gotcheva, N.; Macchi, L.; Oedewald, P. [Technical Research Centre of Finland (VTT), Espoo (Finland); Eitrheim, M.H.R. [Institute for Energy Technology (IFE) (Norway); Axelsson, C.; Reiman, T.; Pietikaeinen, E. [Ringhals AB (NPP), Vattenfall AB (Sweden)

    2013-04-15

    The project Modelling Resilience for Maintenance and Outage (MoReMO) represents a two-year joint effort by VTT Technical Research Centre of Finland, Institute for Energy Technology (IFE, Norway) and Vattenfall (Sweden) to develop and test new approaches for safety management. The overall goal of the project was to present concepts on how resilience can be operationalized and built in a safety critical and socio-technical context. Furthermore, the project also aimed at providing guidance for other organizations that strive to develop and improve their safety performance in a business driven industry. We have applied four approaches in different case studies: Organisational Core Task modelling (OCT), Functional Resonance Analysis Method (FRAM), Efficiency Thoroughness Trade-Off (ETTO) analysis, and Work Practice and Culture Characterisation. During 2011 and 2012 the MoReMO project team has collected data through field observations, interviews, workshops, and document analysis on the work practices and adjustments in maintenance and outage in Nordic NPPs. The project consisted of two sub-studies, one focused on identifying and assessing adjustments and supporting resilient work practices in maintenance activities, while the other focused on handling performance trade-offs in maintenance and outage, as follows: A. Adjustments in maintenance work in Nordic nuclear power plants (VTT and Vattenfall). B. Handling performance trade-offs - the support of adaptive capacities (IFE and Vattenfall). The historical perspective of maintenance and outage management (Chapter 1.1) was provided by Vattenfall. Together, the two sub-studies have provided valuable insights for understanding the rationale behind work practices and adjustments, their effects on resilience, promoting flexibility and balancing between flexibility and reliability. (Author)

  6. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  7. Using Mobility to Enhance the Routing Process in the MIS System

    Directory of Open Access Journals (Sweden)

    Elkoutbi Mohammed

    2009-10-01

    Full Text Available In this paper, we introduce the original Mobile Intelligent System (MIS in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of improving the performance of routing unit, we propose a measure of mobility. Each node measure its own mobility in the network, based on the change of the links state in his neighboring. This measure of mobility has no unit, and it is calculated by quantification in regular time intervals.

  8. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  9. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  10. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  11. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  12. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  13. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  14. Outage Analysis of Practical FSO/RF Hybrid System With Adaptive Combining

    KAUST Repository

    Rakia, Tamer

    2015-08-01

    Hybrid free-space optical (FSO)/radio-frequency (RF) systems have emerged as a promising solution for high-data-rate wireless transmission. We present and analyze a transmission scheme for the hybrid FSO/RF communication system based on adaptive combining. Specifically, only FSO link is active as long as the instantaneous signal-to-noise ratio (SNR) at the FSO receiver is above a certain threshold level. When it falls below this threshold level, the RF link is activated along with the FSO link and the signals from the two links are combined at the receiver using a dual-branch maximal ratio combiner. Novel analytical expression for the cumulative distribution function (CDF) of the received SNR for the proposed hybrid system is obtained. This CDF expression is used to study the system outage performance. Numerical examples are presented to compare the outage performance of the proposed hybrid FSO/RF system with that of the FSO-only and RF-only systems. © 1997-2012 IEEE.

  15. Zero-Outage Cellular Downlink with Fixed-Rate D2D Underlay

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Popovski, Petar

    2015-01-01

    . D2D connections can be instrumental in localized aggregation of uplink M2M traffic to a more capable cellular device, before being finally delivered to the Base Station (BS). In this paper we show that a fixed M2M rate is an enabler of efficient Machine-Type D2D underlay operation taking place......, but not the interfering channels from the MTDs to U, we prove that there is a positive downlink rate that can always be decoded by U, leading to zero-outage of the downlink signal. This is a rather surprising consequence of the features of the multiple access channel and the fixed rate RM. We also consider the case...... of a simpler, single-user decoder at U with successive interference cancellation. However, with single-user decoder, a positive zero-outage rate exists only when NM = 1 and is zero when NM > 1. This implies that joint decoding is instrumental in enabling fixed-rate underlay operation....

  16. Outage probability of distributed beamforming with co-channel interference

    KAUST Repository

    Yang, Liang

    2012-03-01

    In this letter, we consider a distributed beamforming scheme (DBF) in the presence of equal-power co-channel interferers for both amplify-and-forward and decode-and-forward relaying protocols over Rayleigh fading channels. We first derive outage probability expressions for the DBF systems. We then present a performance analysis for a scheme relying on source selection. Numerical results are finally presented to verify our analysis. © 2011 IEEE.

  17. On the outage capacity of the block fading channel at low-power regime

    KAUST Repository

    Rezki, Zouheir

    2014-06-01

    Outage performance of the M-block fading with additive white Gaussian noise (BF-AWGN) is investigated at low-power regime. We consider delay-constrained constant-rate communications with perfect channel state information (CSI) at both the transmitter and the receiver (CSI-TR), under a short-term power constraint. We show that selection diversity that allocates all the power to the strongest block is asymptotically optimal. Then, we provide a simple characterization of the outage probability in the regime of interest. We quantify the reward due to CSI-TR over the constant-rate constant-power scheme and show that this reward increases with the delay constraint. For instance, for Rayleigh fading, we find that a power gain up to 4.3 dB is achievable. © 2014 IEEE.

  18. Prediction of power system frequency response after generator outages using neural nets

    Energy Technology Data Exchange (ETDEWEB)

    Djukanovic, M B; Popovic, D P [Electrotechnicki Inst. ' Nikola Tesla' , Belgrade (Yugoslavia); Sobajic, D J; Pao, Y -H [Case Western Reserve Univ., Cleveland, OH (United States)

    1993-09-01

    A new methodology is presented for estimating the frequency behaviour of power systems necessary for an indication of under-frequency load shedding in steady-state security assessment. It is well known that large structural disturbances such as generator tripping or load outages can initiate cascading outages, system separation into islands, and even the complete breakup. The approach provides a fairly accurate method of estimating the system average frequency response without making simplifications or neglecting non-linearities and small time constants in the equations of generating units, voltage regulators and turbines. The efficiency of the new procedure is demonstrated using the New England power system model for a series of characteristic perturbations. The validity of the proposed approach is verified by comparison with the simulation of short-term dynamics including effects of control and automatic devices. (author)

  19. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  20. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  1. HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanzhong Bi

    2007-06-01

    Full Text Available Sink mobility has attracted much research interest in recent years because it can improve network performance such as energy efficiency and throughput. An energy-unconscious moving strategy is potentially harmful to the balance of the energy consumption among sensor nodes so as to aggravate the hotspot problem of sensor networks. In this paper, we propose an autonomous moving strategy for the mobile sinks in data-gathering applications. In our solution, a mobile sink approaches the nodes with high residual energy to force them to forward data for other nodes and tries to avoid passing by the nodes with low energy. We performed simulation experiments to compare our solution with other three data-gathering schemes. The simulation results show that our strategy cannot only extend network lifetime notably but also provides scalability and topology adaptability.

  2. Outage probability analysis of wireless sensor networks in the presence of channel fading and spatial correlation

    KAUST Repository

    Al-Murad, Tamim M.

    2011-07-01

    Evaluating the reliability of wireless sensor networks is becoming more important as theses networks are being used in crucial applications. The outage probability defined as the probability that the error in the system exceeds a maximum acceptable threshold has recently been used as a measure of the reliability of such systems. In this work we find the outage probability of wireless sensor network in different scenarios of distributed sensing where sensors\\' readings are affected by spatial correlation and in the presence of channel fading. © 2011 IEEE.

  3. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  4. Power Minimization of a Wireless Sensor Node under Different Rate Constraints

    KAUST Repository

    Solares, Jose

    2016-03-31

    Future wireless networks are expected to handle a huge number of devices, including sensors, within a low energy consumption. In this scope, we present, in this paper, performance of wireless sensor networks (WSN). Specifically, we aim at finding the optimal transmit power of a node communicating with multiple receivers in a cognitive radio (CR) spectrum sharing framework, i.e., existence of an active primary user. We first present the optimal power with single secondary receiver, under instantaneous or average transmission rate constraints. Then, we propose a suboptimal solution for an easier, yet efficient, implementation and perform insightful asymptotical analysis for both schemes with Rayleigh fading. Afterwards, we extend our results to a multiple secondary receives CR scenario and present the corresponding optimal and suboptimal transmit power while satisfying independent peak/average and sum of peak/average transmission rate constraints. The corresponding numerical results are provided for Rayleigh and Nakagami-m fading channels. We characterize some transmission outage events depending on system parameters.

  5. Power Minimization of a Wireless Sensor Node under Different Rate Constraints

    KAUST Repository

    Solares, Jose; Sboui, Lokman; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    Future wireless networks are expected to handle a huge number of devices, including sensors, within a low energy consumption. In this scope, we present, in this paper, performance of wireless sensor networks (WSN). Specifically, we aim at finding the optimal transmit power of a node communicating with multiple receivers in a cognitive radio (CR) spectrum sharing framework, i.e., existence of an active primary user. We first present the optimal power with single secondary receiver, under instantaneous or average transmission rate constraints. Then, we propose a suboptimal solution for an easier, yet efficient, implementation and perform insightful asymptotical analysis for both schemes with Rayleigh fading. Afterwards, we extend our results to a multiple secondary receives CR scenario and present the corresponding optimal and suboptimal transmit power while satisfying independent peak/average and sum of peak/average transmission rate constraints. The corresponding numerical results are provided for Rayleigh and Nakagami-m fading channels. We characterize some transmission outage events depending on system parameters.

