Cyber-Physical Distributed Systems. Min Xie. Читать онлайн. Newlib. NEWLIB.NET

Автор: Min Xie
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Отраслевые издания
Год издания: 0
isbn: 9781119682714
Скачать книгу
with degraded components.Figure 2.2 Simulink realization of the microgrid. (a) Ethernet, (b) Hybrid n...Figure 2.3 Sending time and receiving time for the (a) interference node, (b...Figure 2.4 Comparisons among the Wiener degradation model of (2.3) and linea...

      2 Chapter 3Figure 3.1 Schematic of the single‐area WAPS with communication delays.Figure 3.2 An illustrative example for the time delays in C‐A channel.Figure 3.3 Schematic of illustrative physical.Figure 3.4 Real‐time curves of (a) wind speed, (b) solar irradiance and (b) ...Figure 3.5 Schematic of illustrative cyber layer.Figure 3.6 Control block diagram of illustrative integrated system.Figure 3.7 Schematic of DHMM: Observed time delays are generated by the unde...Figure 3.8 The illustrative WAPS with the DHMM‐based Smith predictor.Figure 3.9 The flowchart of the DHMM‐based Smith Predictor.Figure 3.10 The C‐A time delay observations derived from different quantizat...Figure 3.11 The prediction results for C‐A time delaysFigure 3.12 Most likely network states derived from the two different quanti...Figure 3.13 LFC performance of WAPS (a) without Smith predictor, (b) with Sm...Figure 3.14 Dynamic performance of single‐area LFC (PID controller) of WAPS ...Figure 3.15 Eigenvalue spectrum of the microgrid in the presence of time del...Figure 3.16 System frequency responses of (a) the PI controller with 20 ms t...Figure 3.17 System reliability as a function of the length of data traffic....Figure 3.18 System reliability as a function of the variable of the network ...Figure 3.19 Pareto optimal sets and tradeoff of the optimization objectives ...Figure 3.20 Evolution of (a) FESS, (b) BESS, (c) DEG, and (d) system frequen...Figure 3.21 Evolution of (a) FESS, (b) BESS, (c) DEG, and (d) system frequen...Figure 3.22 Evolution of (a) FESS, (b) BESS, (c) DEG, and (d) system frequen...Figure 3.23 Evolution of (a) FESS, (b) BESS, (c) DEG, and (d) system frequen...Figure 3.24 Evolution of the system frequency deviation under normal operati...

      3 Chapter 4Figure 4.1 The conceptual diagram of DGSs with degraded communication networ...Figure 4.2 Simulation of degraded communication networks ‐ (a) delays and (b...Figure 4.3 Simulation of degraded communication networks ‐ (a) delays and (b...Figure 4.4 Different power profiles of (a) load, (b) MS, (c) PV and (d) WTG ...Figure 4.5 Different PCLPs for September 14, 2015.Figure 4.6 Comparison of (a) interpolated 5‐minute load data to actual load ...Figure 4.7 Comparison of (a) interpolated 5‐minute load data to actual load ...Figure 4.8 Comparison of (a) interpolated 5‐minute wind power data to actual...Figure 4.9 Comparison of (a) interpolated 5‐minute wind power data to actual...Figure 4.10 Simulation of (a) packet dropout and its impact on (b) load data...Figure 4.11 Flow chart of MCS‐OPF method.Figure 4.12 Radial 11‐nodes DGS.Figure 4.13 Load profiles of different nodes for August 23, 2015.

      4 Chapter 5Figure 5.1 Control block diagram of the power system with four gas turbines ...Figure 5.2 The evolution of the maintenance variables of the PBM model, i.e....Figure 5.3 Scenario of the outputs of renewable energy resources, i.e., (a) ...Figure 5.4 (a) Efficiency reduction, (b) O&M cost (excluding fuel) and (c) o...Figure 5.5 The estimated PDF of (a) TENSN and TENSD, and (b) TCoN and TCoD u...Figure 5.6 The reductions in the two indicators caused by the aging process ...Figure 5.7 The evolution of the system frequency in two scenarios of differe...Figure 5.8 The LC(M, L, TI) as a function of MPO and TI.Figure 5.9 Comparison among the pre‐scheduled, the condition‐based and the p...

      5 Chapter 6Figure 6.1 (a) Distributed gas generators connected to routers in order to r...Figure 6.2 Total expected damage cost as a function of the most probable att...Figure 6.3 Expected system unsupplied demand as a function of the most proba...Figure 6.4 Optimal redundancy‐allocation rate r* as a function of the most p...Figure 6.5 Changing curve of optimal number of attacked cyber component n.Figure 6.6 Simulation results of (a) total expected damage cost and (b) opti...Figure 6.7 Simulation results of (a) total expected damage cost, and optimal...Figure 6.8 Simulation results of (a) total expected damage cost, and optimal...

      6 Chapter 7Figure 7.1 The cyber‐physical structure of smart grid.Figure 7.2 Estimation result of cyber‐attacks from 2010.06 to 2018.09.Figure 7.3 Data scatter plot and linear prediction of

.Figure 7.4 Comparison of regrets (θ = θ1, N = 10).Figure 7.5 Comparison of regrets (θ = θ1, N = 20) independently.Figure 7.6 Comparison of regrets (θ = θ2, N = 10).Figure 7.7 Comparison of regrets (θ = θ2, N = 20).Figure 7.8 Regrets under different variations (θ = θ1, N = 20).Figure 7.9 Regrets under different variations (θ = θ2, N = 20).

      Guide

      1  Cover Page

      2  Title Page

      3  Copyright Page

      4  Preface

      5  Acronyms and Abbreviations

      6  Table of Contents

      7  Begin Reading

      8  References

      9  Index

      10  Wiley End User License Agreement

      Pages

      1  iii

      2  iv

      3  ix

      4  x

      5  xi

      6 xii

      7  xiii

      8  xiv

      9  xv

      10  1

      11  2

      12  3

      13  4

      14  5

      15  6

      16