control node
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 5 (4) ◽  
pp. 1195-1200
Author(s):  
Aleksandar Haber ◽  
Sebastian A. Nugroho ◽  
Patricio Torres ◽  
Ahmad F. Taha

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2395
Author(s):  
Abdullah Ayub Khan ◽  
Asif Ali Laghari ◽  
De-Sheng Liu ◽  
Aftab Ahmed Shaikh ◽  
Dan-An Ma ◽  
...  

A distributed power system operation and control node privacy and security are attractive research questions that deliver electrical energy systems to the participating stakeholders without being physically connected to the grid system. The increased use of renewable energy in the power grid environment creates serious issues, for example, connectivity, transmission, distribution, control, balancing, and monitoring volatility on both sides. This poses extreme challenges to tackle the entire bidirectional power flow throughout the system. To build distributed monitoring and a secure control operation of node transactions in the real-time system that can manage and execute power exchanging and utilizing, balancing, and maintaining energy power failure. This paper proposed a blockchain Hyperledger Sawtooth enabling a novel and secure distributed energy transmission node in the EPS-ledger network architecture with a robust renewable power infiltration. The paper focuses on a cyber–physical power grid control and monitoring system of renewable energy and protects this distributed network transaction on the blockchain and stores a transparent digital ledger of power. The Hyperledger Sawtooth-enabled architecture allows stakeholders to exchange information related to power operations and control monitoring in a private ledger network architecture and investigate the different activities, preserved in the interplanetary file systems. Furthermore, we design, create, and deploy digital contracts of the cyber–physical energy monitoring system, which allows interaction between participating stakeholders and registration and presents the overall working operations of the proposed architecture through a sequence diagram. The proposed solution delivers integrity, confidentiality, transparency, availability, and control access of the distribution of the power system and maintains an immutable operations and control monitoring ledger by secure blockchain technology.


2020 ◽  
Vol 15 (6) ◽  
pp. 734-742
Author(s):  
Hailiang Liu ◽  
Jiade Cheng ◽  
Asnidar Hanim Yusuf

Light Emitting Diode (LED) is widely used in garden landscape decoration because of its small size, low power, concentrated light, and the capability of showing more vivid colors. While designing the LED lighting system, considering that a single Advanced RISC Machine (ARM)-based control system cannot achieve large-scale LED display, and a single Field Programmable Gate Array (FPGA)-based control system cannot control the lighting system well, an LED system with the combination of ARM processor-FPGA is proposed. In this system, the ARM processor is used as the major control component. The Linux system realizes remote monitoring and intelligent management of image data. In addition, FPGA is used for LED data output. The lighting system consists of a major control node and a lighting node. The nodes are connected in parallel through a chain network. The major control node uses an ARM Cortex processor and is equipped with a Linux operating system. The lighting node uses ARM + FPGA hardware architecture. During the experiments, the LED lighting system is tested first. The results show that the reading and writing speed is fast. The LED display screen meets the lighting requirements. This LED lighting system is used for night lighting of garden landscapes. During the brightness test, the brightness of lighting objects and the background is used as research objects. Experiments have proved that the ratio of the lighting object brightness to the background brightness between (Yu, M. and Li, X., 2012. A little current k-factor method for measuring junction temperature of aviation lighting power led. Guangxue Jishu/Optical Technique, 38(3), pp.371–375; Monas, A., Verma, A., Gawari, A. and Paswan, R. S., 2016. Portable network monitor using arm processor. Procedia Computer Science, 92, pp.493–497.) is suitable for night lighting of garden landscape decoration, which will not bring discomfort to people who enjoy night scenery.


2019 ◽  
pp. 295-307
Author(s):  
Emmy Mugisha ◽  
Gongxuan Zhang ◽  
Maouadj Zine El Abidine ◽  
Mutangana Eugene

In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.


Structures ◽  
2018 ◽  
Vol 13 ◽  
pp. 178-192 ◽  
Author(s):  
Giuseppina Uva ◽  
Francesco Porco ◽  
Andrea Fiore ◽  
Sergio Ruggieri

Sign in / Sign up

Export Citation Format

Share Document