  6. Improving nuclear utility generation capacity, understanding the sources of forced outage and learning how to prevent them

    International Nuclear Information System (INIS)

    Brodeur, D.L.; Todreas, N.E.; Angus, V.T.

    1998-01-01

    MIT and PECO Energy have completed a detailed examination of the sources of forced outages at the Limerick Generating Station (LGS) Boiling Water Reactor Class IV (BWR IV) site over a five year period and contrasted that information to similar BWR IV utilities in the United States over the same period. Each forced outage was attributed to one system and assigned causal codes of equipment versus human factors and failure attributes such as weak design, poor craftsmanship, and worn parts. It was found that fifty four percent of the lost power at LGS was the result of Balance of Plant failures. Industry wide data identifies fifty nine percent of the lost power as attributed to Balance of Plant failures. Balance of Plant systems are those systems not included in the primary and safety related system category. Considering failure causal factors, forty six percent of the lost power at the utility under study was the result of equipment factors such as weak design or worn parts. Significantly, the study showed a high variance between those systems which caused significant forced outage at the two sister LGS units. This demonstrated the infrequent nature of plant forced outages within a given system. This was supported by the observation that dominant systems attributing to forced outage at LGS were not equally represented in industry data. It is suggested that for individual utilities to dramatically improve unit capability factors with regard to Balance of Plant systems, they must learn from industry wide experiences and develop cooperative means of exchanging lessons learned among similarly designed plants and systems. With the broad knowledge base of system failures, current designs must be frequently assessed and altered until each system poses an acceptable level of risk to generation capacity. (author)

  7. Economic and Environmental Impacts of the Columbia-Snake River Extended Lock Outage

    Science.gov (United States)

    2012-03-01

    This reports main objective is to analyze the change in rates and modal costs for shippers, commodity industries and ports prior to, during and after the fifteen week lock outage and to determine the impacts on the environment in the form of energ...

  8. On the Outage Performance of Full-Duplex Selective Decode-and-Forward Relaying

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2013-01-01

    expression for the end-to-end outage probability that captures their joint effect. With the derived expression in hand, we propose a relay transmit power optimization scheme that only requires the relay knowledge of channel statistics. Finally, we corroborate our analysis with simulations.

  9. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  10. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  11. Outage Analysis of Cooperative Transmission with Energy Harvesting Relay: Time Switching versus Power Splitting

    Directory of Open Access Journals (Sweden)

    Guanyao Du

    2015-01-01

    Full Text Available This paper investigates the multiuser transmission network with an energy harvesting (EH cooperative relay, where a source transmits independent information to multiple destinations with the help of an energy constrained relay. The relay can harvest energy from the radio frequency (RF signals transmitted from the source, and it helps the multiuser transmission only by consuming the harvested energy. By adopting the time switching and the power splitting relay receiver architectures, we firstly propose two protocols, the time switching cooperative multiuser transmission (TSCMT protocol and the power splitting cooperative multiuser transmission (PSCMT protocol, to enable the simultaneous information processing and EH at the relay for the system. To evaluate the system performance, we theoretically analyze the system outage probability for the two proposed protocols and then derive explicit expressions for each of them, respectively. Numerical results are provided to demonstrate the accuracy of our analytical results and reveal that compared with traditional noncooperative scheme our proposed protocols are green solutions to offer reliable communication and lower system outage probability without consuming additional energy. In particular, for the same transmit power at the source, the PSCMT protocol is superior to the TSCMT protocol to obtain lower system outage probability.

  12. Method for estimating power outages and restoration during natural and man-made events

    Science.gov (United States)

    Omitaomu, Olufemi A.; Fernandez, Steven J.

    2016-01-05

    A method of modeling electric supply and demand with a data processor in combination with a recordable medium, and for estimating spatial distribution of electric power outages and affected populations. A geographic area is divided into cells to form a matrix. Within the matrix, supply cells are identified as containing electric substations and demand cells are identified as including electricity customers. Demand cells of the matrix are associated with the supply cells as a function of the capacity of each of the supply cells and the proximity and/or electricity demand of each of the demand cells. The method includes estimating a power outage by applying disaster event prediction information to the matrix, and estimating power restoration using the supply and demand cell information of the matrix and standardized and historical restoration information.

  13. Monitoring Disaster-Related Power Outages Using NASA Black Marble Nighttime Light Product

    Science.gov (United States)

    Wang, Z.; Román, M. O.; Sun, Q.; Molthan, A. L.; Schultz, L. A.; Kalb, V. L.

    2018-04-01

    Timely and accurate monitoring of disruptions to the electricity grid, including the magnitude, spatial extent, timing, and duration of net power losses, is needed to improve situational awareness of disaster response and long-term recovery efforts. Satellite-derived Nighttime Lights (NTL) provide an indication of human activity patterns and have been successfully used to monitor disaster-related power outages. The global 500 m spatial resolution National Aeronautics and Space Administration (NASA) Black Marble NTL daily standard product suite (VNP46) is generated from Visible Infrared Imaging Radiometer Suite (VIIRS) Day/Night Band (DNB) onboard the NASA/National Oceanic and Atmospheric Administration (NOAA) Suomi National Polar-orbiting Partnership (Suomi- NPP) satellite, which began operations on 19 January 2012. With its improvements in product accuracy (including critical atmospheric and BRDF correction routines), the VIIRS daily Black Mable product enables systematic monitoring of outage conditions across all stages of the disaster management cycle.

  14. Recent Performance of and Plasma Outage Studies with the SNS H- Source

    Energy Technology Data Exchange (ETDEWEB)

    Stockli, Martin P [ORNL; Han, Baoxi [ORNL; Murray Jr, S N [ORNL; Pennisi, Terry R [ORNL; Piller, Chip [ORNL; Santana, Manuel [ORNL; Welton, Robert F [ORNL

    2016-01-01

    SNS ramps to higher power levels that can be sustained with high availability. The goal is 1.4 MW despite a compromised RFQ, which requires higher RF power than design levels to approach the nominal beam transmission. Unfortunately at higher power the RFQ often loses its thermal stability, a problem apparently enhanced by beam losses and high influxes of hydrogen. Delivering as much H- beam as possible with the least amount of hydrogen led to plasma outages. The root cause is the dense 1-ms long ~55-kW 2-MHz plasma pulses reflecting ~90% of the continuous ~300W, 13-MHz power, which was mitigated with a 4-ms filter for the reflected power signal and an outage resistant, slightly-detuned 13-MHz match. Lowering the H2 also increased the H- beam current to ~55 mA, and increased the transmission by ~7%.

  15. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  16. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  17. Research on mobile strategy of anchor node based on weighted virtual force model%基于加权虚拟力模型的锚节点移动策略的研究

    Institute of Scientific and Technical Information of China (English)

    魏连锁; 蔡绍滨; 潘实

    2017-01-01

    The existing mobility strategy of the anchor node in wireless sensor network (WSN) has the shortcomings of too long moving path and low positioning accuracy when the anchor node traverses the network voids area. A new mobility strategy of WSN anchor node was proposed based on an improved virtual forces model. The number of neighbor nodes and the distance between the neighbor nodes to the anchor nodes were introduced as their own dense weight attributes. The unknown nodes in-tensity was used as weights to improve the traditional virtual force model. Meantime the distance-measuring errorε was taken into account. The optimal distribution, direction selection, shift step length and fallback strategy of anchor node could be ana-lyzed by the trilateration. Using the number of virtual beacon received by the unknown node and the distance between the un-known node to the anchor node calculate the virtual force. Then according to the virtual force, the direction was chosen and the anchor nodes were moved. Simulation experiments show that the strategy can make the anchor nodes move according to the specific circumstances of unknown node distribution. It has a high positioning accuracy and strong adaptability. It can success-fully shorten the path of the anchor node movement and reduce the number of virtual beacon. Moreover it can effectively avoid the anchor node to enter the network voids area and reduce the number of collinear virtual anchor nodes.%针对现有无线传感器网络(WSN)锚节点移动策略不能有效避免遍历网络空洞区域时引起的移动路径过长、定位精度低等缺点,提出一种基于改进虚拟力模型的无线传感器网络锚节点移动策略.将未知节点的邻居节点数量及其到邻居节点的距离作为自身的密集权重属性,利用未知节点的密集度作为权值来改进传统的虚拟力模型.同时考虑测距误差ε的大小,利用三边测量法分析锚节点的最优分

  18. Radiological protection for the ANGRA 1 steam generator replacement outage

    International Nuclear Information System (INIS)

    Oliveira, Magno Jose de; Amaral, Marcos Antonio do; Minelli, Edson; Ferreira, William Alves

    2009-01-01

    The Angra 1 Nuclear Power Plant (NPP) is a Westinghouse two-loop plant with net output before its 1P16 Outage of 632 MWe, with the Old Steam Generators (OSG) type model D3, which were replaced by two new Steam Generators with feed water-ring system. Localized in Angra dos Reis, Rio de Janeiro - Brazil, Angra 1 started in commercial operation in 1985 and, from the beginning problems related to corrosion have appeared in the Inconel 600 alloy of the tubes. The corrosion problems indicated the necessity for a strong control of the tubes thicknesses and, after a time, the ELETRONUCLEAR decided to replace the OSG. In 2009, ELETRONUCLEAR initiated in January 24, the actions for the Steam Generators Replacement - SGR. During the SGR process, several controls were applied in field, which made possible to have no radiological accidents, no dose limits exceeded, and permitted to achieve a very good result in terms of Collective Dose. This paper describes the radiological controls applied for the Angra 1 Steam Generator Replacement Outage, the radiological protection team sizing and distribution and the obtained results. (author)

