scispace - formally typeset
Search or ask a question
Topic

Control reconfiguration

About: Control reconfiguration is a research topic. Over the lifetime, 22423 publications have been published within this topic receiving 334217 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Modified plant growth simulation algorithm has been applied here successfully to minimize real power loss because it does not require barrier factors or cross over rates because the objectives and constraints are dealt separately.

165 citations

Patent
10 Feb 2005
TL;DR: In this article, a bidirectional radio frequency identification (RFID) network system and method is presented, which allows users to configure, monitor, and manage different sensor devices by using a graphical user interface real-time.
Abstract: A bidirectional radio frequency identification (RFID) network system and method are presented. The system allows users to configure, monitor, and manage different sensor devices by using a graphical user interface real-time. The reconfiguration is done through a network management computer at the top system level that receives user input, generates code images according to the user input, and appropriately routes the code images to sensor routers that directly control the sensors. If the system is multi-layered, some code images are also sent to the intermediate-level network management computers. The system allows users to not only monitor a business flow but react to problematic situations quickly by adjusting the workflow. The aspect-oriented nature of the system allows users to reconfigure the system based only the Functionality aspects without worrying about the Partitioning aspects (e.g., how the network and the sensors are physically connected).

165 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe the philosophy and the implementation of a preventive control algorithm for application in power system dynamic security assessment, which consists of an optimization procedure where: the objective function takes into account economic costs; inequality constraints confine the trajectory of the system in a practical domain of the state space; and equality constraints derive from the discretization of the differential-algebraic equations of the power system sparse representation.
Abstract: This paper describes the philosophy and the implementation of a preventive control algorithm for application in power system dynamic security assessment. The methodology consists of an optimization procedure where: the objective function takes into account economic costs; inequality constraints confine the trajectory of the system in a practical domain of the state space; and equality constraints derive from the discretization of the differential-algebraic equations of the power system sparse representation. The algorithm has been implemented to reschedule the power system generation in order to guarantee transient stability. The feasibility of the approach is shown through computer simulation tests on a realistic sized test network.

165 citations

Journal ArticleDOI
TL;DR: It is observed that the network losses are reduced when the voltage stability is enhanced by the network reconfiguration, and the fuzzy genetic algorithm uses a suitable coding and decoding scheme for maintaining the radial nature of the network at every stage of genetic evolution.

164 citations

Proceedings ArticleDOI
05 Apr 1993
TL;DR: The architecture and compiler for a general-purpose metamorphic computing platform called PRISM-II, which improves the performance of many computationally-intensive tasks by augmenting the functionality of the core processor with new instructions that match the characteristics of targeted applications.
Abstract: This paper discusses the architecture and compiler for a general-purpose metamorphic computing platform called PRISM-II. PRISM-II improves the performance of many computationally-intensive tasks by augmenting the functionality of the core processor with new instructions that match the characteristics of targeted applications. In essence, PRISM (processor reconfiguration through instruction set metamorphosis) is a general purpose hardware platform that behaves like an application-specific platform. Two methods for hardware synthesis, one using VHDL Designer and the other using X-BLOX, are presented and synthesis results are compared. >

164 citations


Network Information
Related Topics (5)
Control theory
299.6K papers, 3.1M citations
85% related
Software
130.5K papers, 2M citations
85% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Network packet
159.7K papers, 2.2M citations
83% related
Optimization problem
96.4K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023784
20221,765
2021778
2020958
2019976
20181,060