Visible to the public Biblio

Filters: Keyword is reliable system  [Clear All Filters]
2020-02-17
Maykot, Arthur S., Aranha Neto, Edison A. C., Oliva, Neimar A..  2019.  Automation of Manual Switches in Distribution Networks Focused on Self-Healing: A Step toward Smart Grids. 2019 IEEE PES Innovative Smart Grid Technologies Conference - Latin America (ISGT Latin America). :1–4.
This work describes the self-healing systems and their benefits in the power distribution networks, with the objective of indicating which manual switch should become, as a matter of priority, automatic. The computational tool used is based on graph theory, genetic algorithms and multicriteria evaluation. There are benefits for consumers, that will benefit from a more reliable and stable system, and for the utility, that can reduce costs with team field and financial compensations payed to consumers in case of continuity indexes violation. Data from a real distribution network from the state of Sao Paulo will be used as a case study for the application of the methodology.
2015-05-06
Nitti, M., Girau, R., Atzori, L..  2014.  Trustworthiness Management in the Social Internet of Things. Knowledge and Data Engineering, IEEE Transactions on. 26:1253-1266.

The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their owners with the benefits of improving the network scalability in information/service discovery. Within this scenario, we focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. In the subjective model each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the friends in common with the potential service providers. In the objective model, the information about each node is distributed and stored making use of a distributed hash table structure so that any node can make use of the same information. Simulations show how the proposed models can effectively isolate almost any malicious nodes in the network at the expenses of an increase in the network traffic for feedback exchange.