  19. APPROACH TO ASSESSING THE PREPAREDNESS OF HOSPITALS TO POWER OUTAGES

    Directory of Open Access Journals (Sweden)

    Lenka BREHOVSKÁ

    2017-06-01

    Full Text Available Within the secondary impacts of electricity blackouts, it is necessary to pay attention to facilities providing medical care for the population, namely the hospitals. Hospitals represent a key position in the provision of health care also in times of crisis. These facilities must provide constant care; it is therefore essential that the preparedness of such facilities is kept at a high level. The basic aim of this article is to analyse the preparedness of hospitals to power outages (power failures, blackouts within a pilot study. On that basis, a SWOT analysis is used to determine strengths and weaknesses of the system of preparedness of hospitals to power outages and solutions for better security of hospitals are defined. The sample investigated consists of four hospitals founded by the Regional Authority (hospitals Nos. 1-4 and one hospital founded by the Ministry of Health of the Czech Republic (hospital No. 5. The results of the study shows that most weaknesses of the preparedness of hospitals are represented by inadequately addressed reserves of fuel for the main backup power supply, poor knowledge of employees who are insufficiently retrained, and old backup power supplies (even 35 years in some cases.

  20. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b

  1. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  2. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  3. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  4. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  5. Outage Analysis of Train-to-Train Communication Model over Nakagami-m Channel in High-Speed Railway

    Directory of Open Access Journals (Sweden)

    Pengyu Liu

    2013-01-01

    Full Text Available This paper analyzes the end-to-end outage performance of high-speed-railway train-to-train communication model in high-speed railway over independent identical and nonidentical Nakagami-m channels. The train-to-train communication is inter-train communication without an aid of infrastructure (for base station. Source train uses trains on other rail tracks as relays to transmit signals to destination train on the same track. The mechanism of such communication among trains can be divided into three cases based on occurrence of possible-occurrence relay trains. We first present a new closed form for the sum of squared independent Nakagami-m variates and then derive an expression for the outage probability of the identical and non-identical Nakagami-m channels in three cases. In particular, the problem is improved by the proposed formulation that statistic for sum of squared Nakagami-m variates with identical m tends to be infinite. Numerical analysis indicates that the derived analytic results are reasonable and the outage performance is better over Nakagami-m channel in high-speed railway scenarios.

  6. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    Science.gov (United States)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  7. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  8. Mobile agent location in distributed environments

    Science.gov (United States)

    Fountoukis, S. G.; Argyropoulos, I. P.

    2012-12-01

    An agent is a small program acting on behalf of a user or an application which plays the role of a user. Artificial intelligence can be encapsulated in agents so that they can be capable of both behaving autonomously and showing an elementary decision ability regarding movement and some specific actions. Therefore they are often called autonomous mobile agents. In a distributed system, they can move themselves from one processing node to another through the interconnecting network infrastructure. Their purpose is to collect useful information and to carry it back to their user. Also, agents are used to start, monitor and stop processes running on the individual interconnected processing nodes of computer cluster systems. An agent has a unique id to discriminate itself from other agents and a current position. The position can be expressed as the address of the processing node which currently hosts the agent. Very often, it is necessary for a user, a processing node or another agent to know the current position of an agent in a distributed system. Several procedures and algorithms have been proposed for the purpose of position location of mobile agents. The most basic of all employs a fixed computing node, which acts as agent position repository, receiving messages from all the moving agents and keeping records of their current positions. The fixed node, responds to position queries and informs users, other nodes and other agents about the position of an agent. Herein, a model is proposed that considers pairs and triples of agents instead of single ones. A location method, which is investigated in this paper, attempts to exploit this model.

  9. MONITORING DISASTER-RELATED POWER OUTAGES USING NASA BLACK MARBLE NIGHTTIME LIGHT PRODUCT

    Directory of Open Access Journals (Sweden)

    Z. Wang

    2018-04-01

    Full Text Available Timely and accurate monitoring of disruptions to the electricity grid, including the magnitude, spatial extent, timing, and duration of net power losses, is needed to improve situational awareness of disaster response and long-term recovery efforts. Satellite-derived Nighttime Lights (NTL provide an indication of human activity patterns and have been successfully used to monitor disaster-related power outages. The global 500 m spatial resolution National Aeronautics and Space Administration (NASA Black Marble NTL daily standard product suite (VNP46 is generated from Visible Infrared Imaging Radiometer Suite (VIIRS Day/Night Band (DNB onboard the NASA/National Oceanic and Atmospheric Administration (NOAA Suomi National Polar-orbiting Partnership (Suomi- NPP satellite, which began operations on 19 January 2012. With its improvements in product accuracy (including critical atmospheric and BRDF correction routines, the VIIRS daily Black Mable product enables systematic monitoring of outage conditions across all stages of the disaster management cycle.

  10. Spatio-Temporal Ensemble Prediction on Mobile Broadband Network Data

    DEFF Research Database (Denmark)

    Samulevicius, Saulius; Pitarch, Yoann; Pedersen, Torben Bach

    2013-01-01

    Facing the huge success of mobile devices, network providers ceaselessly deploy new nodes (cells) to always guarantee a high quality of service. Nevertheless, keeping turned on all the nodes when traffic is low is energy inefficient. This has led to investigations on the possibility to turn off...

  11. Detection Performance of Packet Arrival under Downclocking for Mobile Edge Computing

    Directory of Open Access Journals (Sweden)

    Zhimin Wang

    2018-01-01

    Full Text Available Mobile edge computing (MEC enables battery-powered mobile nodes to acquire information technology services at the network edge. These nodes desire to enjoy their service under power saving. The sampling rate invariant detection (SRID is the first downclocking WiFi technique that can achieve this objective. With SRID, a node detects one packet arrival at a downclocked rate. Upon a successful detection, the node reverts to a full-clocked rate to receive the packet immediately. To ensure that a node acquires its service immediately, the detection performance (namely, the miss-detection probability and the false-alarm probability of SRID is of importance. This paper is the first one to theoretically study the crucial impact of SRID attributes (e.g., tolerance threshold, correlation threshold, and energy ratio threshold on the packet detection performance. Extensive Monte Carlo experiments show that our theoretical model is very accurate. This study can help system developers set reasonable system parameters for WiFi downclocking.

  12. An efficient communication strategy for mobile agent based distributed spatial data mining application

    Science.gov (United States)

    Han, Guodong; Wang, Jiazhen

    2005-11-01

    An efficient communication strategy is proposed in this paper, which aims to improve the response time and availability of mobile agent based distributed spatial data mining applications. When dealing with decomposed complex data mining tasks or On-Line Analytical Processing (OLAP), mobile agents authorized by the specified user need to coordinate and cooperate with each other by employing given communication method to fulfill the subtasks delegated to them. Agent interactive behavior, e.g. messages passing, intermediate results exchanging and final results merging, must happen after the specified path is determined by executing given routing selection algorithm. Most of algorithms exploited currently run in time that grows approximately quadratic with the size of the input nodes where mobile agents migrate between. In order to gain enhanced communication performance by reducing the execution time of the decision algorithm, we propose an approach to reduce the number of nodes involved in the computation. In practice, hosts in the system are reorganized into groups in terms of the bandwidth between adjacent nodes. Then, we find an optimal node for each group with high bandwidth and powerful computing resources, which is managed by an agent dispatched by agent home node. With that, the communication pattern can be implemented at a higher level of abstraction and contribute to improving the overall performance of mobile agent based distributed spatial data mining applications.

  13. Outage and BER analysis for ultrawideband-based WPAN in Nakagami-m fading channels

    KAUST Repository

    Mehbodniya, Abolfazl; Aissa, Sonia

    2011-01-01

    layer. Approximate expressions for the outage probability and average bit error rate (BER) are derived in closed form for the MB-OFDM target receiver, taking into account multi-user interference (MUI), as well as external interference in the form of time

  14. On the outage capacity of the block fading channel at low-power regime

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2014-01-01

    the transmitter and the receiver (CSI-TR), under a short-term power constraint. We show that selection diversity that allocates all the power to the strongest block is asymptotically optimal. Then, we provide a simple characterization of the outage probability

  15. Exact Outage Probability of Dual-Hop CSI-Assisted AF Relaying Over Nakagami-m Fading Channels

    KAUST Repository

    Xia, Minghua

    2012-10-01

    In this correspondence, considering dual-hop channel state information (CSI)-assisted amplify-and-forward (AF) relaying over Nakagami- m fading channels, the cumulative distribution function (CDF) of the end-to-end signal-to-noise ratio (SNR) is derived. In particular, when the fading shape factors m1 and m2 at consecutive hops take non-integer values, the bivariate H-function and G -function are exploited to obtain an exact analytical expression for the CDF. The obtained CDF is then applied to evaluate the outage performance of the system under study. The analytical results of outage probability coincide exactly with Monte-Carlo simulation results and outperform the previously reported upper bounds in the low and medium SNR regions.

  16. Dynamic behavior of acrylic acid clusters as quasi-mobile nodes in a model of hydrogel network

    Science.gov (United States)

    Zidek, Jan; Milchev, Andrey; Vilgis, Thomas A.

