EECS Theses and Dissertations

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 355
  • Item
    Energy storage optimization using modified cuckoo search
    (Wichita State University, 2023-12) Wiebe, Kyle Garrett; Aravinthan, Visvakumar
    Renewable generation is a topical area of research due to its low environmental impact compared with conventional generation and the current push to reduce fossil fuel emissions. However, inconsistencies in renewable power generation can cause a variety of power system problems. Energy storage technologies, such as batteries, are able to be used to help smooth out the inconsistent generation patterns of renewable resources. This ability to, partially or completely, remedy the unpredictability inherent to renewable generation makes battery storage an important topic for academic progress and optimization to increase industry utilization. There are numerous parameters pertaining to batteries and the power grid that can be optimized, one of which being economic optimization, which is the subject of this thesis. This optimization goal enhances battery systems’ feasibility of installation in the industry. This thesis presents a modified version of Cuckoo Search Optimization [1] and validates it with a more conventional optimization technique, Dynamic Programming [2]. It is then shown how this optimization technique can be applied to optimize a battery’s charge and discharge schedule and to implement economic battery sizing for various battery capital cost estimates.
  • Item
    Mapping business entities to intersections for network simulaiton
    (Wichita State University, 2023-12) Nawal, Nowshin; Asaduzzaman, Abu
    Business entities (i.e., shops) in a region can be considered as network nodes, where the profit of a shop is related to the vehicular traffic at the adjacent intersections. Argonne National Laboratory (ANL) and UChicago Argonne have developed Portable Extensible Toolkit for Scientific Computation (PETSc) and Data Management Network (DMNetwork) libraries to conduct network analysis. However, PETSc and DMNetwork do not provide a way to map a business entity to a network node. In this work, a methodology has been developed for mapping shops to the associated intersections using their (longitude, latitude) values for profit analysis through network simulation. OpenStreetMap (OSM) is used to generate the initial network containing traffic nodes and edges. Then, Google Maps Platform (GMP) and LocationIQ (LIQ) Application Programming Interface (API) tools are used to generate the locations’ (longitude, latitude) values of shops. The developed methodology then assigns a node to a shop using the shortest distance. As a result, each and every shop is mapped to its nearest intersection. Unlike OSM, both GMP and LIQ offer dedicated services to provide geo-location data of shops. While both GMP and LIQ follow the same file structure, LIQ provides a better source for shops. The newly generated files with shop information are used for network simulation and profit analysis using PETSc and DMNetwork libraries. According to the simulation results, PETSc reduces the computation time by 50% if two processors are used instead of one. This work can be extended to automate the mapping process and incorporate shops of multiple regions simultaneously.
  • Item
    Sensitivity analysis in gyrator synthesis
    (Wichita State University, 1968-01) You, Chen-nan; Hoyer, Elmer A.
    The purpose of this thesis is to apply both classical sensitivity function and pole-zero sensitivity to a method of active network synthesis developed by Hoyer.
  • Item
    Stability investigation of non-linrst control systems by the second method of liapunov
    (Wichita State University, 1967-01) Yang, Philip Wen-Tse
    An introduction to Liapunov's second method as it applies to autonomous non-linear control system stability with experimental verification is presented in this thesis. Main theorems and definitions of Liapunov's method are treated. Lur'e's method, Szego's method, the variable gradient method and the method of several non-linear elements are presented to generate suitable Liapunov functions for testing the stability of an autonomous non-linear control system, and several examples with experimental verifications are used to illustrate these procedures. The applications of Liapunov's second method to practical engineering problems are still applicable to only certain classes of systems due to the difficulties in generating Liapunov functions. If practical and more generally applicable engineering methods can be devised for generating Liapunov functions, the method may become one of the best tools available for the analysis and design of non-linear systems.
  • Item
    Secure message communication via a relay using a secret sharing scheme
    (Wichita State University, 2023-07) Dodda, Srilekha; Chou, Remi A.
    Secure message communication between the transmitter and the receiver checks integrity. It involves preserving the message content against unauthorized access. The designed application uses a shamir secret sharing scheme, where a message can be split into shares. And the transmitter distributes each share to the receiver to reconstruct the message through the relays. In this process, the adversary might attack any of the relays to modify the share information and tries to obtain the original message. Where each share is produced by adding additional information to it also providing the identification protocol at the reconstruction phase to ensure the message integrity. At last, the receiver will perform an identification protocol to identify the authentic shares, if the shares are verified as authentic then the receiver will perform a reconstruction protocol to reconstruct the message.
All items in SOAR are protected by copyright, with all rights reserved, unless otherwise indicated.