The search functionality is under construction.

Author Search Result

[Author] Qiang WU(2hit)

1-2hit
  • Energy and Link-State Based Routing Protocol for MANET

    Shi ZHENG  Weiqiang WU  Qinyu ZHANG  

     
    PAPER-Information Network

      Vol:
    E94-D No:5
      Page(s):
    1026-1034

    Energy conservation is an important issue in mobile ad hoc networks (MANET), where the terminals are always supplied with limited energy. A new routing protocol is presented according to the study on the influence of low-energy nodes in ad hoc networks. The novel routing protocol (energy sensing routing protocol, ESRP) is based on the energy sensing strategy. Multiple strategy routing and substitute routing are both adopted in this paper. Referring to the level of the residual energy and the situation of energy consumption, different routes are chosen for packets transmission. The local maintenance is adopted, which can reduce packets retransmission effectively when the link breaks. We focus on the network lifetime most in all performances. The evaluation is done in comparison with other routing protocols on NS2 platform, and the simulation results show that this routing protocol can prolong the network lifetime and balance energy consumption effectively.

  • RRT-Based Computation for Dynamic Security Analysis of Power Systems

    Qiang WU  Yoshihiko SUSUKI  T. John KOO  

     
    PAPER

      Vol:
    E99-A No:2
      Page(s):
    491-501

    Analysis of security governed by dynamics of power systems, which we refer to as dynamic security analysis, is a primary but challenging task because of its hybrid nature, that is, nonlinear continuous-time dynamics integrated with discrete switchings. In this paper, we formulate this analysis problem as checking the reachability of a mathematical model representing dynamic performances of a target power system. We then propose a computational approach to the analysis based on the so-called RRT (Rapidly-exploring Random Tree) algorithm. This algorithm searches for a feasible trajectory connecting an initial state possibly at a lower security level and a target set with a desirable higher security level. One advantage of the proposed approach is that it derives a concrete control strategy to guarantee the desirable security level if the feasible trajectory is found. The performance and effectiveness of the proposed approach are demonstrated by applying it to two running examples on power system studies: single machine-infinite system and two-area system for frequency control problem.