    2012-12-01

    Using a molecular dynamics simulation, we study the thermo-mechanical behavior of a model hydrogel subject to deformation and change in temperature. The model is found to describe qualitatively poly-lactide-glycolide hydrogels in which acrylic acid (AA)-groups are believed to play the role of quasi-mobile nodes in the formation of a network. From our extensive analysis of the structure, formation, and disintegration of the AA-groups, we are able to elucidate the relationship between structure and viscous-elastic behavior of the model hydrogel. Thus, in qualitative agreement with observations, we find a softening of the mechanical response at large deformations, which is enhanced by growing temperature. Several observables as the non-affinity parameter A and the network rearrangement parameter V indicate the existence of a (temperature-dependent) threshold degree of deformation beyond which the quasi-elastic response of the model system turns over into plastic (ductile) one. The critical stretching when the affinity of the deformation is lost can be clearly located in terms of A and V as well as by analysis of the energy density of the system. The observed stress-strain relationship matches that of known experimental systems.

  17. Delay-tolerant mobile network protocol for rice field monitoring using wireless sensor networks

    Science.gov (United States)

    Guitton, Alexandre; Andres, Frédéric; Cardoso, Jarbas Lopes; Kawtrakul, Asanee; Barbin, Silvio E.

    2015-10-01

    The monitoring of rice fields can improve productivity by helping farmers throughout the rice cultivation cycle, on various issues: when to harvest, when to treat the crops against disease, when to increase the water level, how to share observations and decisions made in a collaborative way, etc. In this paper, we propose an architecture to monitor a rice field by a wireless sensor network. Our architecture is based on static sensor nodes forming a disconnected network, and mobile nodes communicating with the sensor nodes in a delay-tolerant manner. The data collected by the static sensor nodes are transmitted to mobile nodes, which in turn transmit them to a gateway, connected to a database, for further analysis. We focus on the related architecture, as well as on the energy-efficient protocols intended to perform the data collection.

  18. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  19. LPTA: location predictive and time adaptive data gathering scheme with mobile sink for wireless sensor networks.

    Science.gov (United States)

    Zhu, Chuan; Wang, Yao; Han, Guangjie; Rodrigues, Joel J P C; Lloret, Jaime

    2014-01-01

    This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  20. Development of GaN-based microchemical sensor nodes

    Science.gov (United States)

    Prokopuk, Nicholas; Son, Kyung-Ah; George, Thomas; Moon, Jeong S.

    2005-01-01

    Sensors based III-N technology are gaining significant interest due to their potential for monolithic integration of RF transceivers and light sources and the capability of high temperature operations. We are developing a GaN-based micro chemical sensor node for remote detection of chemical toxins, and present electrical responses of AlGaN/GaN HEMT (High Electron Mobility Transistor) sensors to chemical toxins as well as other common gases.

  1. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang; Zhang, Huan; Ansari, Imran Shafique; Ren, Zhi; Pan, Gaofeng; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  2. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang

    2017-10-02

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  3. Outage Probability versus Fairness Trade-off in Opportunistic Relay Selection with Outdated CSI

    Directory of Open Access Journals (Sweden)

    Vicario JoseLopez

    2009-01-01

    Full Text Available We analyze the existing trade-offs in terms of system performance versus fairness of a cooperative system based on opportunistic relay selection (ORS and with outdated channel state information (CSI. In particular, system performance is analytically evaluated in terms of outage probability, and the fairness behavior is assessed based on the power consumption at the different relays. In order to improve the fairness behavior of ORS while keeping the selection diversity gain, we propose a relay selection mechanism where the relay with the highest normalized signal-to-noise ratio (SNR is selected for relaying the source's information. The proposed strategy is compared with existing relay selection strategies by adopting a novel graphical representation inspired by expected profit versus risk plots used in modern portfolio theory. As shown in the paper, this strategy allows operating the system in more favorable points of the outage versus fairness region.

  4. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  5. A Unified Simulation Approach for the Fast Outage Capacity Evaluation over Generalized Fading Channels

    KAUST Repository

    Rached, Nadhir B.; Kammoun, Abla; Alouini, Mohamed-Slim; Tempone, Raul

    2016-01-01

    The outage capacity (OC) is among the most important performance metrics of communication systems over fading channels. The evaluation of the OC, when equal gain combining (EGC) or maximum ratio combining (MRC) diversity techniques are employed

  6. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  7. The tomography of human mobility - what do shortest-path trees reveal?

    Energy Technology Data Exchange (ETDEWEB)

    Thiemann, Christian [Eng. Sci. and Appl. Math, Northwestern University, Evanston, IL (United States); Max-Planck-Institute for Dynamics and Self-Organization, Goettingen (Germany); Grady, Daniel; Brockmann, Dirk [Eng. Sci. and Appl. Math, Northwestern University, Evanston, IL (United States)

    2010-07-01

    Similar to illustrating the anatomy of organs using pictures of tissue slices taken at various depths, we construct shortest-path trees of different nodes to create tomograms of large-scale human mobility networks. This tomography allows us to measure global properties of the system conditioned on a reference location in the network to gain a fuller characterization of a node. It also suggests a canonical coordinate system for representing complex networks and dynamical processes thereon in a simplified way, revealing a new symmetry in the human mobility networks we investigated. Furthermore, introducing the notion of tree similarity, we devised a new technique for clustering nodes with similar topological footprint, yielding a unique and efficient method for community identification and topological backbone extraction. We applied these methods to a multi-scale human mobility network obtained from the dollar-bill-tracking site wheresgoerge.com and to the U.S. and world-wide air transportation network.

  8. SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Radu Ioan Ciobanu

    2015-01-01

    Full Text Available Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node’s contact as a Poisson distribution and show that we can predict its future behavior based on the contact history. Furthermore, since opportunistic network nodes may be selfish, we improve our solution by adding a selfish node detection and avoidance mechanism, which can help reduce the number of unnecessary messages sent in the network, and thus avoid congestion and decrease battery consumption. We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing in various realistic scenarios.

  9. LPTA: Location Predictive and Time Adaptive Data Gathering Scheme with Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chuan Zhu

    2014-01-01

    Full Text Available This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  10. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  11. The effect of correlated observations on the performance of distributed estimation

    KAUST Repository

    Ahmed, Mohammed

    2013-12-01

    Estimating unknown signal in Wireless Sensor Networks (WSNs) requires sensor nodes to transmit their observations of the signal over a multiple access channel to a Fusion Center (FC). The FC uses the received observations, which is corrupted by observation noise and both channel fading and noise, to find the minimum Mean Square Error (MSE) estimate of the signal. In this paper, we investigate the effect of the source-node correlation (the correlation between sensor node observations and the source signal) and the inter-node correlation (the correlation between sensor node observations) on the performance of the Linear Minimum Mean Square Error (LMMSE) estimator for three correlation models in the presence of channel fading. First, we investigate the asymptotic behavior of the achieved distortion (i.e., MSE) resulting from both the observation and channel noise in a non-fading channel. Then, the effect of channel fading is considered and the corresponding distortion outage probability, the probability that the distortion exceeds a certain value, is found. By representing the distortion as a ratio of indefinite quadratic forms, a closed-form expression is derived for the outage probability that shows its dependency on the correlation. Finally, the new representation of the outage probability allows us to propose an iterative solution for the power allocation problem to minimize the outage probability under total and individual power constraints. Numerical simulations are provided to verify our analytic results. © 2013 IEEE.

  12. Design and Implementation of a Mobile Multihop WSN for AGV System

    Directory of Open Access Journals (Sweden)

    Jiaqi Zhang

    2010-01-01

    Full Text Available A system data sharing protocol of mobile WSN named synchronous dynamic multihop data sharing protocol (S-DMDS is presented for automated guided vehicle (AGV system. It is a cross-layer protocol designed from route layer to MAC layer. By adopting a concept of system data sharing, it is possible to make each node exchange the data timely with all the other nodes. It is also a topology-agnostic protocol which has no knowledge of neighbors, routes, or next hops. From the results of the 16-nodes simulation, S-DMDS protocol is proved to be efficient exchange data timely between the devices of AGV system in mobile multihop situation. Moreover, it also shows that S-DMDS significantly outperforms NST-AODV with investing about 41.6% system sharing delay as well as 80% RAM consumption. At last, 5-node experiment indicates that S-DMDS can work well in real environment.

  13. Mobile platform sampling for designing environmental sensor networks.

    Science.gov (United States)

    Budi, Setia; de Souza, Paulo; Timms, Greg; Susanto, Ferry; Malhotra, Vishv; Turner, Paul

    2018-02-09

    This paper proposes a method to design the deployment of sensor nodes in a new region where historical data is not available. A number of mobile platforms are simulated to build initial knowledge of the region. Further, an evolutionary algorithm is employed to find the optimum placement of a given number of sensor nodes that best represents the region of interest.

  14. Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

    Directory of Open Access Journals (Sweden)

    Dalibor Uhlir

    2015-05-01

    Full Text Available Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node, SGSN (Serving GPRS Support Node, F5 or MSP (Multi Service Proxy. Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

  15. Social-aware data dissemination in opportunistic mobile social networks

    Science.gov (United States)

    Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Han, Xiaowei

    Opportunistic Mobile Social Networks (OMSNs), formed by mobile users with social relationships and characteristics, enhance spontaneous communication among users that opportunistically encounter each other. Such networks can be exploited to improve the performance of data forwarding. Discovering optimal relay nodes is one of the important issues for efficient data propagation in OMSNs. Although traditional centrality definitions to identify the nodes features in network, they cannot identify effectively the influential nodes for data dissemination in OMSNs. Existing protocols take advantage of spatial contact frequency and social characteristics to enhance transmission performance. However, existing protocols have not fully exploited the benefits of the relations and the effects between geographical information, social features and user interests. In this paper, we first evaluate these three characteristics of users and design a routing protocol called Geo-Social-Interest (GSI) protocol to select optimal relay nodes. We compare the performance of GSI using real INFOCOM06 data sets. The experiment results demonstrate that GSI overperforms the other protocols with highest data delivery ratio and low communication overhead.

