scholarly journals Dependability Impact in the Smart Solar Power Systems: An Analysis of Smart Buildings

Energies ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 124
Author(s):  
Eltton Araujo ◽  
Paulo Pereira ◽  
Jamilson Dantas ◽  
Paulo Maciel

The Internet has been going through significant transformations and changing the world around us. We can also see the Internet to be used in many areas, for innumerable purposes, and, currently, it is even used by objects. This evolution leads to the Internet of Things (IoT) paradigm. This new concept can be defined as a system composed of storage resources, sensor devices, controllers, applications, and network infrastructure, in order to provide specific services to its users. Since IoT comprises heterogeneous components, the creation of these systems, the communication, and maintenance of their components became a complex task. In this paper, we present a dependability model to evaluate an IoT system. Amid different systems, we chose to assess availability in a smart building. The proposed models allow us to calculate estimations of other measures besides steady-state availability, such as reliability. Thus, it was possible to notice that there was no considerable gain of availability in the system when applying grid-tie solar power or off-grid solar power. The grid-tie solar power system is cheaper than the off-grid solar power system, even though it produces more energy. However, in our research, we were able to observe that the off-grid solar power system recovers the applied financial investment in smaller interval of time.

Author(s):  
D. Danalakshmi ◽  
V. Thiruppathy Kesavan ◽  
V. Agnes Idhaya Selvi

The reactive power is the background power without which the active power cannot be transmitted in the power systems. In the modern power system, the reactive power pricing is considered as essential in order to maintain the voltage in the transmission line. The modern power system is the grid that functions with smart innovative technological system that provides flexibility, efficiency and availability for the users. The smart grid uses the Internet of Things (IoT) technology to identify and provides the requirement of system reactive power for reactive power pricing. The IoT based wireless communication platform significantly reduces the latency and provides better accuracy. The system requirements for reactive power are optimally dispatched by the generator and other reactive power provider using optimization algorithm like Self Balanced Differential Evolution. Here the analytics and opportunities of smart grid for reactive power service are discussed using 62 bus Indian Utility System (IUS).


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2013 ◽  
Vol 2013 ◽  
pp. 1-6
Author(s):  
Meng-Hui Wang

Due to the complex parameters of a solar power system, the designer not only must think about the load demand but also needs to consider the price, weight, and annual power generating capacity (APGC) and maximum power of the solar system. It is an important task to find the optimal solar power system with many parameters. Therefore, this paper presents a novel decision-making method based on the extension theory; we call it extension decision-making method (EDMM). Using the EDMM can make it quick to select the optimal solar power system. The paper proposed this method not only to provide a useful estimated tool for the solar system engineers but also to supply the important reference with the installation of solar systems to the consumer.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Patrice Seuwou ◽  
Vincent F. Adegoke

The opportunities offered by digital technology are enormous. The global social and economic system is being reconfigured at an incredible rate. Connectivity is increasingly reshaping our world and redefining the way we interact with our environment. The rise of digital technologies is transforming almost every aspect of modern life. More and more of our interactions are mediated by machines. Along with the rapid evolution comes the risks, threats, and vulnerabilities in the system for those who plan to exploit it. In this chapter, firstly, the authors explore the role of 5G, big data, the internet of things (IoT), artificial intelligence (AI), autonomous vehicles (AV), and cloud computing play in the context of smart societies; secondly, they analyse how the synergy between these technologies will be used by governments and other stakeholders around the world to improve the safety of citizens albeit increasingly relinquishing privacy rights and encouraging mass surveillance at the expense of liberty.


Energies ◽  
2019 ◽  
Vol 12 (4) ◽  
pp. 682 ◽  
Author(s):  
Hassan Haes Alhelou ◽  
Mohamad Hamedani-Golshan ◽  
Takawira Njenda ◽  
Pierluigi Siano

Power systems are the most complex systems and have great importance in modern life. They have direct impacts on the modernization, economic, political and social aspects. To operate such systems in a stable mode, several control and protection techniques are required. However, modern systems are equipped with several protection schemes with the aim of avoiding the unpredicted events and power outages, power systems are still encountering emergency and mal-operation situations. The most severe emergencies put the whole or at least a part of the system in danger. If the emergency is not well managed, the power system is likely to have cascading failures that might lead to a blackout. Due to the consequences, many countries around the world have research and expert teams who work to avoid blackouts on their systems. In this paper, a comprehensive review on the major blackouts and cascading events that have occurred in the last decade are introduced. A particular focus is given on the US power system outages and their causes since it is one of the leading power producers in the world and it is also due to the ready availability of data for the past events. The paper also highlights the root causes of different blackouts around the globe. Furthermore, blackout and cascading analysis methods and the consequences of blackouts are surveyed. Moreover, the challenges in the existing protective schemes and research gaps in the topic of power system blackout and cascading events are marked out. Research directions and issues to be considered in future power system blackout studies are also proposed.


Sign in / Sign up

Export Citation Format

Share Document