An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
YaShian Li-Baboud, Julien M. Amelot, Dhananjay Anand, Gerard N. Stenbakken, Thomas L. Nelson, James Moyne
One of the key lessons learned from the 2003 Northeast Blackout in the United States was the need for improved timing. The problem began as an isolated issue, but cascaded through the Northeastern grid. Timely situational awareness would likely have
This paper presents a dynamically updating key distribution strategy to enhance mesh network security against cyber attacks. The scheme has been applied to two security protocols known as Simultaneous Authentication of Equals (SAE) and Efficient Mesh
Spurred by the 2006 Miner Act, reliable two-way communications in mines has drawn the interest of network engineers in recent years. Critical to the design of these systems is an accurate channel propagation model. Given the elementary geometry seen in
Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video coding
In this paper we firstly propose a general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-InputMulti-Output (MIMO) system and/or by asynchronous cooperative transmissions. The general model is not only
Kamran Sayrafian, John G. Hagedorn, Wen-Bin Yang, Judith E. Terrill
Design of efficient wireless communication protocols for body area networks requires in-depth understanding of the propagation media i.e. the human body. As obtaining large amount of data for many scenarios and use-cases via physical experiment is either
Camillo A. Gentile, David W. Griffith, Michael R. Souryal
The projected use of the power grid for smart applications such as advanced metering and distributed automation will require highly reliable, secure, well-designed and managed communication networks. While many of the benefits of wireless communications
In this paper we propose and discuss a game-theoretic framework for (a) evaluating security vulnerability, (b) quantifying the corresponding Pareto optimal vulnerability/cost tradeo®, and (c) identifying the optimal operating point on this Pareto optimal
Jie Lin, Guobin Xu, David W. Griffith, Xinyu Yang, Wei Yu
The Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. It promises to integrate distributed energy resources with conventional generation plants, and intelligently transmit energy
In this paper we firstly propose a block-code based general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-Input Multi- Output (MIMO) system and/or by asynchronous cooperative transmissions. The
Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implementation of
James D. Gilsinn, Kang B. Lee, John L. Michaloski, Frederick M. Proctor, Yuyin Song
This document describes the purpose, concept, requirements, and architecture for the Factory Equipment Network Testing (FENT) Framework and the software to test equipment on real-time factory networks. Other documents contain more detailed information
James D. Gilsinn, Kang B. Lee, John L. Michaloski, Frederick M. Proctor, Yuyin Song
This document describes the application programming interface (API) used by the Factory Equipment Network Testing (FENT) Framework to communicate between the main Universal Client Application (UCA) and the Personality Module (PM). This API abstracts a
This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing
Felipe Penaranda-foix, Michael D. Janezic, Jose M. Catala-Civera, Antoni J. Canos-Marin
In this paper, a full-wave method for the electromagnetic analysis of dielectric-loaded cylindrical and coaxial waveguides and cavities is developed. For this purpose, a new four-port ring network is proposed, and the mode-matching method is applied to
As the electric power grid is changing to a smarter more dynamically controlled system, there is increasing need for measurements that show the global status of the system for wide-area monitoring and control. These measurements require time
David W. Griffith, Michael R. Souryal, Nada T. Golmie
This chapter discusses the use of wireless networks in the context of the smart grid. First, it provides an overview of the various applications envisaged in the smart grid and discusses their communication requirements. Sifting through thousands of
Christopher E. Dabrowski, James J. Filliben, Kevin L. Mills
Over the past five years, we investigated methods to characterize global behavior in large distributed systems and applied those methods to predict effects from deploying alternate distributed control algorithms. The methods we used assess global behaviors
In order to contain a differential propagation delay in a block based cooperative MIMO system, a guard interval can be inserted to mitigate the effect of inter-symbol interference. A larger block size could substantially increase the effective symbol rate
Power Line Communication (PLC) systems provide a bi-directional communication platform capable of delivering data for a variety of Smart Grid applications such as home energy management and intelligent meter reading and control. One benefit of applying
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the
Mark L. Badger, Timothy Grance, Robert Patt-Corner, Jeffrey M. Voas
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations
Secret keys can be established through the use of Quantum channels monitored through classical channels which can be thought of as being error free. Because many of the feasible implementation of the quantum channel are subject to erasures often massive-