  16. Evaluation of fast neutron irradiation in the treatment of squamous cell carcinoma in cervical lymph nodes

    International Nuclear Information System (INIS)

    Duncan, W.; Orr, J.A.; Arnott, S.J.; Jack, W.J.; Kerr, G.R.

    1987-01-01

    Analyses have been made of the response of metastatic cervical lymph nodes following neutron therapy, either as part of a randomized trial or in patients treated electively. In the trial patients, the overall regression and local control rates were similar after photons and neutrons. Mobile nodes, less than 3.0 cm, appeared to respond better to neutron therapy, and node masses greater than 3.0 cm had better control after photon therapy. The differences observed however were not statistically significant. There was a highly significant association between the control of the primary tumor and control of nodal disease. No survival advantage for neutrons was observed in association with apparently better control rates in cervical nodes

  17. phylo-node: A molecular phylogenetic toolkit using Node.js.

    Science.gov (United States)

    O'Halloran, Damien M

    2017-01-01

    Node.js is an open-source and cross-platform environment that provides a JavaScript codebase for back-end server-side applications. JavaScript has been used to develop very fast and user-friendly front-end tools for bioinformatic and phylogenetic analyses. However, no such toolkits are available using Node.js to conduct comprehensive molecular phylogenetic analysis. To address this problem, I have developed, phylo-node, which was developed using Node.js and provides a stable and scalable toolkit that allows the user to perform diverse molecular and phylogenetic tasks. phylo-node can execute the analysis and process the resulting outputs from a suite of software options that provides tools for read processing and genome alignment, sequence retrieval, multiple sequence alignment, primer design, evolutionary modeling, and phylogeny reconstruction. Furthermore, phylo-node enables the user to deploy server dependent applications, and also provides simple integration and interoperation with other Node modules and languages using Node inheritance patterns, and a customized piping module to support the production of diverse pipelines. phylo-node is open-source and freely available to all users without sign-up or login requirements. All source code and user guidelines are openly available at the GitHub repository: https://github.com/dohalloran/phylo-node.

  18. C-RAM: breaking mobile device memory barriers using the cloud

    OpenAIRE

    Pamboris, A; Pietzuch, P

    2015-01-01

    ?Mobile applications are constrained by the available memory of mobile devices. We present C-RAM, a system that uses cloud-based memory to extend the memory of mobile devices. It splits application state and its associated computation between a mobile device and a cloud node to allow applications to consume more memory, while minimising the performance impact. C-RAM thus enables developers to realise new applications or port legacy desktop applications with a large memory footprint to mobile ...

  19. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-02-16

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  20. Sampled-data-based vibration control for structural systems with finite-time state constraint and sensor outage.

    Science.gov (United States)

    Weng, Falu; Liu, Mingxin; Mao, Weijie; Ding, Yuanchun; Liu, Feifei

    2018-05-10

    The problem of sampled-data-based vibration control for structural systems with finite-time state constraint and sensor outage is investigated in this paper. The objective of designing controllers is to guarantee the stability and anti-disturbance performance of the closed-loop systems while some sensor outages happen. Firstly, based on matrix transformation, the state-space model of structural systems with sensor outages and uncertainties appearing in the mass, damping and stiffness matrices is established. Secondly, by considering most of those earthquakes or strong winds happen in a very short time, and it is often the peak values make the structures damaged, the finite-time stability analysis method is introduced to constrain the state responses in a given time interval, and the H-infinity stability is adopted in the controller design to make sure that the closed-loop system has a prescribed level of disturbance attenuation performance during the whole control process. Furthermore, all stabilization conditions are expressed in the forms of linear matrix inequalities (LMIs), whose feasibility can be easily checked by using the LMI Toolbox. Finally, numerical examples are given to demonstrate the effectiveness of the proposed theorems. Copyright © 2018 ISA. Published by Elsevier Ltd. All rights reserved.

  1. The costs of power outages: A case study from Cyprus

    International Nuclear Information System (INIS)

    Zachariadis, Theodoros; Poullikkas, Andreas

    2012-01-01

    We study the costs of electricity disruptions in Cyprus, which suffered severe power shortages in summer 2011 after an explosion that destroyed 60% of its power generating capacity. We employ both economic and engineering approaches to assess these costs. Among other calculations, we provide estimates of the value of lost load by economic sector and the hourly value of electricity by season and type of day. The results of two economic methods employed to assess welfare losses differ largely, indicating that the assessment of outage costs is associated with many uncertainties. Our calculations show that the emergency actions taken by national energy authorities in response to that accident, though not necessarily optimal, have generally been appropriate and in line with international best practices: the additional costs incurred due to these measures are lower than the economic losses avoided thanks to these actions. Preferential treatment of specific consumer types in the case of repeated power outages remains an open policy question. - Highlights: ► We evaluate the response of energy authorities to a sudden electricity crisis. ► We combine two top-down economic methods and a bottom-up engineering approach. ► We estimate the value of lost electricity by hour, day type and season. ► The response of energy authorities turned out to be effective. ► Costs of emergency actions were lower than the economic losses avoided.

  2. Automated Water Quality Survey and Evaluation Using an IoT Platform with Mobile Sensor Nodes.

    Science.gov (United States)

    Li, Teng; Xia, Min; Chen, Jiahong; Zhao, Yuanjie; de Silva, Clarence

    2017-07-28

    An Internet of Things (IoT) platform with capabilities of sensing, data processing, and wireless communication has been deployed to support remote aquatic environmental monitoring. In this paper, the design and development of an IoT platform with multiple Mobile Sensor Nodes (MSN) for the spatiotemporal quality evaluation of surface water is presented. A survey planner is proposed to distribute the Sampling Locations of Interest (SLoIs) over the study area and generate paths for MSNs to visit the SLoIs, given the limited energy and time budgets. The SLoIs are chosen based on a cellular decomposition that is composed of uniform hexagonal cells. They are visited by the MSNs along a path ring generated by a planning approach that uses a spanning tree. For quality evaluation, an Online Water Quality Index (OLWQI) is developed to interpret the large quantities of online measurements. The index formulations are modified by a state-of-the-art index, the CCME WQI, which has been developed by the Canadian Council of Ministers of Environment (CCME) for off-line indexing. The proposed index has demonstrated effective and reliable performance in online indexing a large volume of measurements of water quality parameters. The IoT platform is deployed in the field, and its performance is demonstrated and discussed in this paper.

  3. Predicting Availability of Mobile Peers in Large Peer-to-Peer Networks

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Ekler, Péter

    2013-01-01

    users and network operators. In these situations, a certain redundancy must be built into the system because the availability of the nodes can vary greatly. The goal of this paper is to present a methodology to minimize the necessary redundancy by predicting the number of available nodes. The prediction......Peer-to-peer (P2P) applications for mobile devices are becoming more and more popular because of increasing bandwidth, computational performance and storage capabilities. Such a mobile based distributed architecture offers significant advantages in several scenarios from the perspective of both...

  4. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  5. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  6. Scripted Mobile Network Routing in a Contested Environment

    National Research Council Canada - National Science Library

    Otto, Anthony R

    2008-01-01

    Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds...

  7. Hydrocarbon Status of Alluvial Soils in the Istra Morphostructural Node (Moscow Oblast)

    Science.gov (United States)

    Pikovskiy, Yu. I.; Gennadiev, A. N.; Kovach, R. G.; Khlynina, N. I.; Khlynina, A. V.

    2017-12-01

    The effect of the current block structure of the earth's crust and its most active sites (morphostructural nodes) on the natural hydrocarbon status of alluvial soils has been considered. Studies have been performed in the Istra district of Moscow oblast within the Istra morphostructural node. The node represents an area of increased geodynamic activity of the earth's crust located at the convergence or intersection of block boundaries: mobile linear zones following large river valleys with alluvial soils. Soil cover mainly consists of alluvial humic-gley soils (Eutric Gleyic Fluvisols) of different depths and alluvial mucky-gley soils (Eutric Gleyic Histic Fluvisols). Some soils manifest stratification. Two factors forming the hydrocarbon status of soils are considered: soil processes and the effect of geodynamic activity, which is manifested within the morphostructural node. The contents of bitumoids and retained methane and butanes in alluvial soils appreciably increase at the entry of river valley into the node. The occurrence frequency of 5-6-ring polycyclic aromatic hydrocarbons (perylene and benzo[ghi]perylene) in mineral horizons increases. It has been concluded that alluvial soils within the Istra morphostructural node are characterized by the biogeochemical type of hydrocarbon status with signs of emanation type at sites with the highest geodynamic activity.

  8. An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Prasad, Ramjee

    deliberation. To tackle these two problems, Mobile Wireless Sensor Networks (MWSNs) is a better choice. In MWSN, Sensor nodes move freely to a target area without the need for any special infrastructure. Due to mobility, the routing process in MWSN has become more complicated as connections in the network can...... such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The authors study the influence of energy heterogeneity and mobility of sensor nodes on the performance of EMRP. The Performance of EMRP compared with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing...

  9. Consequences of long-term power outages and high electricity prices lasting for months; Konsekvenser av langvarige stroemutfall og hoeye kraftpriser i flere maaneder

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Several areas in the world have experienced electricity outages for longer periods of time, but the consequences of these are sparsely documented. There is a need for further analysis of the socioeconomic consequences of the outages. In addition to KILE (Quality adjusted revenue framework for un supplied energy) costs one has to take into account that the costs often increase proportionally with the durance of the outage, and that KILE tariffs do not reflect lost consumer's surplus for products that are not produced during an outage. A good example is the public underground transport, where the company's economical loss can be significantly smaller than the loss of utility value for the travellers. If the authorities act with reasonability it is difficult to see that periods with very high prices represent a big problem. The most important problems are related to diffused effects, especially for households with a weak economy. These problems can be solved with improved contractual forms (price guarantees) or by transfers to the households, without weakening the incentives for electricity economising (ml)

  10. Anchor-free localization method for mobile targets in coal mine wireless sensor networks.

    Science.gov (United States)

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes' location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  11. Placement of Synchronized Measurements for Power System Observability during Cascaded Outages

    Science.gov (United States)

    Thirugnanasambandam, Venkatesh; Jain, Trapti

    2017-11-01

    Cascaded outages often result in power system islanding followed by a blackout and therefore considered as a severe disturbance. Maintaining the observability of each island may help in taking proper control actions to preserve the stability of individual islands thus, averting system collapse. With this intent, a strategy for placement of synchronized measurements, which can be obtained from phasor measurement units (PMU), has been proposed in this paper to keep the system observable during cascaded outages also. Since, all the cascaded failures may not lead to islanding situations, therefore, failures leading to islanding as well as non-islanding situations have been considered. A topology based algorithm has been developed to identify the islanding/non-islanding condition created by a particular cascaded event. Additional contingencies such as single line loss and single PMU failure have also been considered after the occurrence of cascaded events. The proposed method is further extended to incorporate the measurement redundancy, which is desirable for a reliable state estimation. The proposed scheme is tested on IEEE 14-bus, IEEE 30-bus and a practical Indian 246-bus networks. The numerical results ensure the observability of the power system under system intact as well as during cascaded islanding and non-islanding disturbances.

  12. Outage performance analysis of underlay cognitive RF and FSO wireless channels

    KAUST Repository

    Ansari, Imran Shafique

    2014-09-01

    In this work, the outage performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) channel cascaded with a free-space optical (FSO) link is presented. For the RF link, an underlay cognitive network is considered where the secondary users share the spectrum with licensed primary users. Indoor femtocells act as a practical example for such networks. More specifically, it is assumed that the RF link applies power control to maintain the interference at the primary network below a predetermined threshold. While the RF channel is modeled by the Rayleigh fading distribution, the FSO link is modeled by a unified Gamma-Gamma turbulence distribution. The FSO link accounts for pointing errors and both types of detection techniques (i.e. heterodyne detection as well as intensity modulation/direct detection (IM/DD)). With this model, a new exact closed-form expression is derived for the outage probability of the end-To-end signal-To-noise ratio of these systems in terms of the Meijer\\'s G function and the Fox\\'s H functions under fixed amplify-and-forward relay scheme. All new analytical results are verified via computer-based Monte-Carlo simulations and are illustrated by some selected numerical results.

  13. Node cookbook

    CERN Document Server

    Clements, David Mark

    2014-01-01

    In Node Cookbook Second Edition, each chapter focuses on a different aspect of working with Node. Following a Cookbook structure, the recipes are written in an easy-to-understand language. Readers will find it easier to grasp even the complex recipes which are backed by lots of illustrations, tips, and hints.If you have some knowledge of JavaScript and want to build fast, efficient, scalable client-server solutions, then Node Cookbook Second Edition is for you. Knowledge of Node will be an advantage but is not required. Experienced users of Node will be able to improve their skills.

  14. Hop-by-HopWorm Propagation with Carryover Epidemic Model in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun-Won Ho

    2015-10-01

    Full Text Available In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropriate propagation strategy is needed for mobile sensor worms. To meet this need, we discuss a hop-by-hop worm propagation model in mobile sensor networks. In a hop-by-hop worm propagation model, benign nodes are infected by worm in neighbor-to-neighbor spread manner. Since worm infection occurs in hop-by-hop contact, it is not substantially affected by a route breach incurred by node mobility. We also propose the carryover epidemic model to deal with the worm infection quota deficiency that might occur when employing an epidemic model in a mobile sensor network. We analyze worm infection capability under the carryover epidemic model. Moreover, we simulate hop-by-hop worm propagation with carryover epidemic model by using an ns-2 simulator. The simulation results demonstrate that infection quota carryovers are seldom observed where a node’s maximum speed is no less than 20 m/s.

  15. The four ''Ps'' of outage management

    International Nuclear Information System (INIS)

    Kuehn, S.E.

    1996-01-01

    This article describes how planning, partnering, preparation and people prevent poor outage performance. Boasting the best production costs in a decade, the US fleet of nuclear reactors is performing better than ever. Industry wide, production costs fell 7% to $20.02 per net megawatt hour (MWh) and output climbed 3% to 634million MWh. It doesn't take a nuclear physicists to realize that when base-loaded nuclear units are operated for long periods of time, near their technical potential, costs will fall and relative performance improves. Statistics for 1994 compiled by the Institute of Nuclear Operations (INPO) and the World Association of Nuclear Operators (WANO) showed the industry has steadily improved in most of the 10 industry-recognized categories. In 1994, Unit Capability Factor (the percentage of maximum energy generation a plant can supply to the grid) reached just under 82%, beating the 1995 goal and proving just how far the industry has come (62.7% in 1980) when improving plant operations

  16. Improvement of availability of PWR nuclear plants through the reduction of the time required for refueling/maintenance outages, Phase 1. Final report

    International Nuclear Information System (INIS)

    Thompson, C.A.

    1978-08-01

    The objective of this project is to identify improvements in procedures and equipment which will reduce the time required for refueling/maintenance outages at PWR nuclear power plants. The outage of Commonwealth Edison Zion Station Unit 1 in March through May of 1976 was evaluated to identify those items which caused delays and those work activities that offer the potential for significant improvements toward reducing its overall duration. Thus, the plant's availability for power production would be increased. Revisions in procedures and some equipment modifications were implemented and evaluated during the Zion Unit 2 refueling/maintenance outage beginning in January 1977. Analysis of the observed data has identified benefits available through improved refueling equipment and also areas where additional new, innovative refueling, or refueling-related equipment should be beneficial. A number of specific design concepts are recommended as a result of Phase 1. In addition, a new master planning mechanism is described for implementation during subsequent planned outages at Zion Station. This final report describes the recommended conceptual designs and planning mechanism and assesses their impact upon future outages. Their effect on savings in refueling time, labor, and radiation exposure is discussed. The estimated economic payoff for these concepts was found to be of such significance that an additional phase of the program is warranted. During this extended phase, a more detailed engineering study should be undertaken to determine the cost of implementation along with more specific estimates of the benefits for PWR plants already in operation or under construction

  17. A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective

    Directory of Open Access Journals (Sweden)

    Bo Zhang

    2016-01-01

    Full Text Available While the mechanism of reputation aggregation proves to be an effective scheme for indicating an individual’s trustworthiness and further identifying malicious ones in mobile social networks, it is vulnerable to collusive attacks from malicious nodes of collaborative frauds. To conquer the challenge of detecting collusive attacks and then identifying colluders for the reputation system in mobile social networks, a fuzzy collusive attack detection mechanism (FCADM is proposed based on nodes’ social relationships, which comprises three parts: trust schedule, malicious node selection, and detection traversing strategy. In the first part, the trust schedule provides the calculation method of interval valued fuzzy social relationships and reputation aggregation for nodes in mobile social networks; further, a set of fuzzy valued factors, that is, item judgment factor, node malicious factor, and node similar factor, is given for evaluating the probability of collusive fraud happening and identifying single malicious nodes in the second part; and moreover, a detection traversing strategy is given based on random walk algorithm under the perspectives of fuzzy valued nodes’ trust schedules and proposed malicious factors. Finally, our empirical results and analysis show that the proposed mechanism in this paper is feasible and effective.

  18. Assessment and Application of the ROSE Code for Reactor Outage Thermal-Hydraulic and Safety Analysis

    International Nuclear Information System (INIS)

    Liang, Thomas K.S.; Ko, F.-K.; Dai, L.-C.

    2001-01-01

    The currently available tools, such as RELAP5, RETRAN, and others, cannot easily and correctly perform the task of analyzing the system behavior during plant outages. Therefore, a medium-sized program aiming at reactor outage simulation and evaluation, such as midloop operation (MLO) with loss of residual heat removal (RHR), has been developed. Important thermal-hydraulic processes involved during MLO with loss of RHR can be properly simulated by the newly developed reactor outage simulation and evaluation (ROSE) code. The two-region approach with a modified two-fluid model has been adopted to be the theoretical basis of the ROSE code.To verify the analytical model in the first step, posttest calculations against the integral midloop experiments with loss of RHR have been performed. The excellent simulation capacity of the ROSE code against the Institute of Nuclear Energy Research Integral System Test Facility test data is demonstrated. To further mature the ROSE code in simulating a full-sized pressurized water reactor, assessment against the WGOTHIC code and the Maanshan momentary-loss-of-RHR event has been undertaken. The successfully assessed ROSE code is then applied to evaluate the abnormal operation procedure (AOP) with loss of RHR during MLO (AOP 537.4) for the Maanshan plant. The ROSE code also has been successfully transplanted into the Maanshan training simulator to support operator training. How the simulator was upgraded by the ROSE code for MLO will be presented in the future

  19. An Efficient Simulation Scheme of the Outage Probability with Co-Channel Interference

    KAUST Repository

    Rached, Nadhir B.

