Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Phani Teja Kuruganti is active.

Publication


Featured researches published by Phani Teja Kuruganti.


2007 IEEE Power Engineering Society General Meeting | 2007

Integrated Hybrid-Simulation of Electric Power and Communications Systems

James J. Nutaro; Phani Teja Kuruganti; Laurie C. Miller; Sara Mullen; Mallikarjun Shankar

The modern power grid is strongly integrated with its communication network. While a power system primarily consists of elements that are modeled by continuous equations, a communication system has discrete event dynamics. We model the integrated operation of these two systems with a hybrid modeling and simulation technique. Systematically combining continuous and discrete event system models is necessary for correctly simulating critical system behaviors. This paper discusses an approach based on the discrete event system specification (DEVS) that characterizes the interaction of the two systems formally to preserve simulation correctness. We demonstrate the implementation of our integrated hybrid simulation technique with detailed generator and network models in a wide-area cooperative automatic load-control scenario.


Isa Transactions | 2006

Wireless industrial sensor networks: framework for QoS assessment and QoS management.

Ivan Howitt; Wayne W Manges; Phani Teja Kuruganti; Glenn O. Allgood; Jose A. Gutierrez; James M. Conrad

This paper presents a framework that addresses Quality of Service (QoS) for industrial wireless sensor networks as a real-time measurable set of parameters within the context of feedback control, thereby facilitating QoS management. This framework is based on examining the interaction between the industrial control processes and the wireless network. Control theory is used to evaluate the impact of the control/communication interaction, providing a methodology for defining, measuring, and quantifying QoS requirements. An example is presented illustrating the wireless industrial sensor network (WISN) QoS management framework for providing dynamic QoS control within WISN. The example focuses on WISN operating in a time-varying RF interference environment in order to manage application-driven QoS latency constraints.


International Journal of Energy Sector Management | 2008

Integrated modeling of the electric grid, communications, and control

James J. Nutaro; Phani Teja Kuruganti; Mallikarjun Shankar; Laurie C. Miller; Sara Mullen

Purpose – This paper aims to address a central concern in modeling and simulating electric grids and the information infrastructure that monitors and controls them. The paper discusses the need for and methods to construct simulation models that include important interactions between the physical and computational elements of a large power system.Design/methodology/approach – The paper offers a particular approach to modeling and simulation of hybrid systems as an enabling technology for analysis (via simulation) of modern electric power grids. The approach, based on the discrete event system specification, integrates existing simulation tools into a unified simulation scheme. The paper demonstrates this approach with an integrated information and electric grid model of a distributed, automatic frequency maintenance activity.Findings – Power grid modernization efforts need powerful modeling and simulation tools for hybrid systems.Research limitations/implications – The main limitation of this approach is ...


Simulation | 2012

The split system approach to managing time in simulations of hybrid systems having continuous and discrete event components

James J. Nutaro; Phani Teja Kuruganti; Vladimir Protopopescu; Mallikarjun Shankar

The efficient and accurate management of time in simulations of hybrid models is an outstanding engineering problem. General a priori knowledge about the dynamic behavior of the hybrid system (i.e. essentially continuous, essentially discrete, or ‘truly hybrid’) facilitates this task. Indeed, for essentially discrete and essentially continuous systems, existing software packages can be conveniently used to perform quite sophisticated and satisfactory simulations. The situation is different for ‘truly hybrid’ systems, for which direct application of existing software packages results in a lengthy design process, cumbersome software assemblies, inaccurate results, or some combination of these independent of the designer’s a priori knowledge about the system’s structure and behavior. The main goal of this paper is to provide a methodology whereby simulation designers can use a priori knowledge about the hybrid model’s structure to build a straightforward, efficient, and accurate simulator with existing software packages. The proposed methodology is based on a formal decomposition and re-articulation of the hybrid system; this is the main theoretical result of the paper. To set the result in the right perspective, we briefly review the essentially continuous and essentially discrete approaches, which are illustrated with typical examples. Then we present our new, split system approach, first in a general formal context, then in three more specific guises that reflect the viewpoints of three main communities of hybrid system researchers and practitioners. For each of these variants we indicate an implementation path. Our approach is illustrated with an archetypal problem of power grid control.


Archive | 2010

Cybersecurity through Real-Time Distributed Control Systems

Roger A. Kisner; Wayne W Manges; Lawrence Paul MacIntyre; James J. Nutaro; John K. Munro; Paul D Ewing; Mostofa Howlader; Phani Teja Kuruganti; Richard M Wallace; Mohammed M. Olama

Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications interconnections. Much work is under way in numerous organizations to characterize the cyber threat, determine means to minimize risk, and develop mitigation strategies to address potential consequences. While it seems natural that a simple application of cyber-protection methods derived from corporate business information technology (IT) domain would lead to an acceptable solution, the reality is that the characteristics of RTDCSs make many of those methods inadequate and unsatisfactory or even harmful. A solution lies in developing a defense-in-depth approach that ranges from protection at communications interconnect levels ultimately to the control system s functional characteristics that are designed to maintain control in the face of malicious intrusion. This paper summarizes the nature of RTDCSs from a cybersecurity perspec tive and discusses issues, vulnerabilities, candidate mitigation approaches, and metrics.


