18 resultados para Grid computing and services
em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"
Resumo:
In this work, a mathematical model to analyze the impact of the installation and operation of dispersed generation units in power distribution systems is proposed. The main focus is to determine the trade-off between the reliability and operational costs of distribution networks when the operation of isolated areas is allowed. In order to increase the system operator revenue, an optimal power flow makes use of the different energy prices offered by the dispersed generation connected to the grid. Simultaneously, the type and location of the protective devices initially installed on the protection system are reconfigured in order to minimize the interruption and expenditure of adjusting the protection system to conditions imposed by the operation of dispersed units. The interruption cost regards the unsupplied energy to customers in secure systems but affected by the normal tripping of protective devices. Therefore, the tripping of fuses, reclosers, and overcurrent relays aims to protect the system against both temporary and permanent fault types. Additionally, in order to reduce the average duration of the system interruption experienced by customers, the isolated operation of dispersed generation is allowed by installing directional overcurrent relays with synchronized reclose capabilities. A 135-bus real distribution system is used in order to show the advantages of using the mathematical model proposed. © 1969-2012 IEEE.
Resumo:
The technologies are rapidly developing, but some of them present in the computers, as for instance their processing capacity, are reaching their physical limits. It is up to quantum computation offer solutions to these limitations and issues that may arise. In the field of information security, encryption is of paramount importance, being then the development of quantum methods instead of the classics, given the computational power offered by quantum computing. In the quantum world, the physical states are interrelated, thus occurring phenomenon called entanglement. This study presents both a theoretical essay on the merits of quantum mechanics, computing, information, cryptography and quantum entropy, and some simulations, implementing in C language the effects of entropy of entanglement of photons in a data transmission, using Von Neumann entropy and Tsallis entropy.
Resumo:
This paper presents new inverter topologies based on the integration of a DC to DC Zeta or Cuk converter with a voltage source inverter (VSI). The proposed integration procedure aims to reduce the amount of components, meaning lower volume, weight and costs. In this context, new families of single-phase and three-phase integrated inverters are also presented. Therefore, considering the novelty for Zeta and Cuk integrated inverters structures, the proposed single-phase and three-phase inverters versions are analyzed for grid-tied and stand-alone applications. Furthermore, in order to demonstrate the feasibility of the proposal, the main simulation and experimental results are presented. © 2011 IEEE.
Resumo:
Increased accessibility to high-performance computing resources has created a demand for user support through performance evaluation tools like the iSPD (iconic Simulator for Parallel and Distributed systems), a simulator based on iconic modelling for distributed environments such as computer grids. It was developed to make it easier for general users to create their grid models, including allocation and scheduling algorithms. This paper describes how schedulers are managed by iSPD and how users can easily adopt the scheduling policy that improves the system being simulated. A thorough description of iSPD is given, detailing its scheduler manager. Some comparisons between iSPD and Simgrid simulations, including runs of the simulated environment in a real cluster, are also presented. © 2012 IEEE.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Computational grids allow users to share resources of distributed machines, even if those machines belong to different corporations. The scheduling of applications must be performed aiming at performance goals, and focusing on choose which processes can have access to specif resources, and which resources. In this article we discuss aspects of scheduling of application in grid computing environment. We also present a tool for scheduling simulation along with test scenarios and results.
Resumo:
Smart micro-grids offer a new challenging domain for power theories and metering techniques, because they include a variety of intermittent power sources which positively impact on power flow and distribution losses, but may cause voltage asymmetry and frequency variation. Due to the limited power capability of smart micro-grids, the voltage distortion can also get worse (in case of supplying non-linear loads), affecting measurement accuracy and possibly causing tripping of protections. In such a context, a reconsideration of power theories is required, since they form the basis for supply and load characterization. A revision of revenue metering techniques is also needed, to ensure a correct penalization of the loads for their responsibility in generating reactive power, voltage unbalance and distortion. This paper shows that the Conservative Power Theory (CPT) provides a suitable background to cope with smart grids characterization and metering needs. Experimental results validate the proposed approach. © 2010 IEEE.
Resumo:
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application. © 2010 Springer-Verlag Berlin Heidelberg.
Resumo:
In non-extensive statistical mechanics [14], it is a nonsense statement to say that the entropy of a system is extensive (or not), without mentioning a law of composition of its elements. In this theory quantum correlations might be perceived through quantum information process. This article, that is an extension of recent work [4], is a comparative study between the entropies of Von Neumann and of Tsallis, with some implementations of the effect of entropy in quantum entanglement, important as a process for transmission of quantum information. We consider two factorized (Fock number) states, which interact through a beam splitter bilinear Hamiltonian with two entries. This comparison showed us that the entropies of Tsallis and Von Neumann behave differently depending on the reflectance of the beam splitter. © 2011 Academic Publications.
Resumo:
The development of new technologies that use peer-to-peer networks grows every day, with the object to supply the need of sharing information, resources and services of databases around the world. Among them are the peer-to-peer databases that take advantage of peer-to-peer networks to manage distributed knowledge bases, allowing the sharing of information semantically related but syntactically heterogeneous. However, it is a challenge to ensure the efficient search for information without compromising the autonomy of each node and network flexibility, given the structural characteristics of these networks. On the other hand, some studies propose the use of ontology semantics by assigning standardized categorization of information. The main original contribution of this work is the approach of this problem with a proposal for optimization of queries supported by the Ant Colony algorithm and classification though ontologies. The results show that this strategy enables the semantic support to the searches in peer-to-peer databases, aiming to expand the results without compromising network performance. © 2011 IEEE.
Resumo:
This paper proposes a simple and powerful architecture for publication and universal access to smart transducers, through existing and established open standards. Smart transducers are put to work on standards and styles already included in the Web, exploring resources in Cloud Computing and simplifying access to data. © 2012 IEEE.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Pós-graduação em Agronomia (Energia na Agricultura) - FCA
Resumo:
Introduction: Individuals born from the 1990’s to accompany technological change course and learn how to use the technological resources that have access before they even learn to read or write. In this sense, the literature considers the digital natives or even 'Google generation'. However, it has been questioned their skills to identify information needs and seeking and use of information in the most varied environments digital information available on the Web. Objectives: To characterize the behavior of information seeking in everyday life of a group of teenage students from a private school in Marilia, Sao Paulo. Methodology: A qualitative study with 30 adolescent students of a private school in Marilia, Sao Paulo. Data collection was accomplished at first by means of a questionnaire, based on the research of Hughes-Hussell and August (2007), containing questions about age, gender, hobbies and everyday tasks, and issues the use of computers and the internet, which allowed determination of the social, economic and cultural rights of respondents. Results: have focused on the use of Information and Communication Technologies (ICT) to search access and use information. It was suggested that the "Brotherhood of Informatics', an incentive for students to (re) learn the tools of digital communication and make appropriate use of the resources, products and services on the web to search and effective use of information compatible with their needs and that is tied to the ethical and responsible use of technology environments. Conclusions: The results arising from this study will continue through the continuation of the Confraternity of Computing, which became a "thermometer" on the use of digital information environments and the attitude of the students in front of Information and Communication Technologies in the College “Cristo Rei”.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)