    2016-03-28

    © 2015 IEEE. The outage probability (OP) of the signal-to-interference-plus-noise ratio (SINR) is an important metric used to evaluate the performance of wireless communication systems operating over fading channels. One major difficulty toward assessing the OP is that, in most of the realistic scenarios, closed-form expressions cannot be derived. This is for instance the case of Log-normal fading environments, in which evaluating the OP of the SINR amounts to computing the probability that a sum of correlated Log-normal variates exceeds a given threshold. Since such a probability is not known to admit a closed-form expression, it has thus far been evaluated by several approximation techniques, the accuracies of which are unfortunately not guaranteed in the interesting region of small outage probabilities. For these regions, simulation techniques based on variance reduction algorithms can represent a good alternative, being well-recognized to be quick and highly accurate for estimating rare event probabilities. This constitutes the major motivation behind our work. More specifically, we propose an efficient importance sampling approach which is based on a covariance matrix scaling technique and illustrate its computational gain over naive Monte Carlo simulations through some selected simulation results.

  20. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    Science.gov (United States)

    Islam, Shayla; Abdalla, Aisha H.; Habaebi, Mohamed H.; Latif, Suhaimi A.; Hassan, Wan H.; Hasan, Mohammad K.; Ramli, H. A. M.; Khalifa, Othman O.

    2013-12-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, "Signaling Storm" occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6.

  1. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    International Nuclear Information System (INIS)

    Islam, Shayla; Abdalla, Aisha H; Habaebi, Mohamed H; Latif, Suhaimi A; Hassan, Wan H; Hasan, Mohammad K; Ramli, H A M; Khalifa, Othman O

    2013-01-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, ''Signaling Storm'' occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6

  2. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  3. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junjie Ma

    2018-02-01

    Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  4. Whirlpool routing for mobility

    KAUST Repository

    Lee, Jung Woo

    2010-01-01

    We present the Whirlpool Routing Protocol (WARP), which efficiently routes data to a node moving within a static mesh. The key insight in WARP\\'s design is that data traffic can use an existing routing gradient to efficiently probe the topology, repair the routing gradient, and communicate these repairs to nearby nodes. Using simulation, controlled testbeds, and real mobility experiments, we find that using the data plane for topology maintenance is highly effective due to the incremental nature of mobility updates. WARP leverages the fact that converging flows at a destination make the destination have the region of highest traffic. We provide a theoretical basis for WARP\\'s behavior, defining an "update area" in which the topology must adjust when a destination moves. As long as packets arrive at a destination before it moves outside of the update area, WARP can repair the topology using the data plane. Compared to existing protocols, such as DYMO and HYPER, WARP\\'s packet drop rate is up to 90% lower while sending up to 90% fewer packets.

  5. Nonparametric Tree-Based Predictive Modeling of Storm Outages on an Electric Distribution Network.

    Science.gov (United States)

    He, Jichao; Wanik, David W; Hartman, Brian M; Anagnostou, Emmanouil N; Astitha, Marina; Frediani, Maria E B

    2017-03-01

    This article compares two nonparametric tree-based models, quantile regression forests (QRF) and Bayesian additive regression trees (BART), for predicting storm outages on an electric distribution network in Connecticut, USA. We evaluated point estimates and prediction intervals of outage predictions for both models using high-resolution weather, infrastructure, and land use data for 89 storm events (including hurricanes, blizzards, and thunderstorms). We found that spatially BART predicted more accurate point estimates than QRF. However, QRF produced better prediction intervals for high spatial resolutions (2-km grid cells and towns), while BART predictions aggregated to coarser resolutions (divisions and service territory) more effectively. We also found that the predictive accuracy was dependent on the season (e.g., tree-leaf condition, storm characteristics), and that the predictions were most accurate for winter storms. Given the merits of each individual model, we suggest that BART and QRF be implemented together to show the complete picture of a storm's potential impact on the electric distribution network, which would allow for a utility to make better decisions about allocating prestorm resources. © 2016 Society for Risk Analysis.

  6. Fast Outage Probability Simulation for FSO Links with a Generalized Pointing Error Model

    KAUST Repository

    Ben Issaid, Chaouki

    2017-02-07

    Over the past few years, free-space optical (FSO) communication has gained significant attention. In fact, FSO can provide cost-effective and unlicensed links, with high-bandwidth capacity and low error rate, making it an exciting alternative to traditional wireless radio-frequency communication systems. However, the system performance is affected not only by the presence of atmospheric turbulences, which occur due to random fluctuations in the air refractive index but also by the existence of pointing errors. Metrics, such as the outage probability which quantifies the probability that the instantaneous signal-to-noise ratio is smaller than a given threshold, can be used to analyze the performance of this system. In this work, we consider weak and strong turbulence regimes, and we study the outage probability of an FSO communication system under a generalized pointing error model with both a nonzero boresight component and different horizontal and vertical jitter effects. More specifically, we use an importance sampling approach which is based on the exponential twisting technique to offer fast and accurate results.

  7. Outage performance of opportunistic two-way amplify-and-forward relaying with outdated channel state information

    KAUST Repository

    Hwang, Kyusung; Ju, Minchul; Alouini, Mohamed-Slim

    2013-01-01

    In this paper, we study the outage performance of an amplify-and-forward (AF)-based two-way relaying (TWR) system with multiple relays where a single relay selection is performed based on outdated channel state information (CSI). Specifically, we

  8. A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gulshan Kumar

    2017-01-01

    Full Text Available Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.

  9. Energy-efficient dynamic resource allocation with energy harvesting nodes

    OpenAIRE

    Rubio López, Javier

    2012-01-01

    The allocation of radio resources where nodes are battery constrained. [ANGLÈS] In wireless communications, there is a trend to deploy shorter-distance networks to cope with the high demanding necessities of bit-rate that current applications require. In such networks, the power needed for transmission is considerably low, due to proximity between base station and mobile terminals. As a consequence, complex baseband algorithms for signal processing and radio frequency circuitry require an ...

  10. Development of GaN-based micro chemical sensor nodes

    Science.gov (United States)

    Son, Kyung-ah; Prokopuk, Nicholas; George, Thomas; Moon, Jeong S.

    2005-01-01

    Sensors based on III-N technology are gaining significant interest due to their potential for monolithic integration of RF transceivers and light sources and the capability of high temperature operations. We are developing a GaN-based micro chemical sensor node for remote detection of chemical toxins, and present electrical responses of AlGaN/GaN HEMT (High Electron Mobility Transistor) sensors to chemical toxins as well as other common gases.

  11. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  12. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  13. A Social Potential Fields Approach for Self-Deployment and Self-Healing in Hierarchical Mobile Wireless Sensor Networks.

    Science.gov (United States)

    González-Parada, Eva; Cano-García, Jose; Aguilera, Francisco; Sandoval, Francisco; Urdiales, Cristina

    2017-01-09

    Autonomous mobile nodes in mobile wireless sensor networks (MWSN) allow self-deployment and self-healing. In both cases, the goals are: (i) to achieve adequate coverage; and (ii) to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage.

  14. Development of an Agent Based Model to Estimate and Reduce Time to Restoration of Storm Induced Power Outages

    Science.gov (United States)

    Walsh, T.; Layton, T.; Mellor, J. E.

    2017-12-01

    Storm damage to the electric grid impacts 23 million electric utility customers and costs US consumers $119 billion annually. Current restoration techniques rely on the past experiences of emergency managers. There are few analytical simulation and prediction tools available for utility managers to optimize storm recovery and decrease consumer cost, lost revenue and restoration time. We developed an agent based model (ABM) for storm recovery in Connecticut. An ABM is a computer modeling technique comprised of agents who are given certain behavioral rules and operate in a given environment. It allows the user to simulate complex systems by varying user-defined parameters to study emergent, unpredicted behavior. The ABM incorporates the road network and electric utility grid for the state, is validated using actual storm event recoveries and utilizes the Dijkstra routing algorithm to determine the best path for repair crews to travel between outages. The ABM has benefits for both researchers and utility managers. It can simulate complex system dynamics, rank variable importance, find tipping points that could significantly reduce restoration time or costs and test a broad range of scenarios. It is a modular, scalable and adaptable technique that can simulate scenarios in silico to inform emergency managers before and during storm events to optimize restoration strategies and better manage expectations of when power will be restored. Results indicate that total restoration time is strongly dependent on the number of crews. However, there is a threshold whereby more crews will not decrease the restoration time, which depends on the total number of outages. The addition of outside crews is more beneficial for storms with a higher number of outages. The time to restoration increases linearly with increasing repair time, while the travel speed has little overall effect on total restoration time. Crews traveling to the nearest outage reduces the total restoration time

  15. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels.

    Science.gov (United States)

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-02-26

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source's radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks.

  16. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Suleiman Zubair

    2016-01-01

    Full Text Available The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage, PU signal protection (by the introduction of a mobility-induced guard (mguard distance and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput. It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  17. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-29

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  18. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    Science.gov (United States)

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-01

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works. PMID:26840312

  19. 77 FR 63757 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Science.gov (United States)

    2012-10-17

    ... telephone subscriptions in the United States were users of interconnected VoIP providers--an increase of 21... Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final...