IEEE Transactions on Antennas and Propagation | 2008

An Event Driven, Simplified TLM Method for Predicting Path-Loss in Cluttered Environments

James J. Nutaro; Phani Teja Kuruganti; Rajanikanth Jammalamadaka; Tomas Tinoco; Vladimir Protopopescu

We describe a scalable method for predicting radio channel path-loss in cluttered environments. The method is designed for constructing path-loss look-up tables that can be integrated with a mobile wireless network simulation. The proposed simulation technique is a much simplified version of the transmission line matrix method; the simplifications allow for an event based simulation using a coarse spatial grid. This, in turn, makes it possible to roughly approximate site specific radio channel path-loss on a scale that is suitable for simulating wireless LANs. Two validation studies demonstrate the utility of the proposed approach.


midwest symposium on circuits and systems | 2008

Towards fully integrated high temperature wireless sensors using GaN-based HEMT devices

Mohammed Aminul Huque; Syed K. Islam; Phani Teja Kuruganti

Wireless sensors that are capable of working in extreme environments can significantly improve the efficiency and performance of industrial processes by facilitating better monitoring and control. Gallium nitride (GaN), a widely researched wide bandgap material, can potentially be used to fabricate components for sensing and actuation for high temperature integrated wireless sensors. In this paper we are presenting an experimental study on the performance of AlGaN/GaN HEMT at high temperatures (up to 300degC). From test results, DC and microwave parameters at different temperatures were extracted.


military communications conference | 2007

Fast, Accurate RF Propagation Modeling and Simulation Tool for Highly Cluttered Environments

James J. Nutaro; Phani Teja Kuruganti

As the network centric warfare and distributed operations paradigms unfold, there is a growing need for robust wireless network deployment tools. These tools must take into consideration the terrain of the operating theater, and facilitate modeling of end to end network performance based on accurate RF propagation predictions. It is well known that statistical models can not provide accurate, site specific predictions of radio channel behavior. In this paper an event-driven wave propagation simulation is proposed as a computationally efficient technique for predicting critical propagation characteristics of RF signals in cluttered environments. Convincing validation and simulator performance studies confirm the suitability of this method for indoor and urban area RF channel modeling. By integrating our RF propagation prediction tool, RCSIM, with popular packet-level network simulators, we are able to construct an end to end network analysis tool for wireless networks operating in built-up urban areas.


Archive | 2008

On the Reversibility of Newton-Raphson Root-Finding Method

Kalyan S. Perumalla; John P Wright; Phani Teja Kuruganti

Reversibility of a computational method is the ability to execute the method forward as well as backward. Reversible computational methods are generally useful in undoing incorrect computation in a speculative execution setting designed for efficient parallel processing. Here, reversibility is explored of a common component in scientific codes, namely, the Newton-Raphson root-finding method. A reverse method is proposed that is aimed at retracing the sequence of points that are visited by the forward method during forward iterations. When given the root, along with the number of iterations, of the forward method, this reverse method is aimed at backtracking along the reverse sequence of points to finally recover the original starting point of the forward method. The operation of this reverse method is illustrated on a few example functions, serving to highlight the methods strengths and shortcomings.


Proceedings of SPIE | 2009

Assured communications and combat resiliency: the relationship between effective national communications and combat efficiency

Glenn O. Allgood; Phani Teja Kuruganti; James J. Nutaro; Jay Saffold

Combat resiliency is the ability of a commander to prosecute, control, and consolidate his/hers sphere of influence in adverse and changing conditions. To support this, an infrastructure must exist that allows the commander to view the world in varying degrees of granularity with sufficient levels of detail to permit confidence estimates to be levied against decisions and course of actions. An infrastructure such as this will include the ability to effectively communicate context and relevance within and across the battle space. To achieve this will require careful thought, planning, and understanding of a network and its capacity limitations in post-event command and control. Relevance and impact on any existing infrastructure must be fully understood prior to deployment to exploit the systems full capacity and capabilities. In this view, the combat communication network is considered an integral part of or National communication network and infrastructure. This paper will describe an analytical tool set developed at ORNL and RNI incorporating complexity theory, advanced communications modeling, simulation, and visualization technologies that could be used as a pre-planning tool or post event reasoning application to support response and containment.

Collaboration


Dive into the Phani Teja Kuruganti's collaboration.

Top Co-Authors

Avatar

James J. Nutaro

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Glenn O. Allgood

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Mohammed M. Olama

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Mallikarjun Shankar

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Wayne W Manges

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

David Fugate

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mostofa Howlader

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Paul D Ewing

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Roger A. Kisner

Oak Ridge National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge