- document
-
Zaharieva, Nikoleta (author)Natural disasters can significantly disturb communication networks. There are examples of events causing massive connectivity failures in the past, such as the Great East Japan Earthquake. Network protection mechanisms have been developed to cope with the destructive power of natural disasters and mitigate their impact on connections...master thesis 2022
- document
-
Harteveld, Maurice (author), Asadollahi Asl Zarkhah, S. (author)This paper focuses on public spaces for community resilience in their ‘response-related abilities’ and which can be improved. Comparative studies of communities, places, and/or disasters after the unforeseen impactful events are indicators to quantify the level of resilience. Within the broad scope of literature, in this line, 'community...journal article 2021
- document
-
Vilhjálmsson, Ingimundur (author)Natural disasters can destroy communication network components, potentially leading to severe losses in connectivity. During those devastating events, network connectivity is crucial for rescue teams as well as anyone in need of assistance. Therefore, swift network restoration following a disaster is vital. However, post-disaster network...master thesis 2021
- document
-
Pudashine, Jayaram (author), Guyot, Adrien (author), Overeem, A. (author), Pauwels, Valentijn R.N. (author), Seed, Alan (author), Uijlenhoet, R. (author), Prakash, Mahesh (author)This study presents the first evaluation of using commercial microwave link (CML) data for rainfall measurements in Australia, with the test site being the greater Melbourne Metropolitan area. More than 100 CMLs with microwave frequency ranging between 10 and 40 GHz have been used for the rainfall retrieval. The 15-minute received signal...journal article 2021
- document
-
Ananduta, W. (author), Nedic, Angelia (author), Ocampo-Martinez, Carlos (author)A multi-agent optimization problem motivated by the management of energy systems is discussed. The associated cost function is separable and convex although not necessarily strongly convex and there exist edge-based coupling equality constraints. In this regard, we propose a distributed algorithm based on solving the dual of the augmented...journal article 2021
- document
-
Ananduta, W. (author), Ocampo-Martinez, Carlos (author), Nedic, Angelia (author)In this paper, we propose a distributed model predictive control (MPC) scheme for economic dispatch of energy systems with a large number of active components. The scheme uses a distributed optimization algorithm that works over random communication networks and asynchronous updates, implying the resiliency of the proposed scheme with respect...journal article 2021
- document
-
Sun, P. (author), Kooij, Robert (author), Van Mieghem, P.F.A. (author)In this paper, we propose closed-form analytic approximations for the number of controllable nodes in sparse communication networks from the aspect of network controllability, considering link-based random attack, targeted attack, as well as random attack under the protection of critical links. We compare our approximations with simulation...journal article 2021
- document
-
Ad Hoc communication topology switching during disasters from altruistic to individualistic and BackBanerjee, I. (author), Warnier, Martijn (author), Brazier, F.M. (author)Disaster communication has made immense progress in the last thirty years. At present, disaster research focuses on bottom-up approaches such as civilian inclusion in disaster response. With the advent of smartphones, citizen-based emergency communication has become possible. Present ad hoc communication technologies typically form a fully...conference paper 2020
- document
-
Pan, K. (author), Herdeiro Teixeira, A.M. (author), López, Claudio (author), Palensky, P. (author)It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data...conference paper 2018
- document
-
Tanaka, T. (author), Mohajerin Esfahani, P. (author), Mitter, S.K. (author)We consider a discrete-time Linear-QuadraticGaussian (LQG) control problem in which Massey’s directed information from the observed output of the plant to the control input is minimized while required control performance is attainable. This problem arises in several different contexts, including joint encoder and controller design for data-rate...journal article 2018
- document
-
Muhammad Iqbal, M.A.F. (author), Trajanovski, S. (author), Kuipers, F.A. (author)Spatially-close network fibers have a significant chance of failing simultaneously in the event of man-made or natural disasters within their geographic area. Network operators are interested in the proper detection and grouping of any existing spatially-close fiber segments, to avoid service disruptions due to simultaneous fiber failures....conference paper 2016
- document
-
Baldi, S. (author), Kosmatopoulos, Elias B. (author), Pitsillides, Andreas (author), Lestas, Marios (author), Ioannou, Petros A. (author), Wan, Y. (author)An adaptive decentralized strategy for active queue management of TCP flows over communication networks is presented. The proposed strategy solves locally, at each link, an optimal control problem, minimizing a cost composed of residual capacity and buffer queue size. The solution of the optimal control problem exploits an adaptive...conference paper 2016
- document
-
Kleer, P.S. (author)In this thesis we provide a mathematical analysis of a distributed algorithm for route discovery in communication networks.master thesis 2015
- document
-
Negeri, E.O. (author), Kuipers, F.A. (author), Baken, N.H.G. (author)The electric power grid is a critical infrastructure that delivers electricity from power generation sources to consumers. At this time, renewable and distributed sources of electricity as well as new technologies that introduce large loads are significantly changing load profiles in low-voltage grids. This trend calls for reassessing the...journal article 2015
- document
-
Egyedi, T.M. (author), Van den Berg, J. (author)The number of inverse infrastructures (Vree, 2003), that is, user-driven and self-organizing infrastructures, is rising and unsettling policies that are foremost tailored to deal with large-scale and centrally-governed infrastructures (Egyedi et al. 2012). To better understand and address this mismatch, Van den Berg (2012) has developed a...conference paper 2012
- document
-
Bouzalmat, A. (author)Wi-Fi has steadily emerged as the most favourite technology for wireless access to the internet. The most recent development in the Wi-Fi world is the increasing use of Wi-Fi technology in local community networks both in developing and developed countries. Wi-Fi offers possibilities for end-users in creating local community initiatives that go...master thesis 2012
- document
-
van Ingen Schenau, H.A. (author), Nooren, G.J.L. (author)The dissemination of ERS-1 real-time thematic products via the Global Telecommunication System, the ECS satellite telecom system or the Eiuronet packet switching network is analysed and evaluated against the use of direct-receive L-band stations as used for NOAA weather image reception.report 1981
- document
-
Vreeburg, J.P.B. (author)After a short introduction to various types of links and network organisations, the experimental phase in military satellite communications systems is expounded in a chronological discussion of early communications satellites. This experimental phase is considered to be ended with the TASCAT and IDCSP satellites. Present systems and systems of...report 1974