  20. Outage performance improvement by state of the art reactor stud tensioning

    International Nuclear Information System (INIS)

    Oehler, Horst Werner; Vervliet, Herman

    2006-01-01

    Actual methods of reactor closing, i.e. cover to vessel sealing, is based on the creation of an equal load to the sealing circumference by tensioning all reactor studs with an equal force. This method ensures leak tightness through equal compression of the reactor seal in normal circumstances and is largely applied for all types of reactors throughout many generations and designs of nuclear power stations. The tension generated in each reactor stud is controlled indirectly by measuring the reactor stud elongation while under stress. Most studs are designed to measure this elongation easily by conventional or more advanced systems (from individual clock gauge to integrated digital transmission to a computer screen). It is this elongation value, prescribed by the reactor vessel/cover manufacturer which must be respected and demonstrated during all reactor closing operations, weather they take place for initial hydro testing, refuelling operations or periodical hydraulic tests of the primary circuit. Closing (and re-opening) of reactor vessels has become a routine operation as it is required for fuel reloading of the reactor core. This operation is performed on all PWR and BWR type of reactors with a large variety of tooling. As most of the utilities have implemented maintenance optimisation programs, the refuelling outage is reduced to a sequence of activities that allow quick and efficient refuelling of the core. The performance and efficiency of instrumentation and tooling deployed during these essential activities are of the utmost importance to minimise the critical path of the refuelling outage. Today, in support of outage performance, many utilities have invested in new and refurbished tooling to allow quick and efficient opening and closing of the reactor vessel. The features and properties of the most performing multi stud tensioning machines currently in service in nuclear power stations world wide (Africa, Europe, Asia and USA) are presented in the paper

  1. Infrastructures of Mobile Social Media

    Directory of Open Access Journals (Sweden)

    Jason Farman

    2015-04-01

    Full Text Available In the age of mobile media, social interactions prioritize proximity and depend on our material engagement with the world. As such, the study of social media in the mobile era must look beyond the interface. Studies in this field must go beyond what takes place on the screens of devices to contextualize those interactions with what is happening around those devices. Moving beyond the interface, the study of social mobile media must then take into account the various infrastructures that make these practices possible (including fiber optic cables that run along the paths laid by railroad tracks, the mobile switching centers run by mobile providers that route data, the Internet data centers and peering points, and the servers that connect people and data. As social media scholarship turns toward the various levels of invisibility and visibility of the infrastructures required for mobile social media to work, it becomes clear that practices of social media are one node among a massive network of materiality.

  2. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  3. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2010-11-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  4. Allocating resources between network nodes for providing a network node function

    OpenAIRE

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a server (e.g. application server, a proxy server, cloud location, router). Examples of the second network node are an application server, a cloud location or a router. The available resources may b...

  5. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  6. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Daniel Weber

    2008-07-01

    Full Text Available The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  7. Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Amine Dahane

    2015-01-01

    Full Text Available The main concern of clustering approaches for mobile wireless sensor networks (WSNs is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. The approach based on the computing of the weight of each node in the network is one of the proposed techniques to deal with this problem. In this paper, we propose an energy efficient and safe weighted clustering algorithm (ES-WCA for mobile WSNs using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, the highlight of our work is summarized in a comprehensive strategy for monitoring the network, in order to detect and remove the malicious nodes. We use simulation study to demonstrate the performance of the proposed algorithm.

  8. Outage analysis for underlay relay-assisted cognitive networks

    KAUST Repository

    Tourki, Kamel; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2012-01-01

    Cooperative relay technology was recently introduced into cognitive radio networks in order to enhance network capacity, scalability, and reliability of end-to-end communication. In this paper, we investigate an underlay cognitive network where the quality of service of the secondary link is maintained by triggering an opportunistic regenerative relaying once it falls under an unacceptable level. We first provide the exact cumulative density function (CDF) of received signal-to-noise (SNR) over each hop with co-located relays. Then, the CDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. We validate our analysis by showing that simulation results coincide with our analytical results in Rayleigh fading channels. © 2012 IEEE.

  9. Outage analysis for underlay relay-assisted cognitive networks

    KAUST Repository

    Tourki, Kamel

    2012-12-01

    Cooperative relay technology was recently introduced into cognitive radio networks in order to enhance network capacity, scalability, and reliability of end-to-end communication. In this paper, we investigate an underlay cognitive network where the quality of service of the secondary link is maintained by triggering an opportunistic regenerative relaying once it falls under an unacceptable level. We first provide the exact cumulative density function (CDF) of received signal-to-noise (SNR) over each hop with co-located relays. Then, the CDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. We validate our analysis by showing that simulation results coincide with our analytical results in Rayleigh fading channels. © 2012 IEEE.

  10. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  11. Node-pair reliability of network systems with small distances between adjacent nodes

    International Nuclear Information System (INIS)

    Malinowski, Jacek

    2007-01-01

    A new method for computing the node-pair reliability of network systems modeled by random graphs with nodes arranged in sequence is presented. It is based on a recursive algorithm using the 'sliding window' technique, the window being composed of several consecutive nodes. In a single step, the connectivity probabilities for all nodes included in the window are found. Subsequently, the window is moved one node forward. This process is repeated until, in the last step, the window reaches the terminal node. The connectivity probabilities found at that point are used to compute the node-pair reliability of the network system considered. The algorithm is designed especially for graphs with small distances between adjacent nodes, where the distance between two nodes is defined as the absolute value of the difference between the nodes' numbers. The maximal distance between any two adjacent nodes is denoted by Γ(G), where G symbolizes a random graph. If Γ(G)=2 then the method can be applied for directed as well as undirected graphs whose nodes and edges are subject to failure. This is important in view of the fact that many algorithms computing network reliability are designed for graphs with failure-prone edges and reliable nodes. If Γ(G)=3 then the method's applicability is limited to undirected graphs with reliable nodes. The main asset of the presented algorithms is their low numerical complexity-O(n), where n denotes the number of nodes

  12. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  13. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  14. Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems

    KAUST Repository

    Ding, Haiyang

    2015-09-28

    This paper advocates a distributed role selection strategy to coordinate two-way relaying transmissions among three cooperative nodes. For such, the local channel state information comparison and decision feedback mechanism are merged into classical analog network coding (ANC) and time division broadcast (TDBC) protocols such that the cooperative role of each node can be designated in a distributed fashion. We refer to this distributed role selection rule as d-ROSE. In both ANC-based and TDBC-based two-way relaying scenarios, strict proof for the equivalence of d-ROSE and optimal ROSE is given, which indicates that albeit the different form, their final role decision is essentially the same. Outage analysis for the d-ROSE strategy is carried out and the scaling law of the system outage behavior at high signal-to-noise ratio (SNR) is characterized, which manifests that d-ROSE can enhance the system diversity gain to one-order higher relative to the ANC and TDBC protocols. It is also shown that d-ROSE can reduce the signaling overhead upto 60% to perform the outage-optimal role selection. Finally, the impacts of node placement on the outage performance as well as the average signaling overhead of d-ROSE are numerically evaluated and some useful conclusions are drawn. © 2015 IEEE.

  15. A Social Potential Fields Approach for Self-Deployment and Self-Healing in Hierarchical Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eva González-Parada

    2017-01-01

    Full Text Available Autonomous mobile nodes in mobile wireless sensor networks (MWSN allow self-deployment and self-healing. In both cases, the goals are: (i to achieve adequate coverage; and (ii to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage.

  16. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Directory of Open Access Journals (Sweden)

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  17. A Short-Term Outage Model of Wind Turbines with Doubly Fed Induction Generators Based on Supervisory Control and Data Acquisition Data

    Directory of Open Access Journals (Sweden)

    Peng Sun

    2016-10-01

    Full Text Available This paper presents a short-term wind turbine (WT outage model based on the data collected from a wind farm supervisory control and data acquisition (SCADA system. Neural networks (NNs are used to establish prediction models of the WT condition parameters that are dependent on environmental conditions such as ambient temperature and wind speed. The prediction error distributions are discussed and used to calculate probabilities of the operation of protection relays (POPRs that were caused by the threshold exceedance of the environmentally sensitive parameters. The POPRs for other condition parameters are based on the setting time of the operation of protection relays. The union probability method is used to integrate the probabilities of operation of each protection relay to predict the WT short term outage probability. The proposed method has been used for real 1.5 MW WTs with doubly fed induction generators (DFIGs. The results show that the proposed method is more effective in WT outage probability prediction than traditional methods.

  18. Optimizations in Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana

    nodes. The independent control of the user’s transmit power at each node may cause degradation of the overall performance. In this line, a dedicated study of power distribution among the carriers is performed. An optimization of the power allocation is proposed and evaluated. The results show...... significant performance improvement to the achieved user throughput in low as well as in high loads in the cell. The flow control of the data between the nodes is another challenge for effective aggregation of the resources in case of dual connectivity. As such, this thesis discusses the challenges...... with the densification of the base stations, bring into a very complex network management and operation control for the mobile operators. Furthermore, the need to provide always best connection and service with high quality demands for a joint overall network resource management. This thesis addresses this challenge...

  19. Worldwide OMEGA and Very Low Frequency (VLF) Transmitter Outages, January to December 1980.

    Science.gov (United States)

    1981-05-01

    WORLDWIDE OMEGA AND VERY LOW FREQUENCY IVLF) TRANSMITTER OUTAGE--ETC, MAY 81 L RZONCA ,’,L.ASSI LED FAA-CT-81-26 FAA-RD- B1 -29 UL7 A-I’ l15FDRL AIO...computer for the time period GBR - Rugby , England (16.00 kHz) January to December 1980. (For the purposes of this report, any downtime NA - Cutler, Maine

  20. Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.

    Science.gov (United States)

    Han, Changcai; Yang, Jinsheng

    2017-10-30

    The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.