Internet-of-Things (IoT) devices have a strict necessity for power consumption to achieve the expected battery life. Therefore, measuring and optimizing the energy consumption of IoT nodes are essential. IoT nodes feature extreme current consumption range over 100 dB between their operating modes. The main focus of this article is to design and...
 The fault occurred in transmission line is very much dangerous for the locality. In HV and EHV transmission line there are less fault occurrence but in locality the fault occurrence is more as compared to outer transmission line. In our prototype we design a model which is to be detect the fault in transmission line by comparing the voltage signal ...
 Cables are put underground to stay away from pointless obstruction. These force cables convey electrical force and when these cables are put underground it is extremely hard to decide the specific area of the deficiency happened. There are numerous elements or purposes behind a deficiency to happen as, for example, burrowing, tremor, development wo...
 Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continui...
 In this brief, based on upset physical mechanism together with reasonable transistor size, a robust 10T memory cell is first proposed to enhance the reliability level in aerospace radiation environment, while keeping the main advantages of small area, low power, and high stability. Using Taiwan Semiconductor Manufacturing Company 65-nm CMOS commerc...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
 Microgrids are emerging as an important constituent of large-scale smart grids. They are equipped with the controls necessary for managing the operation in islanded or grid connected mode and serve the loads with clean, reliable, and uninterruptible power. Microgrid must be equipped with a robust grid synchronization (GS) algorithm so as to allow a...
 The integration of decentralized generation units and the application of demand response programs brings changes to the power systems. Microgrids are emerging with relevant advantages for the power system operation. For this reason, several research projects are currently studding and finding methods to improve microgrids management. The developmen...
 Lighting, both indoor and outdoor, consumes a substantial amount of energy, making improved efficiency a significant challenge. A promising approach to address outdoor lighting is the smart control of public lighting. Smart lighting using electronically controlled light-emitting diode (LED) lights for adaptable illumination and monitoring is being ...
 A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
 This paper proposes a new ZigBee-based communication for multifunctional electronic current transformers (ECTs), which are used in overhead and underground line monitoring. To tackle ZigBee’s low transmission rate, the proposed method involving a transmission strategy can make the ZigBee-based communication satisfy both measurable and protective pu...
 Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...
 5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
 The increase in electronic loads connected to electrical network became relevant requirements of the quality of supply. Among the equipment used in the power distribution system stands out regulators medium voltage installed over the grid to maintain voltage levels within indifferent operating range of the oscillations. Therefore, the quality of su...
 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
 Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
 In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
 This paper addresses the problem of decentralized sensor selection in an energy-constrained wireless sensor network-based Internet-of-Things, for monitoring a spatio-temporally varying process. To do so, an adaptive edge computing framework and its variants are proposed which distributedly optimize a critical trade-off between sensing quality and r...
 The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
 An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...
 Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...
 With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...
 Data-driven approaches are envisioned to build future Edge-IoT systems that satisfy IoT devices demands for edge resources. However, significant challenges and technical barriers exist which complicate resource management of such systems. IoT devices can demonstrate a wide range of behaviors in the devices resource demand that are extremely difficu...
 In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...
 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
 Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The communication among various areas under the DoS attack is deteriorated to switching residual topologies whose time characteristic is modeled by model-dependent ave...
 The switching operations of circuit breakers and disconnectors in substations can generate very fast transients, including transient earth voltage rise and intense electromagnetic radiation, causing severe disturbance of on-site electronic devices in substations and seriously affecting the development of smart power equipment. The power supply of a...
  The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solutio...
 Design a prepaid energy meter to monitor the consumption of electricity. The concept “Pay first and then use it”. Prepaid energy meter also reduces the error made by humans while taking readings to a large extent. This project helps us to monitor the electricity system. ...
 The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required. Existing studies use traditional block chain as to achieve this requirement. Block chain-en...
 Smart grid applications, such as teleportation, synchrophasors, remote condition monitoring, and control of assets, require timely and reliable data communication systems. Many communication architectures and solutions have been proposed to provide support for these smart grid applications, including ber networks, wireless mobile networks, wireless...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com