scholarly journals Enhanced secondary frequency control via distributed peer-to-peer communication

Author(s):  
Chenye Wu ◽  
Soummya Kar ◽  
Gabriela Hug
Energies ◽  
2018 ◽  
Vol 11 (10) ◽  
pp. 2497 ◽  
Author(s):  
Hassan Alhelou ◽  
Mohamad-Esmail Hamedani-Golshan ◽  
Reza Zamani ◽  
Ehsan Heydarian-Forushani ◽  
Pierluigi Siano

Power systems are the most complex systems that have been created by men in history. To operate such systems in a stable mode, several control loops are needed. Voltage frequency plays a vital role in power systems which need to be properly controlled. To this end, primary and secondary frequency control loops are used to control the frequency of the voltage in power systems. Secondary frequency control, which is called Load Frequency Control (LFC), is responsible for maintaining the frequency in a desirable level after a disturbance. Likewise, the power exchanges between different control areas are controlled by LFC approaches. In recent decades, many control approaches have been suggested for LFC in power systems. This paper presents a comprehensive literature survey on the topic of LFC. In this survey, the used LFC models for diverse configurations of power systems are firstly investigated and classified for both conventional and future smart power systems. Furthermore, the proposed control strategies for LFC are studied and categorized into different control groups. The paper concludes with highlighting the research gaps and presenting some new research directions in the field of LFC.


Author(s):  
Xianghan Zheng ◽  
Vladimir Oleshchuk

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advantages and disadvantages. After that, we study appropriate combination of these two approaches to get optimized protection. Our design is independent of the DHT (Distributed Hash Table) overlay technology. We take the Chord overlay as the example, and then, analyze the system in several aspects: security & privacy, number-of the hops, message flows, etc.


Sign in / Sign up

Export Citation Format

Share Document