scholarly journals Fault Diagnosis Knowledge Reasoning of Switching Network in Distributed Generation Based on Petri Net

Author(s):  
Ziquan Liu ◽  
Xueqiong Zhu ◽  
Jingtan Ma ◽  
Hui Fu ◽  
Ke Zhao ◽  
...  

Telephone network based on IMS technology has been widely applied in power production and dispatching communication, especially in distributed power stations. Analysis and positioning failure of IMS network is arduous, because it’s dependent on IP data communication network. In this paper, we first introduced IMS switching network architecture and distributed generation communication network architecture, analyzed and summarized all kinds of network malfunction. Combining typical IMS network fault connection relations, we introduced an improved Petri net fault handling model and reasoning method. The diagnosis and positioning results could reflect the defects of equipment logic functions. This method on fault diagnosis and location of substation network has been proved to be effective through practical application.

2012 ◽  
Vol 253-255 ◽  
pp. 1427-1430
Author(s):  
Lin Na He

This paper introduces communication based train contrl (CBTC) technology, focusing on the concept of the CBTC , the CBTC system structure, and the CBTC system basic principle. This paper presents the CBTC system is composed of two parts by the train control system and wireless information transmission, the CBTC system using wireless communication technology to achieve real-time bi-directional communication in the train and the trackside equipment, through an open data communication network. Finally, data communication subsystem network architecture in the CBTC system has been studied.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4895
Author(s):  
Maurício R. Silva ◽  
Elitelma S. Souza ◽  
Pablo J. Alsina ◽  
Deyvid L. Leite ◽  
Mateus R. Morais ◽  
...  

This paper presents a communication network for a squadron of unmanned aerial vehicles (UAVs) to be used in the scanning rocket impact area for Barreira do Inferno Launch Center—CLBI (Rio Grande do Norte, Brazil), aiming at detecting intruder boats. The main features of communication networks associated with multi-UAV systems are presented. This system sends information through Wireless Sensor Networks (WSN). After comparing and analyzing area scanning strategies, it presents the specification of a data communication network architecture for a squadron of UAVs within a sensor network using XBee Pro 900HP S3B modules. A brief description is made about the initial information from the construction of the system. The embedded hardware and the design procedure of a dedicated communication antenna to the XBee modules are presented. In order to evaluate the performance of the proposed architecture in terms of robustness and reliability, a set of experimental tests in different communication scenarios is carried out. Network management software is employed to measure the throughput, packet loss and other performance indicators in the communication links between the different network nodes. Experimental results allow verifying the quality and performance of the network nodes, as well as the reliability of the communication links, assessing signal received quality, range and latency.


Sign in / Sign up

Export Citation Format

Share Document